Recently Updated Pages
12.5.2 Mobile Device Management
Learn how organizations manage their mobile devices. Mobile device management is how corporate ne...
12.7.6 Maintain Mobile Devices
Learn how to maintain mobile devices to extend their lifespan. Unused Apps All apps, no matter wh...
12.4.1 Mobile Devices
Learn the basics behind the common types of mobile devices. There are several different types of ...
Software Defined Networking
A technology that allows network and security professionals to manage, control, and make changes ...
Virtual Container
An alternative to virtual machines, which runs consistent runtime environments for specific progr...
Arch Linux
megachad simulator Create a File System Wipe Partitions The goal of this section is to create ...
Secure Cookies
Cookies are small pieces of data stored on a computer by a web browser while accessing a website....
Code Signing
Pay Microsoft and promise your code is safe and secure and totally isn't spyware or adware. Code...
Secure Coding Techniques
We must protect our code from getting skidded! Thou shalt release an application that is globall...
Static Code Analysis
The process of scrutinizing source code to identify potential problems and non-compliant coding p...
Software Sandboxing
A security mechanism used in software development used to isolate running processes from each oth...
Agile Software Development Model
A more agile approach to software development. Agile depicts software development as a never end...
Waterfall Development Life Cycle
The most widely used software development model. Waterfall requires each step to be fully comple...
Web App Attacks
There are lots of them. In fact, here's a list of them. Privilege Escalation Pointer/object ...
Sn1per
An automated scanner that can be used to enumerate and search for specific vulnerabilities. Sn1p...
Buffer Overflows
A type of web app attack. Buffers are temporary data storage areas that have limited space. By w...
Dereference
A type of web app attack. Dereferencing a pointer is retrieving the value stored in memory. Poin...
Privilege Escalation
A type of web app attack. Most attacks are some form of privilege escalation. There are two type...
Extensible Authentication Protocol
A framework for auto-negotiation of secure authentication methods that use hardware identifiers l...
Internet Key Exchange
A framework for creating a security association used with IPsec. Security associations (SAs) esta...