Building Your Own Pentest Box: Part 1 – Setting Up Metasploitable 3
Background: Metasploitable3 is a virtual machine (VM) purposefully designed with numerous security vulnerabilities. It serves as a target for testing...
Exploring Microsoft Defender for Office 365 – Phishing Emails
Protecting your email system from cyberthreats like phishing, ransomware, and business email compromise is crucial in today’s digital landscape. With...
Microsoft Defender For Endpoint Part 2
Vulnerability Discovery and Remediation with Microsoft Defender & Intune Overview: Last time, we installed Microsoft Defender, identified vulnerabilities, and viewed...
Microsoft Defender For Endpoint Part 1
Installing Windows Defender and Examining Vulnerabilities Overview : Defender for Endpoint, Microsoft’s enterprise security platform, integrates endpoint behavioral sensors within...
Vulnerability Management Labs Review
Contents: Lab 1 : Setting up Metasploitable 2 & Scanning Using Nmap Lab 2 : Vulnerability Scanning Using Nessus Lab...
How to Build Your Microsoft AD/Configuration Manager + Pentesting Lab in 30 Minutes
This lab kit from Microsoft contains evaluation software designed for IT professionals interested in assessing Windows 10 deployment and management...