Common Types Of Network Security Vulnerabilities | PurpleSec

Поділитися
Вставка
  • Опубліковано 8 вер 2024

КОМЕНТАРІ • 41

  • @PurpleSec
    @PurpleSec  4 роки тому +6

    👋 If you're new here, then consider subscribing to our weekly newsletter featuring the top cybersecurity minds in the industry:
    www.linkedin.com/newsletters/ai-cybersecurity-insights-7058517055238504448/

  • @chatsifieds
    @chatsifieds 3 місяці тому +2

    good lesson, thank you

  • @galladite4924
    @galladite4924 3 роки тому +6

    Thank you so much! This really helped with my revision :)

    • @PurpleSec
      @PurpleSec  3 роки тому

      Glad to hear this was useful!

  • @jayneengelgau8452
    @jayneengelgau8452 7 місяців тому +1

    Thank you for making this video! It's exactly what I was looking for.

    • @PurpleSec
      @PurpleSec  7 місяців тому

      Glad you found this to be valuable’

  • @rohan8758
    @rohan8758 2 роки тому +4

    Awesome content & explanation, on you tube , Thanks sir, Keep it up

    • @PurpleSec
      @PurpleSec  2 роки тому

      Really do appreciate the feedback. More to come soon! Let us know if there are any topics you’d like us to focus on in the future.
      - Jason

    • @rohan8758
      @rohan8758 2 роки тому

      Sure sir

  • @jmcybersecurity
    @jmcybersecurity Рік тому +2

    Very well laid out. Interesting.

    • @PurpleSec
      @PurpleSec  Рік тому

      Glad you enjoyed it!
      - Jason

  • @RM-gm7lu
    @RM-gm7lu 2 роки тому +2

    Really good presentation! Thanks for sharing

    • @PurpleSec
      @PurpleSec  2 роки тому

      Thrilled to hear this was useful for you!
      - Jason

  • @chrisuk1000
    @chrisuk1000 2 роки тому +1

    Very clear and concise information, very helpful thanks

    • @PurpleSec
      @PurpleSec  2 роки тому

      Glad this was useful for you!
      - Jason

  • @TheodoreRavindranath
    @TheodoreRavindranath 3 роки тому +5

    Please boost the volume up in future videos. Thanks!

    • @PurpleSec
      @PurpleSec  3 роки тому

      Will do. Appreciate the feedback!
      - Jason

  • @biyafaysalfaisal6635
    @biyafaysalfaisal6635 3 роки тому +3

    Very Informative video

    • @PurpleSec
      @PurpleSec  3 роки тому

      Thrilled to hear this was a valuable resource!
      - Jason

  • @CarolinaCowgirl951
    @CarolinaCowgirl951 Рік тому +1

    This is very helpful; thank you!

    • @PurpleSec
      @PurpleSec  Рік тому

      Glad you found value in this!
      - Jason

  • @llereoj_Seralom
    @llereoj_Seralom 3 роки тому +2

    salamat bro

    • @PurpleSec
      @PurpleSec  3 роки тому

      Glad this was helpful!
      - Jason

  • @simonwalker8170
    @simonwalker8170 Рік тому +2

    at 19:42 he should say "The longer a password is USED ..."

  • @jacquelinemacdonald2036
    @jacquelinemacdonald2036 2 роки тому +1

    Thank you for posting this - it's a great video! Well laid out and explained. I would love to use this in my Intro to Computers class, but it's a little too long all on its own. For layout reasons, it would be great to be able to cut out each section to embed it in the course. But UA-cam only allows an extraction of a minute of video at a time and our LMS won't render the HTML code with a start and stop time correctly : ( I could just give them the time stamps to start and stop at but these are people just learning how to use computers so I'm really trying to keep it simple. Any recommendations? I could just screen record the sections and cite you with the entire video link beneath the clip, but I would like your permission before doing that (if there's not a better way)!
    -
    I also had a question about Phishing vs. Spear Phishing. Does Phishing become Spear Phishing because the email was only sent to Amy in your example or because she actually has a Bank of America account or both?
    Thanks again!

    • @PurpleSec
      @PurpleSec  2 роки тому +1

      Hey Jacqueline! Shoot me an email with this request. I have the slides available as well and we can get your class set up!
      Jason@purplesec.us
      Thanks!
      -Jason

  • @CS-wi3ff
    @CS-wi3ff 3 роки тому +2

    what are the skills needed to be a blue teamer ? i want to start from the scratch i dont know where to start ? please help

    • @PurpleSec
      @PurpleSec  3 роки тому +2

      Start reading books and consuming UA-cam videos. I would also recommend getting familiar with Linux and the command console. Be familiar with PowerShell and Python as well. In terms of certifications, the Certified Enterprise Defender (GCED) is solid. Wish you the best of luck!
      - Jason

    • @CS-wi3ff
      @CS-wi3ff 3 роки тому +1

      @@PurpleSec thank you brother

    • @PurpleSec
      @PurpleSec  3 роки тому +2

      @@CS-wi3ff anytime!
      - Jason

  • @Vamos_c
    @Vamos_c 5 місяців тому

    Vulnerabilities meant weakpoints and attackers can exploit them so attack types are malwares spoofing ddos social engineering
    Are we taking those attacks also as vulnerabilities
    Please someone explain me
    It means a lot🙏❤️.

    • @sanarizwan5174
      @sanarizwan5174 2 місяці тому

      Attacks and threats are actions to compromise the weaknesses or flaws in any system. Those flaws or weaknesses are the Vulnerabilities, I am at a beginner's level but this is my understanding. I hope it help

  • @beverlysantarelli650
    @beverlysantarelli650 3 роки тому +3

    Good content but slow down. You talk too fast

    • @PurpleSec
      @PurpleSec  3 роки тому

      Appreciate the feedback, Beverly!
      - Jason

    • @margaretschachte489
      @margaretschachte489 3 роки тому +1

      That's funny, I literally just set the video to 1.25x speed because it was too slow. Just shows that everyone absorbs information differently!

    • @PurpleSec
      @PurpleSec  3 роки тому +1

      @@margaretschachte489 I like looking at it that way vs assuming "everyone's a critic" :)
      - Jason