• My Account
  • Shop
  • Cart

Cyber Bunee

  • Home
  • News
    • artificial intelligence
    • cyber-security
    • hacking attacks
    • software dev
    • automation
    • certifications
    • Videos
      • Youtube Videos
    • Resources

    Youtube Videos

    ALL of the RMF & THINGS
    YouTube Video UExMOG9nb2F6TDVMajg2UVVIRmZGX21laTVNYWlDb09aMS41NkI0NEY2RDEwNTU3Q0M2 In this RMF security concept video, we are discussing what POA&Ms are. POA&M stands for Plan of Action & Milestones and is generally an administrative task for tracking system vulnerabilities and shortcomings in regards to DoD Compliance. 

For more info on RMF Security concepts visit https://www.cyberbunee.com/resources

What are POA&Ms? - RMF Security Concepts

What are POA&Ms RMF Security Concepts,RMF Security Concepts,What are POA&Ms,POAM RMF Security Concepts,What are POAM RMF Security,What are POAM RMF,what are poa&ms rmf security concepts,risk management framework,rmf,cyber security,rmf security concepts,poam rmf security concepts,what are poam rmf security,what are poam rmf,risk management,learn japanese,cyber security course,cyber security tutorial,cyber security career,cyber security tutorial for beginnerss
    Subscribe
    What are POA&Ms? - RMF Security Concepts
    June 14, 2023 8:34 pm
    In this RMF security concept video, we are discussing what POA&Ms are. POA&M stands for Plan of Action & Milestones and is generally an administrative task for tracking system vulnerabilities and shortcomings in regards to DoD Compliance. 

For more info on RMF Security concepts visit https://www.cyberbunee.com/resources

What are POA&Ms? - RMF Security Concepts

What are POA&Ms RMF Security Concepts,RMF Security Concepts,What are POA&Ms,POAM RMF Security Concepts,What are POAM RMF Security,What are POAM RMF,what are poa&ms rmf security concepts,risk management framework,rmf,cyber security,rmf security concepts,poam rmf security concepts,what are poam rmf security,what are poam rmf,risk management,learn japanese,cyber security course,cyber security tutorial,cyber security career,cyber security tutorial for beginnerss
    What are POA&Ms? - RMF Security Concepts
    YouTube Video UExMOG9nb2F6TDVMajg2UVVIRmZGX21laTVNYWlDb09aMS41NkI0NEY2RDEwNTU3Q0M2
    Subscribe
    WHAT IS...?
    This week I answer the burning question, "What is RMF?"
For those interested in starting a career in Cyber-Security and would like more information on what exactly RMF entails. Always keep educating yourself on your goals and interests. For more information on RMF visit the links below:

https://csrc.nist.gov/projects/risk-management/risk-management-framework-(rmf)-overview

https://csrc.nist.gov/publications/detail/sp/800-53/rev-4/final

Visit my blog at https://www.buneeflacs.com

Follow me here: 
IG: https://www.instagram.com/buneeflacs
Tw: https://www.twitter.com/buneeflacs

Hacking books I recommend that can help with OSCP:

Penetration Testing
https://amzn.to/2SraKax

Hacker Playbook series (Books 1-3):
https://amzn.to/2Rm0qUc
https://amzn.to/2LJIGgn
https://amzn.to/2RoQ0Dm

The Web Application Hacker's Handbook 2
https://amzn.to/2BR1rdc

For more resources handpicked by me:
https://www.buneeflacs.com/resources

Like, Share and Subscribe! THANK YOU!! #cybersecurity #oscp #ITcertification
    What is RMF? (Risk Management Framework)
    YouTube Video UExMOG9nb2F6TDVMZ1pBVnNUM3lEN3JvdUIza3BDd2Jqby41NkI0NEY2RDEwNTU3Q0M2
    Here is a video on what exactly are STIGs and the process of "STIG'ing". Last week I ranted about STIGs and I believe there were more than a few that didn't understand the reference so I break it all down here. 

Also, I announce the Tribe of Hackers: Red Team book giveaway. 

