Skip to main content
Idigital Classroom

Idigital Classroom

By Joy Alatta

iDigitalClassroom is a reliable source of first-class remote learning and remote work resources where eLearning content creators and remote technology providers are empowered by providing insight from a user perspective to enable the production of engagement tools and resources.
Available on
Apple Podcasts Logo
Google Podcasts Logo
Pocket Casts Logo
RadioPublic Logo
Spotify Logo
Currently playing episode

Planning for Penetration Testing

Idigital ClassroomMar 16, 2021

00:00
13:38
Basic Principles of Information Security

Basic Principles of Information Security

Information is the lifeline of an organization. Think about what blood does to a human being. That is actually how the data and information that flow through our network is importance for our organization. Data and information are essential in our private lives as we monitor our homes using remote cameras. We want to know where our kids are, what they are doing, or where they are hanging out. We want to know where our vehicles are parked and the things happening around them. So, the information we are tracking must be secure because it can be compromised if it is not secure. And if it is compromised, it would not serve the purpose for which we need the data or information.

Aug 31, 202119:05
Identifying the IT Infrastructure for IT Security
Aug 25, 202120:50
Use Defensive Cybersecurity to Mitigate Cyber attack

Use Defensive Cybersecurity to Mitigate Cyber attack

It is essential to understand what could go wrong in a system and to use mitigation action to protect the system from potential threats. In recent weeks you may have heard of an incident that explained why there is a need to take a defensive approach to protect your digital assets and infrastructures. The incident is that of Kaseya. Wired.com reported that the Kaseya was warned by the Dutch Institute for Vulnerability Disclosure that there was a potential vulnerability in its system. In this case, Kaseya did not ignore the warning, but Kaseya did not move first to patch up the exposure...More

Jul 28, 202111:02
The Human Factor in a Ransomware Attack Part-2

The Human Factor in a Ransomware Attack Part-2

Kaspersky Lab conducted a study to determine what role employees play in a business's fight against cybercrime. The study used over 5,000 businesses around the globe and found out that (52%) of the businesses surveyed believed they are at risk from within and that their employees either intentionally put the businesses at risk or are put the businesses at risk through carelessness or lack of knowledge.

The question that comes to mind after reading that report is why employees are responsible for so many security breaches? Is it fair or proper to say that employees are lazy? Or that they do they just not care what risk they expose their employer?

What do you think of the result of that report?

Jun 17, 202110:53
The Human Factor in a Ransomware Attack Part-1

The Human Factor in a Ransomware Attack Part-1

Ransomware is a type of malware that creeps into a network, scans the network to identify targets, and then uses encryption to seize all or some parts of the network. Thus, the victim's information is held at a ransom. After encrypting the files, the attacker becomes the only one with the decrypting key. In a network that experienced a ransomware attack, the system owner will not be able to have access to the files, databases, or applications. The attacker then resumes operation by demanding ransom.

Ransomware works by spreading across a network with the aim of paralyzing the network. In a ransomware attack, the attacker uses asymmetric encryption. Asymmetric encryption is a type of cryptography that uses a pair of keys to encrypt and decrypt a file. The pair of keys are a private and a public key, and the attacker uniquely generates both keys. The private key will be required to decrypt the files, and it may be nearly impossible to decrypt the files without the private key. Imagine a situation where someone creeps into your house, changes the locks on the doors, and sends you a message to pay some ransom before you get a key to unlock your home. Often, the attacker will contact the victim on how to pay a ransom to receive the private key with which to decrypt the files or seized assets.

Jun 09, 202118:51
Gathering Penetration Testing Intelligence from Network and Application Platform Configuration
Jun 01, 202113:49
Security Implication Of Web Frameworks

Security Implication Of Web Frameworks

Web application frameworks provide a structure for building and developing applications through the provision of predefined classes, modules, and functions. The predefined classes and modules help to manage system hardware, software and to manage the streamlining of the application development process. The framework in this discussion includes application frameworks such as Angular.js or Django and content management system frameworks such as WordPress.

Most web application frameworks use the model view control design pattern abbreviated as MVC pattern to provide structure to application development. The MVC pattern helps to ensure separate concerns for data, user interface, and input control...More




May 18, 202108:52
HOW TO USE COMMENTS AND METADATA INFORMATION TO GATHER INTELLIGENCE FOR PENETRATION TESTING
May 11, 202111:31
How to Use Robots.txt File to Gather Intelligence for Penetration Testing
Apr 27, 202112:13
Gathering Information for Penetration Testing Using Search Engines Discovery and OWASP ZAP
Apr 20, 202115:44
Penetration Testing Information Gathering For Web Server Fingerprinting
Apr 15, 202116:33
Approaches to Penetration Testing
Apr 07, 202115:11
Tool Selection for Penetration Testing
Mar 23, 202110:29
Planning for Penetration Testing

Planning for Penetration Testing

The decision to conduct penetration testing is an indication of the importance of risk management in any organization. It is a good professional practice to document security policies that outlines how penetration testing should be conducted and how it relates to different types of systems, such as servers, wen applications, laptops, desktops, tablets, smartphones, and numerous others.

Penetration testing is also referred to as ethical hacking. Though both refer to the same concept, there is a difference between the two. Penetration testing is performed on a specific information system or as a specific objective while ethical hacking has a more broad objective, which includes all other hacking methods, and other activities to combat and mitigate cyber-attack. You can consider penetration testing as a subset of ethical hacking techniques. It suffices to say that an ethical hacker needs to have a more comprehensive knowledge of the hacking methodologies than a penetration tester.

Mar 16, 202113:38
Penetration Testing as a Cybersecurity Survival Technique
Mar 09, 202112:58
Security Challenges In eLearning Systems
Mar 02, 202113:21
Challenges of Social Engineering
Feb 23, 202115:57
ONLINE SECURITY AND PRIVACY FOR ELEARNERS AND REMOTE WORKERS
Feb 19, 202110:36
Responsibilities of Web Users in a Digital Society

Responsibilities of Web Users in a Digital Society

Competency with the use of technology is essential, but it is also essential to understand how to behave in a digital society.
The explosive use of the internet and social media has created enormous opportunities for users to express themselves in unprecedented ways. Though all the innovative ideas of sharing content are exciting, there are associated risks in terms of Privacy and abuse...More

Feb 19, 202115:56
Challenges and Benefits of Elearning and Remote Work

Challenges and Benefits of Elearning and Remote Work

The COVID-19 pandemic has created an unprecedented challenge that forced learners and several other institutions to move to the virtual world. Many learners woke up one day and realized that the physical classroom has suddenly moved online due to Covd19. Challenges of sudden migration to remote work and remote learning are not only felt by the learners and employees. Some organizations complain about how to coordinate users in an online community setting and some others complained about how to reach out to users in diverse continents on time zones.

0q91BYnTvOAjT1iqP16R

Jan 04, 202114:44