SMB Protocol Security

Bookmark

SMB Protocol Security

Or become a member to get unlimited access to this course and over 20 others

Watch SMB Protocol Security


Join Angela Hill for a deep dive discussion into how nation states may be targeting your organization to steal sensitive information. Even though you may not directly deal in "classified" information, attackers will try to use you to pivot into your customers or vendors who do. Angela shares from here career working in the US intelligence sphere. 

Lesson 1: The Protocol

Lesson 2: Security Mechanisms

Lesson 3: SMB Signing

Lesson 4: Additional Security Controls

William Price | Security Consultant & Trainer


Image
I am a jack of all trades. ✪ Passionate about data visualization ✪ Helping C-Suite grasp information and operational security ✪ Designing virtual teams and workplaces (Microsoft 365/Teams/SharePoint Consultant/Architect) ✪ Leveraging my global intelligence expertise for: designing systems, virtual environments, and teams.

Watch SMB Protocol Security

Can't Decide Which Course to Buy?
Get unlimited access to 25+ Courses When You Become a Pro Member

Image

This plan is for those who want to move ahead even faster by getting totally immersed in our educational experience. This is our complete plan that includes everything to supercharge your learning. Pro members have access to the entire course library including library training recordings, private webcasts, a super helpful community, and templates to help you along your security journey.