Make sure you are following The Cyber Mentor here: 
https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw

00:01   STIG intro
01:39   Tribe of Hackers Book Winner
02:30   Monthly Book Giveaway
03:02   What are STIGs?
04:40   Cyber.mil website
05:10   STIGs and viewer location
05:52   STIG Viewer
06:40   Compilation Library
07:37   Opening STIG viewer and some STIGs
09:41   The STIG viewer interface
09:59   Two ways to do this stuff
12:02   ckl files
12:48   Status codes - NR, NF, O, NA
15:08   Reporting and circle graphs
16:30   Unhackable?
17:04   CAT I's, II's & III's
17:58   Export that ckl file
18:48   Careful with making changes
19:32   Not all STIGs are feasible

Visit my blog at https://www.buneeflacs.com

Follow me here: 
IG: https://www.instagram.com/buneeflacs
Tw: https://www.twitter.com/buneeflacs

Hacking books I recommend that can help with OSCP:

Penetration Testing
https://amzn.to/2SraKax

Hacker Playbook series (Books 1-3):
https://amzn.to/2Rm0qUc
https://amzn.to/2LJIGgn
https://amzn.to/2RoQ0Dm

The Web Application Hacker's Handbook 2
https://amzn.to/2BR1rdc

For more resources handpicked by me:
https://www.buneeflacs.com/resources

Like, Share and Subscribe! THANK YOU!!

#STIG #DISA #Informationassurance
    Intro to STIG's & STIG Viewer
    YouTube Video UExMOG9nb2F6TDVMZ1pBVnNUM3lEN3JvdUIza3BDd2Jqby4yODlGNEE0NkRGMEEzMEQy
    Happy New Year! It's a new decade! In this video I explain MFA & 2FA and why you should implement it immediately. 

For a list of sites that work with Yubikey: https://www.yubico.com/setup

00:00    Privacy Book contest winner
00:46    What is MFA & 2FA
01:34    Why is it a solution?
02:40    Answer to weak passwords
03:09    MFA example - Yubikey
04:20    2FA 
04:33    You may have already noticed
06:21    DIY
07:12    How I use my Yubikey w/LastPass
09:08    Setup is painless
09:53    Google auth
10:57    BACKUP and RECOVERY!
11:25    Disaster is imminent
12:25    Recap
13:48    Security is inconvenient
16:02    Monthly Book Giveaway
16:27    The next Book Giveaway

For your own copies of the Privacy books given away in this video:
Extreme Privacy - https://amzn.to/37osbji
Hiding From the Internet - https://amzn.to/35bJnXU

Visit my blog at https://www.buneeflacs.com

Follow me here: 
IG: https://www.instagram.com/buneeflacs
Tw: https://www.twitter.com/buneeflacs

For more resources handpicked by me:
https://www.buneeflacs.com/resources

Like, Share and Subscribe! THANK YOU!!

Bush Week by Nihilore https://soundcloud.com/nihilore Creative Commons — Attribution 3.0 Unported — CC BY 3.0 http://creativecommons.org/licenses/by/3.0/ Music promoted by Audio Library https://youtu.be/UroytzJSVx4

#mfa #2fa #multifactorauthentication
    What is MFA & 2FA?
    YouTube Video UExMOG9nb2F6TDVMZ1pBVnNUM3lEN3JvdUIza3BDd2Jqby4wMTcyMDhGQUE4NTIzM0Y5
    Visit my blog at https://www.buneeflacs.com

Follow me here: 
FB: https://www.facebook.com/buneeflacs
IG: https://www.instagram.com/buneeflacs
Tw: https://www.twitter.com/buneeflacs
Twitch: https://www.twitch.tv/buneeflacs

00:18    Operator Handbook Giveaway
01:21    Next Book giveaway
01:50    Intro to video
03:15    Cyber.mil website
03:33    Pull down the STIG/Viewer refresher
03:55    Searching for specific STIGs
06:55    STIG'ing my personal firewall
07:36    Opening and creating a checklist
09:27    And Go!
13:33    Not Applicable vs Open
16:26    DOD STIGs are usually overkill

For more resources handpicked by me:
https://www.buneeflacs.com/resources

Like, Share and Subscribe! THANK YOU!!

#DISA #STIG #CyberSecurity
    STIG'ing a Firewall!
    YouTube Video UExMOG9nb2F6TDVMZ1pBVnNUM3lEN3JvdUIza3BDd2Jqby41MjE1MkI0OTQ2QzJGNzNG
    What is 2-Factor Authentication and how is it beneficial to end users? Watch this quick short to find out. 

