What Is Linode Doing To Strengthen Cybersecurity Of Its Users
Learn more: www.linode.com
HackerSploit, a leading provider of free Infosec and cybersecurity training, has partnered with Linode to offer training to Linode users. Topics range from deployment of Linux servers all the way to cloud-native technologies like Docker containers. Linode, with the help from HackerSploit, is trying to bring a cultural shift to its users and make them proactive about security, so that it’s no longer an afterthought. “That’s why we wanted to come up with these sets of theories to ensure that the users and customers have the documentation and the resources available to them when they do deploy these technologies,” quipped Alexis Ahmed, Founder of HackerSploit.
In this edition of Let’s Talk, we hosted Alexis Ahmed to talk about this partnership and its scope.
Guest: Alexis Ahmed
Alexis Ahmed is founder and lead penetration tester at HackerSploit Cybersecurity. He is also a Cyber security instructor and content creator on YouTube with an audience of more than 500,000 subscribers.
HackerSploit is the leading provider of free Infosec and cybersecurity training. Our goal is to make cybersecurity training more effective and accessible to students and professionals. We achieve this by providing essential training on how to attack and defend systems with virtual labs and real-world scenarios. We offer individual and corporate training packages in Penetration Testing & Red Team Operations, Web application penetration testing, and cybersecurity awareness training.
Show: Success Stories/Let’s Talk
A RedMonk Conversation: Documenting the Alternative Cloud
You might also like…
Securing Apache 2 | HackerSploit Linux SecurityIn this video, Alexis from HackerSploit shows off some basic steps for securing your Apache web server and keeping it safe.
Linux Persistence Techniques | Red Team Series 10-13In this video in our Hackersploit Red Team series, we will cover part 10 of our series on Linux Persistence Techniques.
Windows Red Team Credential Access Techniques | Red Team Series 6-12In this part of the HackerSploit Red Team series, we explore credential access techniques for stealing credentials, like users and passwords.
How to use Multiple SSH Keys | Managing Different SSH Keys on your SystemIn this video, we’ll cover how to generate and use SSH Key Pairs for easily and securely logging into your server.