Category: Information Security

Configuring Suricata as an Intrusion Prevention System (IPS)

Learn how to configure Suricata IPS to detect and prevent suspicious activities on your network with this step-by-step tutorial!

Nicholas Xuan Nguyen Avatar Nicholas Xuan Nguyen

8 min. read

Getting Started with Lynis Security Auditing

Learn how to use the free Lynis auditing tool to scan your systems for vulnerabilities and build tons of useful reports.

Michael Thanh Avatar Michael Thanh

10 min. read

How to Track Important Windows Security Events with PowerShell

Learn how Windows security events are stored, how to manage audit policies and how to build a helpful PowerShell tool to track down security events.

Justin Sylvester Avatar Justin Sylvester

12 min. read

How to Install and Set Up an AWS CloudWatch Windows Agent

CloudWatch is an AWS service that centrally manages all of logs. Learn how to set up the CloudWatch agent for Windows in this tutorial.

Justin Sylvester Avatar Justin Sylvester

9 min. read

Installing Nessus and Getting Started with Kali (Jumpstart Guide)

Install Nessus on Kali Linux, configure a network vulnerability scan, and learn to scan the local Kali Linux installation!

Justin Sylvester Avatar Justin Sylvester

11 min. read

Subscribe to Stay in Touch

Never miss out on your favorite ATA posts and our latest announcements!