#2fa #2factorauthentication #multilevelsecurity
    What is 2-Factor Authentication?
    YouTube Video UExMOG9nb2F6TDVMZ1pBVnNUM3lEN3JvdUIza3BDd2Jqby4wOTA3OTZBNzVEMTUzOTMy
    Watch this short to learn about malicious links in emails and how to protect yourself.
    Malicious Links
    YouTube Video UExMOG9nb2F6TDVMZ1pBVnNUM3lEN3JvdUIza3BDd2Jqby4xMkVGQjNCMUM1N0RFNEUx
    Brief explanation of what POA&Ms are in RMF and DOD cyber security management. 

For more info visit https://www.cyberbunee.com
    What are POA&M's? - RMF Security Concepts
    YouTube Video UExMOG9nb2F6TDVMZ1pBVnNUM3lEN3JvdUIza3BDd2Jqby41MzJCQjBCNDIyRkJDN0VD
    Security Through Obscurity - Cyber Security Concepts

This short details a concept known as security through obscurity. The focus is attackers can not attack what they don't know about or can even find. This does provide a level of protection however, it should not be solely relied upon in lieu of other best practices of security. 

#cybersecurity #cybersecurityfundamentals #cybersecuritytrainingforbeginners
    Security Through Obscurity - Cyber Security Concepts
    YouTube Video UExMOG9nb2F6TDVMZ1pBVnNUM3lEN3JvdUIza3BDd2Jqby5DQUNERDQ2NkIzRUQxNTY1
    Metasploit is the one of the most utilized ethical hacking tools available. Visit metasploit.com for more information.

Visit the blog at https://www.cyberbunee.com

Follow me here: 
IG: https://www.instagram.com/_cyberbunee_

Like, Share and Subscribe! THANK YOU!!

I've partnered with an amazing tech platform called Pluralsight where you can research and find all types of information and resources on everything Tech! Click the link here to try a free trial!    https://rb.gy/my8r4
    Metasploit Hacking Tool
    YouTube Video UExMOG9nb2F6TDVMZ1pBVnNUM3lEN3JvdUIza3BDd2Jqby45NDk1REZENzhEMzU5MDQz
    Load More... Subscribe
    INTERVIEWS
    In this video I interview ActiveCyber's Director of Offensive Security & Elite Ethical Hacker Joe Brinkley, more commonly known as The Blind Hacker. I asked him to share some of his insights on the OSCP exam, how he got his start in cyber and offensive security and also about his weekly Twitch stream. Without hesitation he agreed and we met a few weeks later to sit down and share this info with you guys!

Make sure to follow The Blind Hacker on Twitter AND Twitch!

https://twitter.com/TheBlindHacker
https://www.twitch.tv/theblindhacker

If you or your company is in need of Offensive Security or Penetration Testing services make sure to visit:

https://www.activecyber.us/

00:31   Blind Hacker Intro
01:13   Who is the Blind Hacker?
03:45   What do you specialize in?
04:56   Where'd you get the idea to Twitch stream?
05:51   Advice for new Pen Testers?
08:30   What's a common vulnerability that shouldn't be?
09:27   When did you know this was your career path?
10:52   The Blind Hacker's twitch and twitter link info
11:25   Director of Offensive Security at ActiveCyber
11:51   Paradigm change of Offensive Security
12:28   The Deep Dark Web
13:45   How do I pass OSCP?
14:09   ENUMERATE, then ENUMERATE and then RECON
17:11   Ok, you achieved OSCP status. Now what?

Visit my blog at https://www.buneeflacs.com

Follow me here: 
IG: https://www.instagram.com/buneeflacs
Tw: https://www.twitter.com/buneeflacs

Hacking books I recommend that can help with OSCP:

Penetration Testing
https://amzn.to/2SraKax

Hacker Playbook series (Books 1-3):
https://amzn.to/2Rm0qUc
https://amzn.to/2LJIGgn
https://amzn.to/2RoQ0Dm

The Web Application Hacker's Handbook 2
https://amzn.to/2BR1rdc

For more resources handpicked by me:
https://www.buneeflacs.com/resources

Like, Share and Subscribe! THANK YOU!!
    Interview with The Blind Hacker
    YouTube Video UExMOG9nb2F6TDVMallfM0VFa2hEUWlCemZyY29GVktYRS41NkI0NEY2RDEwNTU3Q0M2
    In this edition of "Interview with a Hacker" I sit down with BSD Bandit to discuss how he got started in Infosec, his tips and tricks to pass the OSCP and also a few other things he's working on such as SecBSD and his affiliation with Mental Health Hackers. Don't forget to enter your chance to win the free OSINT book giveaway!! 

