· Alex · security
What are Potentially Unwanted Programs (PUP) and Their Impact on Cybersecurity
What are PUPs, how are PUPs distributed, associated risks, how to detect and prevent
What are PUPs, how are PUPs distributed, associated risks, how to detect and prevent
Types of session hijacking vulnerabilities and best practices to guard against
Discuss geolocation tracking, port scanning, and denial of service (DoS)
Authorization protocols, Role-Based Access Control, securing API endpoints, auditing and monitoring, and security practices for API consumers
Definition, tools, and defenses against password spraying attacks
The ins and outs of drive encryption using BitLocker