Avoid Kerberoasting Attacks with a Secure Service Desk

Learn how a Kerberoasting attack works, its implications, and best practices to protect yourself. Protect yourself further with a secure service desk.

Using Pageant Putty Agent to Unleash Your SSH Key Use

Learn how to streamline and unleash your SSH key use with the Pageant Putty agent in this ATA Learning tutorial!

Master In-Depth Security Audits with OpenSCAP

Learn how to perform in-depth security audits on your server with OpenSCAP and SCAP Security Guide (SSG) in this step-by-step tutorial!

Passwork: A Modern Password Manager for 2022

Passwork offers a modern and flexible password management solution for enterprises in a secure self-hosted solution!

A Weak Password List Says Hack Me: Protect Yourself

Learn how easy cracking an NTLM password is and how to avoid hacked accounts by using a weak password list to ban insecure passwords!

How to Install and Configure the CSF Firewall for Linux

Learn how to install and configure the CSF firewall for Linux and secure your server in this step-by-step tutorial!

Configuring Suricata as an Intrusion Prevention System (IPS)

Learn how to configure Suricata IPS to detect and prevent suspicious activities on your network with this step-by-step tutorial!

Getting Started with Lynis Security Auditing

Learn how to use the free Lynis auditing tool to scan your systems for vulnerabilities and build tons of useful reports.

How to Track Important Windows Security Events with PowerShell

Learn how Windows security events are stored, how to manage audit policies and how to build a helpful PowerShell tool to track down security events.

How to Install and Set Up an AWS CloudWatch Windows Agent

CloudWatch is an AWS service that centrally manages all of logs. Learn how to set up the CloudWatch agent for Windows in this tutorial.

Installing Nessus and Getting Started with Kali (Jumpstart Guide)

Install Nessus on Kali Linux, configure a network vulnerability scan, and learn to scan the local Kali Linux installation!