00:00    Who is the BSD Bandit?
01:17    What's your current field/specialty?
02:13    BSD Bandit's advice on how to get into infosec
02:46    WIreless hacking
03:16    OSWP - OSCP - OSCE - No order to it
04:16    How can I pass OSCP?
05:02    To Metasploit or not to Metasploit
05:51    BSD's career highlights
06:41    Passion vs Compensation?
08:32    Any career Regrets?
09:49    Gratitude, Positivity and spreading Love through Twitter
12:53    What is Mental Health Hackers?
14:22    How to connect with the BSD Bandit
15:04    What is SecBSD?
16:14    OSINT Book GIVEAWAY!!! 

Follow BSD Bandit's friends and colleagues here:
@HackersHealth - https://www.mentalhealthhackers.org/
@SecBSD - https://www.secbsd.org/
@InfoSystir
@mrgaphy
@irongeek_adc
@GrumpyHackers
@H3artbl33d

Visit my blog at https://www.buneeflacs.com

Follow me here: 
IG: https://www.instagram.com/buneeflacs
Tw: https://www.twitter.com/buneeflacs

Hacking books I recommend that can help with OSCP:

Penetration Testing
https://amzn.to/2SraKax

Hacker Playbook series (Books 1-3):
https://amzn.to/2Rm0qUc
https://amzn.to/2LJIGgn
https://amzn.to/2RoQ0Dm

The Web Application Hacker's Handbook 2
https://amzn.to/2BR1rdc

For more resources handpicked by me:
https://www.buneeflacs.com/resources

Like, Share and Subscribe! THANK YOU!!

#bsdbandit #osint #interviewwithahacker
    Interview with BSD Bandit
    YouTube Video UExMOG9nb2F6TDVMallfM0VFa2hEUWlCemZyY29GVktYRS4yODlGNEE0NkRGMEEzMEQy
    In this edition of "Interview with a Hacker", I talk to Cassie Cage aka Akolsuoicauqol (as she's known on Twitter) to talk about her start in Infosec, her non-profit organization Gate Breachers and to share some tips and advice on breaking into Cyber-Security. Also, as usual, don't forget to enter another free book giveaway for the "Defensive Security Handbook"!! 

00:00    OSINT BOOK GIVEAWAY from last video
00:40    Introduction
01:05    Cassie Cage tag name
01:46    What's your current Infosec specialty
02:36    What are the highlights of your career so far?
03:19    Any regrets of your career?
03:41    Failure to comply
05:20    What certs do you have?
06:35    What is GateBreachers?
08:42    Break the Gate Keepers culture
09:00    Cassies "Why"
11:31    Any words of advice for inspiration?
13:23    Cassies Book recommendation and next Book give away!

Follow Cassie and GateBreachers at 
@akolsuoicauqol
@gatebreachers

Visit my blog at https://www.buneeflacs.com

Follow me here: 
IG: https://www.instagram.com/buneeflacs
Tw: https://www.twitter.com/buneeflacs

Hacking books I recommend that can help with OSCP:

Penetration Testing
https://amzn.to/2SraKax

Hacker Playbook series (Books 1-3):
https://amzn.to/2Rm0qUc
https://amzn.to/2LJIGgn
https://amzn.to/2RoQ0Dm

The Web Application Hacker's Handbook 2
https://amzn.to/2BR1rdc

For more resources handpicked by me:
https://www.buneeflacs.com/resources

Like, Share and Subscribe! THANK YOU!!

