![oluwaseyi Akilude](/img/default-banner.jpg)
- 60
- 70 110
oluwaseyi Akilude
South Africa
Приєднався 15 чер 2016
This channel is created to help IT professional quickly resolve IT Issues and also to keep them abreast with the latest Know-How. My personal goal is to ensure that i upload Technical Know-how on different Technologies to help my Fellow IT Professionals.
Enjoy!
Please am open to feedback. Please Feel Free to subscribe and comment on the videos and i sure will work on serving you better by constantly Improving myself.
You can reach me on +27746471706, Email: seyiakilude@yahoo.com
God Bless you.
Enjoy!
Please am open to feedback. Please Feel Free to subscribe and comment on the videos and i sure will work on serving you better by constantly Improving myself.
You can reach me on +27746471706, Email: seyiakilude@yahoo.com
God Bless you.
Episode 2: Uncovering Qualys WAS Configuration Secrets
in this video, we uncover the secrets of Qualys Web Application Scanning configuration. Learn how to optimize your web application scanning process for better security and compliance.
The Configuration settings include the following;
1. Option profile
2. Brute-force List
3. Search Lists
4. Parameters Sets
5. DNS Override Settings
6. Virtual Appliance
7. Global Settings
Timestamps
00:00 Episode2 : Qualys WAS Configuration Settings while Testing Web Application
02:46 Creating new Option Profile
16:18 Creating Brute-force List
18:09 Creating Search Lists
22:17 Creating Parameter Sets
23:09 Creating DNS Override Sets
24:12 Adding a Virtual Appliance
30:46 Using Global Settings
32:19 Applying Configurations Settings (Options Profile and DNS Override)
#WebApplicationScanning #QualysWAS #Cybersecurity
Enjoy!!
Please Like, Share and Subscribe
The Configuration settings include the following;
1. Option profile
2. Brute-force List
3. Search Lists
4. Parameters Sets
5. DNS Override Settings
6. Virtual Appliance
7. Global Settings
Timestamps
00:00 Episode2 : Qualys WAS Configuration Settings while Testing Web Application
02:46 Creating new Option Profile
16:18 Creating Brute-force List
18:09 Creating Search Lists
22:17 Creating Parameter Sets
23:09 Creating DNS Override Sets
24:12 Adding a Virtual Appliance
30:46 Using Global Settings
32:19 Applying Configurations Settings (Options Profile and DNS Override)
#WebApplicationScanning #QualysWAS #Cybersecurity
Enjoy!!
Please Like, Share and Subscribe
Переглядів: 148
Відео
Episode 1: Onboarding a Web Application on Qualys WAS (Web Application Scanning Demo using Qualys)
Переглядів 7184 місяці тому
This Video demonstrate how to onboard a web application on Qualys WAS for Dynamic Application Security Testing (DAST)
Step-by-Step Cisco ASA Remote Access: From Novice to Expert
Переглядів 345 місяців тому
This comprehensive video takes you on a journey, transforming you from a novice to an expert in configuring secure remote access for your network. Follow along with the clear step-by-step instructions and hands-on demonstrations to gain the confidence to manage remote access on your Cisco ASA like a pro. Don't wait, click play and unlock the power of secure remote access with Cisco ASA!
How to configure ASA Firewall IP Connectivity and Security Levels
Переглядів 945 місяців тому
In this video, we will dive deep into learning the configuration of the Cisco ASA Firewall. Whether you are a network engineer looking to enhance your skills or someone interested in cybersecurity, this tutorial will provide valuable insights on effectively configuring and managing a Cisco ASA Firewall. In this video, I specifically focused on how to configure IP addresses on the ASA firewall i...
Reporting Metrics in Vulnerability Management
Переглядів 3026 місяців тому
In this video, I spoke about the following learning objectives; 1. What is Reporting in Vulnerability Management 2. Key Considerations when creating a report. 3. Common Vulnerability Management KPIs 4. Reporting Tools. Enjoy!
CIS Benchmark Compliance Scan Video
Переглядів 5 тис.Рік тому
In this Video, I addressed System Hardening using the CIS-CAT Lite tool. CIS Benchmarks: www.cisecurity.org/cis-benchmarks-overview NIST - SP 800-123(General Server Security) and 800-53B(Security and Privacy Control) nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-123.pdf & nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf European Network and Information Security...
Vulnerability Management Engineer Interview Tips and Questions
Переглядів 3,5 тис.Рік тому
In this video, I described how to prepare for a Vulnerability Management Engineer role interview. Enjoy!!
Vulnerability Scanning (Authenticated vs Non-Authenticated Scans)
Переглядів 936Рік тому
This videos provides details as to why running authenticated scans is very beneficial to your organization. I did a vivid comparison between both. Enjoy. Please Like, Share and Subscribe
Leveraging the Mitre ATT&CK Framework to analyse vulnerabilities
Переглядів 591Рік тому
In this video, I describe how you can leverage the MITRE ATT&CK Framework to further analyze a vulnerability to determine its impact. In addition, some tactics and techniques an adversarial group could use to exploit such vulnerabilities. I also described how you can create a Vulnerability register using some parameters from the Mitre ATT&CK Framework. Enjoy. Mitre ATT&CK Framework: attack.mitr...
