4:48 CIS189 Chapter 13 Video 1 Scanning rogue devices and Kali Linux Roger Zimmerman 38 views - 8 months ago
3:29 CIS189 Chapter 13 Video 2 Infrastructure attacks and USB attack Roger Zimmerman 30 views - 8 months ago
7:28 CIS189 Chapter 13 Video 4 Developer side mobile security Roger Zimmerman 15 views - 8 months ago
6:45 CIS189 Chapter 8 Video 5 DHPC and Mobile Device Management Roger Zimmerman 30 views - 9 months ago
4:40 CIS189 Chapter 8 Video 4 EAP types Intrusion detection and Protocol filtering Roger Zimmerman 22 views - 9 months ago
6:20 CIS189 Chapter 8 Video 1 Distributed or centralized planning Roger Zimmerman 34 views - 9 months ago
6:09 CIS189_Ch6_3_WarDriving_RogueAccessPoints_BluetoothTechnologiesListed Roger Zimmerman 18 views - 9 months ago
5:04 CIS189_Ch5_7_WPA2 4-way handshake and Autonomous and thin WAPs Roger Zimmerman 39 views - 10 months ago
6:57 CIS189_Ch5_8_Wireless bridges Gateways and Antenna types Roger Zimmerman 32 views - 10 months ago
16:19 CIS189 Week 1 Video 2 Some corrections and extra concepts Roger Zimmerman 56 views - 10 months ago
2:24 Powershell PSProviders (Intro to Powershell series video 5-2)_2024 Roger Zimmerman 134 views - 1 year ago
2:27 Powershell get-childitem cmdlet (Intro to Powershell series video 5-1)_2024 Roger Zimmerman 646 views - 1 year ago
9:19 Installing Windows 11 Pro in Hyper-V Without Microsoft Account Roger Zimmerman 5.6K views - 2 years ago