Staying Certified with the Updated NCSC Cyber Essentials

Learn how to stay secure and certified with the newly updated NCSC Cyber Essentials certification in this ATA Learning article!

How to Test Your Defenses with Practical Brute Force Attacks

Learn a variety of techniques to test and defend against malicious brute force attacks in this ATA Learning tutorial!

Stop the Confusion: Keep End Users Secure with Strong Passwords

Utilize the best practices of 2022 to create strong passwords and policies with recently updated NIST guidelines and enforce them with Specops Password Policy!

How To Use Netcat and Level-Up Your Networking Skills!

Learn how to use Netcat to enhance and level-up your networking and debugging skills with this powerful networking utility!

Avoid Kerberoasting Attacks with a Secure Service Desk

Learn how a Kerberoasting attack works, its implications, and best practices to protect yourself. Protect yourself further with a secure service desk.

Using Pageant Putty Agent to Unleash Your SSH Key Use

Learn how to streamline and unleash your SSH key use with the Pageant Putty agent in this ATA Learning tutorial!

Master In-Depth Security Audits with OpenSCAP

Learn how to perform in-depth security audits on your server with OpenSCAP and SCAP Security Guide (SSG) in this step-by-step tutorial!

Passwork: A Modern Password Manager for 2022

Passwork offers a modern and flexible password management solution for enterprises in a secure self-hosted solution!

A Weak Password List Says Hack Me: Protect Yourself

Learn how easy cracking an NTLM password is and how to avoid hacked accounts by using a weak password list to ban insecure passwords!

How to Install and Configure the CSF Firewall for Linux

Learn how to install and configure the CSF firewall for Linux and secure your server in this step-by-step tutorial!

Configuring Suricata as an Intrusion Prevention System (IPS)

Learn how to configure Suricata IPS to detect and prevent suspicious activities on your network with this step-by-step tutorial!

Getting Started with Lynis Security Auditing

Learn how to use the free Lynis auditing tool to scan your systems for vulnerabilities and build tons of useful reports.

How to Track Important Windows Security Events with PowerShell

Learn how Windows security events are stored, how to manage audit policies and how to build a helpful PowerShell tool to track down security events.

How to Install and Set Up an AWS CloudWatch Agent

CloudWatch is an AWS service that centrally manages all of logs. Learn how to set up the CloudWatch agent for Windows in this tutorial.

Install Nessus on Kali and Enhance Linux Distribution

Install Nessus on Kali Linux, configure a network vulnerability scan, and learn to scan the local Kali Linux installation!