#defensivesecurity #womenintech #womenincybersecurity

Bush Week by Nihilore https://soundcloud.com/nihilore Creative Commons — Attribution 3.0 Unported — CC BY 3.0 http://creativecommons.org/licenses/by/3.0/ Music promoted by Audio Library https://youtu.be/UroytzJSVx4
    Interview with Cassie Cage
    YouTube Video UExMOG9nb2F6TDVMallfM0VFa2hEUWlCemZyY29GVktYRS4wMTcyMDhGQUE4NTIzM0Y5
    3 Years after the first sit down from the awkward AF "Interview with a Hacker" series, Bunee Flacs and his podcast host King Arthur sit and speak with the BSD Bandit about the Future of Tech!! 
We talk about everything from AI, to NFT's and much more!

Watch the first interview with BSD Bandit here: https://youtu.be/Q-zSlKRqQY8

Follow The Figuring Shxt Out Podcast here: https://www.youtube.com/@UCa6i0kNsy2DXoNeRGfin_uw 

00:00 - Intro
02:54 - Who is BSD Bandit?
04:43 - Figuring Shxt Out Moment
06:12 - What is BSD Bandit’s field in tech?
08:08 - People losing jobs in Tech
09:33 - Jobs vs Careers
10:53 - Great Reset
13:24 - TikTok is taking over your brain
15:12 - What would the Tech world look like in 10 years?
17:49 - Robotic Future
21:03 - NFTs
23:39 - Renting House Scam
26:11 - Art and Fashion
27:24 - What is new in the security world? How to be safe from scams and cyber-hacks?
29:40 - Security concerns with debit card
35:51 - Where will the society head of all unwanted jobs are automated by Robotics and AI?
37:38 - What is Mastodon?
40:23 - Meditation
43:13 - Cyber Security career path
47:02 - Mental Energy
51:20 - If you’re in Fast Food lane….
53:11 - Avoid these people
57:24 - The Independent Route

Thanks for your time and as always LIKE, SHARE and SUBSCRIBE!
    BSD Bandit and the Future Of Tech!
    YouTube Video UExMOG9nb2F6TDVMallfM0VFa2hEUWlCemZyY29GVktYRS41MjE1MkI0OTQ2QzJGNzNG
    Subscribe
    HOW TO:
    This week I reveal the winner of the TRIBE OF HACKERS book giveaway! Also, I begin a new project to segment my home network into two: One for my everyday computers and devices and another for my IoT gizmos. I haven't been the best practitioner of security in my home life so I'm changing my tune now! 

Here is the link for the guide to segmentation that I am using:
https://www.pcper.com/reviews/General-Tech/Steve-Gibsons-Three-Router-Solution-IOT-Insecurity

TRIBE OF HACKERS:
https://amzn.to/2HRIpJQ

Visit my blog at https://www.buneeflacs.com

Follow me here: 
IG: https://www.instagram.com/buneeflacs
Tw: https://www.twitter.com/buneeflacs

Hacking books I recommend that can help with OSCP:

Penetration Testing
https://amzn.to/2SraKax

Hacker Playbook series (Books 1-3):
https://amzn.to/2Rm0qUc
https://amzn.to/2LJIGgn
https://amzn.to/2RoQ0Dm

The Web Application Hacker's Handbook 2
https://amzn.to/2BR1rdc

For more resources handpicked by me:
https://www.buneeflacs.com/resources

Like, Share and Subscribe! THANK YOU!!

#iot #homenetwork #networksecurity
    IoT Home Network Segmentation Part One
    YouTube Video UExMOG9nb2F6TDVMZzhMSTRFMmZsS0Y0d202TWpYR3B2Wi41NkI0NEY2RDEwNTU3Q0M2
    I'm doing another free IT/Cyber Security book giveaway! Go to www.buneeflacs.com/resources and choose a book from the list, Like, Share and COMMENT #freebook and you'll be in the drawing for next week!

This is part two of my IoT Home Network Segmentation series. I have segmented my three networks and have a basic model so far. Later on I will be going more in depth with firewalls, possible installing a SIEM and beginning to monitor and log traffic. Thank you for watching!

Visit my blog at https://www.buneeflacs.com

Follow me here: 
IG: https://www.instagram.com/buneeflacs
Tw: https://www.twitter.com/buneeflacs

Hacking books I recommend that can help with OSCP:

Penetration Testing
https://amzn.to/2SraKax

Hacker Playbook series (Books 1-3):
https://amzn.to/2Rm0qUc
https://amzn.to/2LJIGgn
https://amzn.to/2RoQ0Dm

The Web Application Hacker's Handbook 2
https://amzn.to/2BR1rdc

For more resources handpicked by me:
https://www.buneeflacs.com/resources

Like, Share and Subscribe! THANK YOU!!

