Waheed Rahimi
Evaluate Windows Log Files
Evaluate Event Logs in pfSense
Log Events with pfSense
View Process Information
Disable Windows Services
Enable and Disable Linux Services
Manage Linux Services
Create a Honeypot with Pentbox
Manage Certificates
Configure Account Password Policies
Analyze Passwords using Rainbow Tables
Configure Security Appliance Access
Configure a Security Appliance
Secure a Mobile Device
Discover Bluetooth Devices
Configure a Captive Portal
Implement Physical Security Countermeasures
15.3.6 Encrypt a Hard Drive
15.1.8 Compare an MD5 Hash
14.2.11 Scan for IoT Devices
13.3.6 Secure a Mobile Device
13.2.4 Discover Bluetooth Devices
13.1.14 Locate a Rogue Wireless Access Point
13.1.13 Discover a Rogue DHCP Server
13.1.9 Discover a Hidden Network
12.3.6 Perform an SQL Injection Attack
12.1.8 Crack FTP Credentials with Wireshark
12.1.7 Extract Web Server Information with Nmap
11.3.6 Create a Honeypot with Pentbox
11.2.12 Bypass Windows Firewall