How to start your Journey in Cybersecurity as a Vulnerability Management Engineer(Webinar Replay)
Переглядів 631Рік тому
Webinar Replay
Vulnerability Management Demo using Qualys without Background Music
Переглядів 7 тис.Рік тому
Vulnerability Management Demo using Qualys without Background Music
Safeguarding your Organization from Cyber Attacks with Qualys Patch management Demo.
Переглядів 557Рік тому
In this video, I covered the following Learning Objectives; 1. What does it mean to Patch a Vulnerability? 2. Processes involved in Patch Management 3. Patch Management Demo with Qualys. Enjoy!!
Regulatory Compliance with Qualys Part 2
Переглядів 1 тис.Рік тому
In this Second part, I demonstrated how you can actually achieve policy compliance with Qualys using its components. Enjoy!!!
Regulatory Compliance with Qualys Part 1
Переглядів 1,3 тис.Рік тому
Hello Everyone, In this video, I spoke about the following objectives: 1. What does it mean to be Compliant? 2. Qualys Policy Management products. 3. Components involved with Policy Compliance using Qualys. Enjoy!!!!
Vulnerability Management Demo with Qualys
Переглядів 14 тис.Рік тому
Vulnerability Management Demo with Qualys
Best Practice to Implement Vulnerability Management
Переглядів 684Рік тому
Best Practice to Implement Vulnerability Management
Tools used to implement Vulnerability Management
Переглядів 902Рік тому
Tools used to implement Vulnerability Management
The Processes Involved in Vulnerability Management
Переглядів 692Рік тому
The Processes Involved in Vulnerability Management
Understanding why vulnerability Management is important.
Переглядів 1 тис.Рік тому
Understanding why vulnerability Management is important.
Difference between Vulnerability Management and Vulnerability Assessment
Переглядів 1,1 тис.2 роки тому
Difference between Vulnerability Management and Vulnerability Assessment
The Definition of Vulnerability Management.
Переглядів 2,1 тис.2 роки тому
The Definition of Vulnerability Management.
Applying vPatch rules on Databases using McAfee DAM
Переглядів 4752 роки тому
Applying vPatch rules on Databases using McAfee DAM
Introduction to Database Activity Monitoring (DAM)
Переглядів 4,6 тис.2 роки тому
Introduction to Database Activity Monitoring (DAM)
Well done Oluwaseyi, however, you did not capture a critical area of the VM lifecycle - Risk-based prioritization of vulnerabilities…
Is there a good alternative to Qualys?
Great
cool intro!!!
Great video, than you for this valuable information
Thank you so much for the kind words
Absolutely valuable. Now I understand fully how to ensure we comply with CIS benchmarks. Tks very much Seyi
no music in the background please
This is amazing! Thank you. Please create more videos. You are a great teacher.
Thank you
Thanks so much for this! Very educative and informative!
Thank you
Great video Oluwaseyi. I'm curious to know if you've tried other web app scanners, like Tenable, and why you may prefer Qualys over these. I'm currently looking for the right solution for my company and any advice will be helpful. Thanks
Hi, Yes, I have. I just prefer using Qualys because of its availability and quick access. Other tools are more demo based. A good tool to try is also burp suite. I hope this helps
So heres my first question Sir, I notices on the CSI lite interface we are only presented with benchmark for Enterprise edition of windows. does it mean this benchmark cannot work for other editions of windows like the pro, home etc.. please I anticipate your answer. though I make some research as regard Windows Enterprise, and i get to know we have the enterprise and standalone licensing, enterprise offers more features for workstation and standalone are mostly for PC's. I dont know if my research are accurate Sir, Please i need your guidance or what to readup on to better understand this. thanks in anticipation.
Hi Tobi, thank you for your feedback. They only offer for few operating system because of its limited version. When I did the demo for this video I could only work on. Windows 10. My advise is to run CIS. Compliance based scan with any of your existing tools such as Tenable, qualys etc. And please don't break things 😂😂😂. Ensure you are learning within your far environment.
Coming accross this videos is the best thing that happens to me today, I have been reading up on this topic for quite sometimes and researching on CIS and its implemention but you really make it so simple... Mr. Seyi your indepth explanation answers most of my questions and curiocity... I cant wait to jump into my environment to destroy things, learn new things and explore the more on this topic... Im on the look for more security videos from your well of knowledge Sir. Thanks so much..