#iot #homenetwork #networksecurity
    IoT Home Network Segmentation Part Two
    YouTube Video UExMOG9nb2F6TDVMZzhMSTRFMmZsS0Y0d202TWpYR3B2Wi4yODlGNEE0NkRGMEEzMEQy
    Just a quick tutorial on using LastPass password manager. This is for people who had questions on using a password manager like LastPass. I recently and finally started to utilize this service and I don't think I can ever look back. 

01:42 The LastPass interface
02:11 Create LastPass account
03:13 Install the browser extension
04:08 Don't EVER check these boxes
04:55 LastPass interface some more
07:34 Pop ups
08:05 The Vault
08:16 ALWAYS check these BOXES
09:39 Re-authenticate ME
10:30 LastPass complex password creator
11:55 pw creator step by step
13:23  Re-authenticate and get used to it
15:05 Registering a new site
17:38 URL login issues

For more information on LastPass visit www.lastpass.com

Visit my blog at https://www.buneeflacs.com
 
Follow me here: 
IG: https://www.instagram.com/buneeflacs
Tw: https://www.twitter.com/buneeflacs

Hacking books I recommend that can help with OSCP:

Penetration Testing
https://amzn.to/2SraKax

Hacker Playbook series (Books 1-3):
https://amzn.to/2Rm0qUc
https://amzn.to/2LJIGgn
https://amzn.to/2RoQ0Dm

The Web Application Hacker's Handbook 2
https://amzn.to/2BR1rdc

For more resources handpicked by me:
https://www.buneeflacs.com/resources

Like, Share and Subscribe! THANK YOU!!

#cybersecurity #passwordmanager #lastpass
    How to setup LastPass Password Manager
    YouTube Video UExMOG9nb2F6TDVMZzhMSTRFMmZsS0Y0d202TWpYR3B2Wi4wMTcyMDhGQUE4NTIzM0Y5
    Please forgive the video quality, this is ripped from my first ever live Twitch stream from this past weekend. I started a Twitch channel and will be periodically going live! I will announce when I do so, please hit the Twitch channel at https://www.twitch.tv/buneeflacs if you care! 

As for this live stream, I wanted to upgrade my Alienware Aurora R6 from 16gb to 64gb of RAM. I never opened the case before and didn't double check what was already in place before purchase RAM. Anyway, we made it work! 

Also, at 16:42 I announce the winner of the Tribe of Hackers Red Team book giveaway! So click the time stamp if that's what you want to see!  

And as a side note, if you're interested in looking at what slots are in use on your Windows PC, open up Task Manager, hit the performance tab and click the memory section on the left and towards the bottom right it will tell you how many slots you have available and which ones are in use... I did NOT know this before opening my case smh.. 

Visit my blog at https://www.buneeflacs.com

Follow me here: 
IG: https://www.instagram.com/buneeflacs
Tw: https://www.twitter.com/buneeflacs

Hacking books I recommend that can help with OSCP:

Penetration Testing
https://amzn.to/2SraKax

Hacker Playbook series (Books 1-3):
https://amzn.to/2Rm0qUc
https://amzn.to/2LJIGgn
https://amzn.to/2RoQ0Dm

The Web Application Hacker's Handbook 2
https://amzn.to/2BR1rdc

For more resources handpicked by me:
https://www.buneeflacs.com/resources

Like, Share and Subscribe! THANK YOU!!

