great video ! do you have more terminal command lessons ? thank you
@erickespn2 ай бұрын
this is great! thank you
@jamesbakis63302 ай бұрын
Thankyou!
@leonjaramillo38312 ай бұрын
Thanks for the course
@fastrobreetus2 ай бұрын
TY
@olajidesamuel70964 ай бұрын
This is very useful. Thank you 😊
@KehindeAkinnawo-tl8mf4 ай бұрын
@InstructorAlton Are you available for a quick discussion concerning your Udemy course promotion Looking forward on working together Thanks
@doms30765 ай бұрын
Thanks man. going to go and practice this on my own
@cabdinaasircali-mb6xw5 ай бұрын
Xxxlove 2:16
@nauvalalfarizi55796 ай бұрын
thankyou Alton , for your great vidio . loves it since the first vidio ❤❤😌😌✨✨👌👌👌👌
@TheGreatPerson16 ай бұрын
🎉🎉
@mmvv15317 ай бұрын
is there 10 hats behind you??? l thought I am the one having too many hats.
@arunvenkit53737 ай бұрын
Very helpful! Thanks!
@mmvv15317 ай бұрын
arigato gozaimashita
@HitlerNwala7 ай бұрын
Good video, keep it up. Hope to see more of your videos. Thanks
@idrisalhajiadamu759010 ай бұрын
Thank you, Sir
@idrisalhajiadamu759010 ай бұрын
my question is why do we need to install windows 10?
@anthony55910 ай бұрын
Currently enrolled in this class in Cali.
@KATEERIOM10 ай бұрын
thanks well explained with simple term
@PaulEllis-h2f10 ай бұрын
This was brilliant, absolutely amazingly informative, I thank you deeply
@gamysoftec322211 ай бұрын
thanks, very useful for me
@prasannabakare0456 Жыл бұрын
Hey, as a beginner I learned so much things from this video. Glad I found this channel. Thank you
@pepsters2000 Жыл бұрын
Thank you for sharing your knowledge!!!
@PetaJensen-ch6vr Жыл бұрын
DNS name record does not exist error code 0x0000232B RCODE_NAME_ERROR Please help
@joshuatumanguil5871 Жыл бұрын
🎯 Key Takeaways for quick navigation: 00:00 📚 Introduction to Information Security Management - The lecture begins with an introduction to information security management. - Information security involves protecting data, assets, and ensuring confidentiality, integrity, and availability. 02:29 🔒 Access Control Basics - Access control is the central theme of the lecture. - Access controls are measures to safeguard data and assets, preventing unauthorized access and modifications. 05:09 🛡️ Access Control Categories - The lecture covers various categories of access control. - Access controls are classified into preventive, detective, corrective, recovery, deterrent, and compensating controls. 07:28 🏢 Physical and Logical Access Control - Access controls can be physical or logical. - Physical controls involve tangible measures, while logical controls are implemented through technology and policies. 10:18 🗝️ Common Physical Access Controls - The lecture lists common physical access controls. - Examples include employee ID badges, access logs, door access systems, proximity cards, and more. 11:53 🖥️ Common Logical Access Control Methodologies - The lecture discusses common logical access control methods. - Examples include access control lists, group policies, password policies, and account policies. 14:23 📚 Conclusion and Course Information - The lecture concludes by inviting viewers to learn more about the course. - It emphasizes the importance of access control in information security management. Made with HARPA AI
@ahmedfalih473 Жыл бұрын
Very happy to find your channel. I have created the lab with windows and kali in it but I have a question. do you connect a second routers that you use for just hacking or how did you do that? Will this work if I only plug a router without internet?
@wildkid1000 Жыл бұрын
Hey Alton I signed up for your course, and everything was going good I stopped for a week and now I can get back into the course any ideas or help would be greatly appreciated.
@InstructorAlton Жыл бұрын
What site did you sign-up for my course on? You'll want to reach out for support via the website.
@smileyciprian Жыл бұрын
at the final...where you rename the text document, where you create your basic html site, your extension changes automatically. Mine not. Remains .txt. I tried to modifying it from proprieties, but unsuccesfull. How can i solve that? Thank you!
@AxaxAxax-iq6ng Жыл бұрын
Thank u
@sebastianmariano4407 Жыл бұрын
This Video was very helpful!!
@johnnymorris2633 Жыл бұрын
Great video. The "G" is silent in Gnome. But you don't have to take my word for it. Look it up. Again, great job on the video.
@demonkazi Жыл бұрын
@7:57 for the grep info
@light6230 Жыл бұрын
Great tutorial! Very clear and easy to follow!
@DenisGWahome Жыл бұрын
Thank you for the excellent series.
@abdulaleemhamidullah4396 Жыл бұрын
( I meant) Nessus essentials (sorry for wrong typing)
@abdulaleemhamidullah4396 Жыл бұрын
❤ thank you so much for a great professional explanation with simple words! It’s been very helpful Please do me a favor here answering my two questions ! My first question : I have my physical windows 11 laptop and I have installed Kali Linux the latest version 2023.2, in which I cannot install necessary shelves on it, using the same way you have shown My second question : I have installs narcissist sensors on my physical windows, 11 laptop, and I can scan at all. Physical hosts like routers all other physical stuff but I cannot scan my virtual machines on my virtual box. ( metasploitable 2,3, windows, 10 ETC., How I can solve those problems? I will highlight appreciate your help. Thank you.
@Israelxox Жыл бұрын
You completely missed the Administrative controls, but nice video
@swift_learn Жыл бұрын
Nice work very informative
@ali-07 Жыл бұрын
Well done !! Thank you
@johnnguyen1778 Жыл бұрын
Big fish
@brandonortiz2692 Жыл бұрын
Here from WGU. YOU DA MAN ALTON!
@sethadu9045 Жыл бұрын
Thank you Alton
@sethadu9045 Жыл бұрын
Thanks a lot, Alton
@sethadu9045 Жыл бұрын
Thanks a lot, Alton
@mwesigyenicholas7394 Жыл бұрын
Thanks a lot sir i love your cool calm explanation
@rosenvalentinov249 Жыл бұрын
Thank you so much !
@mrvegan1497 Жыл бұрын
Big fan of your videos. I'm having some trouble. Do you offer one-on-one remote training?