Skip to main content

Security

Thought leadership as well as effective ways to solve cloud security issues.

How to Deploy and Secure Your MERN App on Linode

In this video, @codinginflow will show you how to deploy & secure a NodeJS/React application on a Linode and connect it to a domain.
Security

Security Apps to Surround and Protect Your VLAN or VPC

In this video, @TechHut will share some apps available in the Linode Marketplace to further secure your VLANs or VPCs.
Security

Simulate Attacks with Infection Monkey – Cyber Security Simulation, Validation, and Mitigation

Infection Monkey is an open-source breach & attack simulator that helps validate controls & identify how attackers might exploit your network.
Security
Splunk Event Monitoring with Alexis Ahmed

Splunk Security Event Monitoring – Blue Team Series with Hackersploit

Splunk is the first data-to-everything platform powered by artificial intelligence, advanced data search, and optimized data streaming.
Security
Intrusion Detection with Suricata Featuring Alexis Ahmed

Intrusion Detection with Suricata – Blue Team Series with Hackersploit

In this video, we'll cover the process of installing, configuring, and using Suricata for intrusion detection.
Security
Wazuh Intrusion Detection featuring Alexis Ahmed

Intrusion Detection with Wazuh – Blue Team Series with Hackersploit

In this episode of our Blue Team series with @HackerSploit, we cover intrusion detection with Wazuh, an open source detection application.
Security

Linode Brings Pentesting to DevSecOps

In this video, Billy Thompson, Solutions Engineer at Akamai, and Ben Wilson. Sr, Developer at Kali Linux talk DevSecOps on Kali.
Security
Snort Intrusion Detection Featuring Alexis Ahmed

Intrusion Detection with Snort – Blue Team Series with Hackersploit

In this second episode of our Blue Team series @HackerSploit introduces intrusion detection with Snort, a powerful intrusion detection app.
Security
Threat Detection featuring Alexis Ahmed

Network Traffic Analysis with Wireshark – Blue Team Series with Hackersploit

This series will cover Blue Team techniques and tools used by security analysts and SOC teams, such as Wireshark.
Security

What Exactly is High Availability? Failover & High Availability Demonstration from ZSecurity

High availability (HA) is a term that describes a website or application with maximum uptime and accessibility for the content stored on it.
Security

Windows Defense Evasion – Lateral Movement Techniques | Red Team Series 13-13

In the final video of our Hackersploit Red Team series we will take a look at Windows Defense Evasion and lateral movement techniques.
Security

Linux Defense Evasion – Linux Rootkits | Red Team Series 12-13

In this video portion of our Red Team Series we will cover Linux Rootkits.
Security