Meet Our Experts
Don Bowers
Courses
Security Analyst, Part 4 of 4: Configure Kali Linux
This course focuses on fully configuring Kali Linux to be the right tool for the job. It starts off with installing, which features to turn off and which tools to install. It covers using TOR, Linux commands, executing scripts and files as well a...
Security Analyst, Part 3 of 4: Penetration Testing
This course focuses on Penetration testing. It starts off with how to create a plan, and execute deliverables. Next, it covers the planning phase as well as developing a team of testers. Finally, it goes through the penetration testing checklist...
Security Analyst, Part 2 of 4: Penetration Testing Overview
There are many ways and methodologies designed to analyze the information security needs of a corporation or government entity. One of the best ways to analyze the security posture of an organization is through penetration testing. Examine the fundam...
Security Analyst, Part 1 of 4: Security Analyst Overview
There is a lot of confusion, even amongst security professionals, as to what makes a security analyst. Explore what it really means to be a security analyst by examining what CBK (Common Body of Knowledge) a security analyst might possess, as well as...