#twitch #tribeofhackers #alienware
    Alienware RAM Upgrade & Tribe of Hackers: Red Team Winner!
    YouTube Video UExMOG9nb2F6TDVMZzhMSTRFMmZsS0Y0d202TWpYR3B2Wi41MjE1MkI0OTQ2QzJGNzNG
    In this video I go into much more depth with my personal pfsense firewall setup, talk about why you would want a home firewall and show how to block sites/networks on your firewall! Itinerary below:

pfsense: https://www.pfsense.org/
Protectli: https://amzn.to/33iBPnc
Operator Handbook: https://amzn.to/3kaQpUK

00:00 - Cyber Security Book Giveaway
01:10 - Operator Handbook Giveaway
01:40 - Intro
02:20 - Why would you want a personal firewall?
04:03 - What are the costs?
05:05 - pfsense software
06:32 - Protectli hardware
07:28 - Prep pfsense on a USB bootable
07:57 - Device placement on your network
08:41 - Boot into the pfsense installation
09:42 - WAN & LAN configuration
10:42 - Webconfigurator & pfsense conf steps
11:45 - RFC 1918 & Bogon
14:42 - My pfsense
15:14 - Package Manager
15:55 - Firewall Rules and blocking sites

Visit my blog at https://www.buneeflacs.com

Follow me here: 
IG: https://www.instagram.com/buneeflacs
Tw: https://www.twitter.com/buneeflacs
FB: https://www.facebook.com/buneeflacs

For more resources handpicked by me:
https://www.buneeflacs.com/resources

Like, Share and Subscribe! THANK YOU!!
#pfsense #protectli #firewall
    Configure pfsense w/Protectli
    YouTube Video UExMOG9nb2F6TDVMZzhMSTRFMmZsS0Y0d202TWpYR3B2Wi4wOTA3OTZBNzVEMTUzOTMy
    In this video we are discussing FIVE tips to help you survive a cybersecurity audit within the DoD. These tips are more geared towards federal agencies, military environments and Department of Defense. 

01:31 - Know Your Stuff
03:58 - Know The Audit Type
06:46 - Perform Regular Assessments
09:05 - Conduct Continuous Monitoring
10:44 - Update Documents & Policies

Visit the blog at https://www.cyberbunee.com

Follow me here: 
IG: https://www.instagram.com/_cyberbunee_

Like, Share and Subscribe! THANK YOU!!

I've partnered with an amazing tech platform called Pluralsight where you can research and find all types of information and resources on everything Tech! Click the link here to try a free trial!    https://rb.gy/my8r4


How To Survive a Cyber Security IT Audit

cyber bunee,how to survive a cyber security audit,how to survive an it audit,How To Survive a Cyber Security IT Audit,urvive a Cyber Security,Cyber Security IT Audit,cyber security,cybersecurity,cyber security career,audit,the plain bagel,how to invest in real estate,how to survive a cyber security it audit,cyber security training for beginners,urvive a cyber security,cyber security course,cyber security tutorial,cyber security tutorial for beginners
    How To Survive a Cyber Security IT Audit
    YouTube Video UExMOG9nb2F6TDVMZzhMSTRFMmZsS0Y0d202TWpYR3B2Wi4xMkVGQjNCMUM1N0RFNEUx
    The #1 Rule of what NOT TO DO in an IT/Cyber Security Audit!! 

Visit the blog at https://www.cyberbunee.com

Follow me here: 
IG: https://www.instagram.com/_cyberbunee_

Like, Share and Subscribe! THANK YOU!!

I've partnered with an amazing tech platform called Pluralsight where you can research and find all types of information and resources on everything Tech! Click the link here to try a free trial!    https://rb.gy/my8r4
    NEVER Do This in a Cyber Security Audit
    YouTube Video UExMOG9nb2F6TDVMZzhMSTRFMmZsS0Y0d202TWpYR3B2Wi41MzJCQjBCNDIyRkJDN0VD
    Subscribe
    • Home
    • News
      • artificial intelligence
      • cyber-security
      • hacking attacks
      • software dev
      • automation
      • certifications
    • Videos
      • Youtube Videos
    • Resources

    Follow Us

    Popular Videos

    Newsletter

    Popular News

    • 1

      And We’re Back!…

    • 2

      New Magecart Campaign: Multiple Cybercrime Groups Operating Simultaneously

    • 3

      Major UK Organizations Suffer Data Breaches: Boots, British Airways, and the BBC Among Those Affected

    • 4

      Verizon Report: Human Error a Top Cause of Cybersecurity Incidents in 2019

    • 5

      Tech Firm Mitigates Ransomware Attack: Tips for Protection

    Fellow Sponsors

    Tags

    attacks break into cyber coinbase crypto hacking how to ransomware updates
    (▀̿Ĺ̯▀̿ ̿) Copyright , All Rights Reserved
    Website courtesy of Lucid Perspective