What Is Linode Doing To Strengthen Cybersecurity Of Its Users
Learn more: www.linode.com
HackerSploit, a leading provider of free Infosec and cybersecurity training, has partnered with Linode to offer training to Linode users. Topics range from deployment of Linux servers all the way to cloud-native technologies like Docker containers. Linode, with the help from HackerSploit, is trying to bring a cultural shift to its users and make them proactive about security, so that it’s no longer an afterthought. “That’s why we wanted to come up with these sets of theories to ensure that the users and customers have the documentation and the resources available to them when they do deploy these technologies,” quipped Alexis Ahmed, Founder of HackerSploit.
In this edition of Let’s Talk, we hosted Alexis Ahmed to talk about this partnership and its scope.
Guest: Alexis Ahmed
Alexis Ahmed is founder and lead penetration tester at HackerSploit Cybersecurity. He is also a Cyber security instructor and content creator on YouTube with an audience of more than 500,000 subscribers.
HackerSploit is the leading provider of free Infosec and cybersecurity training. Our goal is to make cybersecurity training more effective and accessible to students and professionals. We achieve this by providing essential training on how to attack and defend systems with virtual labs and real-world scenarios. We offer individual and corporate training packages in Penetration Testing & Red Team Operations, Web application penetration testing, and cybersecurity awareness training.
Show: Success Stories/Let’s Talk
A RedMonk Conversation: Documenting the Alternative Cloud
You might also like…
Red Team Security SeriesHackerSploit presents a new security series focused on “Red Team” best practices. Take a closer look at red team activities and learn techniques to effectively test your security defenses by conducting internal attacks on your organizations infrastructure to identify and close vulnerabilities.
How to use Multiple SSH Keys | Managing Different SSH Keys on your SystemIn this video, we’ll cover how to generate and use SSH Key Pairs for easily and securely logging into your server.
Linux Monitoring and Logging | HackerSploit Linux SecurityIn this video, HackerSploit shows various tools and commands for logging and monitoring on your Linux Server.
Brute Force Protection | Linux Security with HackerSploitIn part 2 of the Linux Security series, HackerSploit shows how to set up fail2ban on a server to prevent brute force SSH attacks.