Videos

Published on March 7th, 2014 📆 | 6248 Views ⚑

0

Cyber Secrets Episode 1×01: Can you still have anonymity on the Internet?


TTS



Good morning. Welcome to Cyber Secrets. This new bi-weekly educational web series will cover topics ranging from the anonymity to data recovery to forensics to computer attacks. Our first episode of Cyber Secrets talks about anonymity on the internet.

Jeremy Martin, the voice and creator of this video, explains that you can still maintain a level of anonymity with a little effort. Cyber Secrets was spawned while writing The Beginner's guide to the Internet Underground and will cover a lot of how-tos along with explanations of hacking, forensics, and general information security.

Bio of the creator:
Jeremy Martin is a Senior Security Researcher that has focused his work on Red Team penetration testing, Computer Forensics, and Cyber Warfare. Starting his career in 1995, Mr. Martin has worked with Fortune
200 companies and Federal Government agencies. He has received numerous awards for service. He has been teaching Advanced Ethical Hacking, Computer Forensics, Data Recovery, SCADA/ICS security,
Security Management, and more since 2003. As a published author he has spoken at security conferences around the world. Current research projects include SCADA security, vulnerability analysis, threat profiling,
exploit automation, anti-forensics, and reverse engineering malware. In a past life, he was also a freelance artist

Credentials: CISSP-ISSAP/ISSMP, CISM, NSA-IAM/IEM, CHS-III, CEICHFI/CEH/CNDA/ECSA/LPT, A+/Net+/Security+/Linux+, LPIC-I, CPT/CEPT/CCFE/CDRP/CASS/CSSA/CREA, ACSA, Novell CLA,
CDCS, etc…





Board of Directors for Infragard, Denver Chapter (2006-2009)
CHS officer of American College of Forensic Examiners Int’l (2005-2008)
Advisory Board for the Business Espionage Controls and Countermeasures Association

Published work: The Art of Casual Wireless Hacking, The Beginner's Guide to the Internet Underground, & the Cyber Intelligence Report Contributing editor for Blacklisted 411, Engine Builder, EthicalHacker.net, Hackin9, IQ Magazine, Successful Dealer, and The Business Espionage Report (TBER). Work used in post graduate courseware.

Likes: 1

Viewed:

source

Tagged with:



Comments are closed.