Greetings Mr. Akilude, I recently came across your VM course and was impressed by your proficient teaching style. I just completed cybersecurity training; I've developed a keen interest in Vulnerability Management. I'd love to connect with you for networking opportunities. Best regards, Henry
Thank you fir reaching out. God bless you 🙏
it was valuable information, thanks alot for the tips, the volume was very low
Thank you for the feedback
Thanks Oluwaseyi, have u used a tool to automate the benchmarks policies for large numbers of windows machines?
Your vulnerability management tool can also assist with this
From Nigeria, can I work as a Vulnerability engineer abroad remotely?
Yes, you can
this video serves as a valuable resource for cybersecurity professionals seeking to enhance their vulnerability management strategies. Looking forward to more informative content like this in the future!"
Thank you sir
can you take enable the subscribes, thank you
Thanks. I find out that you are knowledgeable in this domain. My advice is to revamp you videos and spread it more.
Hello Francis. Thank you for the advice. I am working on that. ❤️❤️❤️
Nice video, i want to learn more on vmdr, I will need a pri ate instructor. Can u do this for me?
Hi Basi, apologies for the delay in response. Yes I do. Please reach me via email: seyiakilude@yahoo.com
Great video, easy to understand
Hi Micheal, thanks for the feedback
Wow! Very nice content. I'm going to harden my computer
Thank you sir
Can you make video on SIEM , SOAR demo
Great video very informative. Thanks for reuploading again
Amazing video.Thank you so much for this.
Thank you
Can you turn music off or speak louder please? Thank you
Hello, thank you for the observations. But I have another on my channel with no background music
I am interested. I sent you an email please respond
background sound is the problem
hi akilude, am a student pursuing a BSc networking and cyber security. i would love to acquire skill in vulnerability management and PCI DSS compliance using Qualys tool to gain that expertise. i will be glad thanks
both switches should have same group number and channel number right ? but you set 2 numbers, how does this work ?
If I do the Qualys VMDR Course can I get a job, or do I have to do all the courses in the Qualys Vulnerability Management section. Also, if I do all those courses, do I have to get additional certifications like A+, Network+ and Security+ to get a job. What do you think someone would have to study in order to get a job as a Vulnerabilty Scanner or other professions related to Qualys. Also, do you know if there is anywhere online where people can do Qualys projects together to get experience to put on a resume and help. So, what do you think I should study. 1. Qualys VMDR -> maybe all the other Qualys Vulnerability Management Courses -> Maybe some certifications. You've had a tech job for a long while now, what do you suggest I study for a role where I use Qulays. I also do not want a job with coding.
Qualys is a tool used to manage your environment. It by no means teaches you what you'll need to know in order to monitor at the base level without Qualys meaning if you go to a place without it you're SOL. If you're starting out, yes, look into A+ > Network+ > Security+. Those all help develop if not justify that you have a baseline of knowledge when applying for a job. If possible, look for an entry level position with room to grow where they provide assistance in obtaining those certifications.
wow , i was asked this Question ...thank you sir
Great video
Thank you
this is making alot of sense. thank you so so much sir.
this is very helpful
You are welcome sir
Great clip, You too much
Thank you sir
never had a more detailed demo. Thank you so much
You are very much welcomed sir 🙏
Oo, sorry it's a ma😁😁
Could you please release a video for CentOS,how to install DAM on CentOS7
It's the same procedure to install as used in Redhat
@@oluwaseyiakilude tried but it's not working..
This is great 👍 👌
Thank you 🙏
Thanks, Bro... Valuable information. Low volume and small writing space but solid info. Thanks
You are welcome sir 🙏
May the lord bless you for this, you made be cleared my interview and Got a Good role
Congratulations. So happy to hear this🙏🙏❤️❤️
The main difference between TCP (transmission control protocol) and UDP (user datagram protocol) is that TCP is a connection-based protocol and UDP is connectionless. While TCP is more reliable, it transfers data more slowly. UDP is less reliable but works more quickly
Sir, your comment is wrong reagrding TCP and UDP. TCP is reliable but slower. UDP is fast but not reliable.
Thank you Micheal for the observations. I do appreciate. Yes, you are right. 👍
But in terms of scanning TCP scans are more faster compared to UDP scans. You can check this link as reference: www.varonis.com/blog/port-scanning-techniques#:~:text=UDP%20scans%20are%20slower%20than,specific%20payload%20to%20the%20target.
Thank you for sharing.. really helpful
You are most welcome.
I'm interested in the classes, can you send me the link please. Thanks alot
Hi. Thanks for your feedback. You can reach me via email: seyiakilude@yahoo.com
You have a Good knowledge you are giving out but you have to make your writing bolder and in Good Graphic so thos channel can move to a greater level. Thank you sir for all your so
Thank you for the feedback
How can I contact you directly sir ,
wow ---- may God bless your parents
Amen. Thank you 😊
Thanks alot for this
It's my pleasure sir ❤️
wtf is that writing
😂😂. Will keep getting better at it
very powerful tutorials. Please can u give this video a timeline so that newbies can know how you transition from one topic to the next?