Vice_Versa
14.1.6 Enable Device Logs : TestOut
0:33
Vice_Versa
13.3.7 Secure Email on iPad : TestOut
0:39
Vice_Versa
13.3.5 Configure Email Filters : TestOut
0:19
Vice_Versa
12.8.10 Backup a Domain Controller : TestOut
1:32
Vice_Versa
12.8.8 Recover a File from File History : TestOut
1:11
Vice_Versa
12.8.6 Back Up Files with File History : TestOut
0:37
Vice_Versa
12.7.6 Configure Fault-Tolerant Volumes : TestOut
0:44
Vice_Versa
6.8.5 Remove a User from a Group : TestOut
0:25
Vice_Versa
6.8.4 Add Users to a Group : TestOut
0:28
Vice_Versa
6.8.3 Rename and Create Groups : TestOut
0:38
Vice_Versa
6.7.9 Lock and Unlock User Accounts : TestOut
0:48
Vice_Versa
7.3.5 Compare an MD5 Hash : TestOut
1:09
Vice_Versa
6.7.8 Change a User's Password : TestOut
0:28
Vice_Versa
6.7.7 Change Your Password : TestOut
0:24
Vice_Versa
6.7.6 Delete a User : TestOut
0:26
Vice_Versa
6.7.5 Rename a User Account : TestOut
0:44
Vice_Versa
6.7.4 Create a User Account : TestOut
0:44
Vice_Versa
14.1.4 Configure Advanced Audit Policy : TestOut
2:59
Vice_Versa
11.7.4 Crack Password with Rainbow Tables : TestOut
2:09
Vice_Versa
6.10.6 Configure Kerberos Policy Settings : TestOut
0:51
Vice_Versa
6.6.11 Configure Smart Card Authentication : TestOut
1:00
Vice_Versa
6.6.7 Secure Default Accounts : TestOut
0:41
Vice_Versa
6.6.6 Restrict Local Accounts : TestOut
1:00
Vice_Versa
6.6.4 Configure Account Password Policies : TestOut
1:09
Vice_Versa
6.5.14 Create Global Groups : TestOut
1:43
Vice_Versa
6.5.13 Create a Group : TestOut
1:15
Vice_Versa
6.5.12 Manage User Accounts : TestOut
1:24
Vice_Versa
6.5.11 Create User Accounts : TestOut
2:18
Vice_Versa
6.5.10 Create and Link a GPO : TestOut
1:11
Vice_Versa
6.5.6 Delete OUs : TestOut
1:09
Vice_Versa
6.5.5 Create OUs : TestOut
1:52
Vice_Versa
6.8.8 Enforce User Account Control : TestOut
1:28
Vice_Versa
8.3.9 Configuring a Captive Portal : TestOut
1:18
Vice_Versa
8.3.7 Configure WIPS : TestOut
0:38
Vice_Versa
8.3.6 Harden a Wireless Network : TestOut
1:54
Vice_Versa
8.2.6 Configure Rogue Host Protection : TestOut
1:30
Vice_Versa
8.1.5 Configure a Wireless Network : TestOut
1:08
Vice_Versa
9.2.6 Create Virtual Switches : TestOut
0:29
Vice_Versa
9.1.6 Create Virtual Machines : TestOut
1:18
Vice_Versa
11.4.11 Scan for WAP Vulnerabilities : TestOut
1:15
Vice_Versa
11.4.10 Scan for IoT Vulnerabilities : TestOut
1:12
Vice_Versa
11.4.9 Scan for Domain Controller Vulnerabilities : TestOut
2:21
Vice_Versa
11.4.8 Scan for Linux Vulnerabilities : TestOut
1:25
Vice_Versa
11.4.7 Scan for Windows Vulnerabilities : TestOut
1:39
Vice_Versa
11.3.5 Implement Intrusion Prevention : TestOut
1:13
Vice_Versa
5.13.6 Permit Traffic : TestOut
0:23
Vice_Versa
5.12.4 Explore VLANs : TestOut
2:29
Vice_Versa
5.11.11 Secure Access to a Switch 2 : TestOut
2:26
Vice_Versa
5.11.10 Secure Access to a Switch : TestOut
1:35
Vice_Versa
5.11.9 Harden a Switch : TestOut
1:02
Vice_Versa
5.11.6 Spoof MAC Addresses with SMAC : TestOut
1:15
Vice_Versa
5.9.6 Secure a Switch : TestOut
1:02
Vice_Versa
5.6.3 Configure URL Blocking : TestOut
1:38
Vice_Versa
5.13.7 Block Source Hosts : TestOut
1:20
Vice_Versa
5.13.5 Restrict Telnet and SSH Access : TestOut
1:04
Vice_Versa
11.6.8 Analyze a SYN Flood Attack : TestOut
1:08
Vice_Versa
11.6.6 Poison DNS : TestOut
1:01
Vice_Versa
11.6.4 Poison ARP and Analyze with Wireshark
0:56
Vice_Versa
5.5.5 Configure a VPN Connection IPad
0:44
Vice_Versa
5.5.4 Configure a Remote Access VPN : TestOut
2:14
Vice_Versa
5.4.3 Configure NAT : TestOut
1:47
Vice_Versa
5.3.5 Configure a Perimeter Firewall : TestOut
1:26
Vice_Versa
5.2.3 Configure a DMZ : TestOut
1:30
Vice_Versa
5.1.10 Configure QoS : TestOut
2:27
Vice_Versa
5.1.8 Configure Network Security Appliance Access : TestOut
1:18
Vice_Versa
5.1.7 Configure a Security Appliance : TestOut
1:28
Vice_Versa
3.1.3 Implement Physical Security : TestOut
0:25
Vice_Versa
7.5.6 Manage Certificates : TestOut
1:03
Vice_Versa
7.4.8 Configure BitLocker with a TPM : TestOut
1:53
Vice_Versa
7.4.3 Encrypt Files with EFS : TestOut
0:48
Vice_Versa
7.1.11 Hide Files with OpenStego : TestOut
0:55
Vice_Versa
9.8.6 Create a Guest Network for BYOD : TestOut
2:24
Vice_Versa
9.8.4 Secure an iPad : TestOut
1:37
Vice_Versa
10.3.15 Perform an SQL Injection Attack : TestOut
1:02
Vice_Versa
10.3.10 Clear the Browser Cache : TestOut
0:30
Vice_Versa
10.1.5 Allow SSL Connections : TestOut
0:30
Vice_Versa
2.3.11 Identify Social Engineering : TestOut
1:18
Vice_Versa
2.2.6 Configure Microsoft Defender : TestOut
1:19
Vice_Versa
4.2.5 Configure Automatic Updates : TestOut
1:01
Vice_Versa
10.4.12 Implement Data Execution Preventions : TestOut
1:08
Vice_Versa
4.3.6 Disable Inheritance : TestOut
0:48
Vice_Versa
4.3.5 Configure NTFS Permissions : TestOut
1:34
Vice_Versa
4.2.7 Configure Microsoft Defender Firewall : TestOut
1:08
Vice_Versa
10.4.10 Implement Application Whitelisting with AppLocker : TestOut
1:34
Vice_Versa
Unknown knocking hours before fatal heart attack
0:48
Vice_Versa
Before his passing
6:51