| DynamoDB: Modifying Throughput |
| What is Hacking? |
| Behat - Behavioral acceptance testing |
| Password Cracking |
| Clone a web site with setoolkit |
| How to break 2 factor Authentication with Modishka |
| UVU Summer class |
| Choose simple and easy ECommerce solutions |
| bandit0 |
| Security Onion |
| Snort config file locations |
| Honey Pots and Honey Nets |
| Snort Rules |
| Cloud Development |
| Knowbe4 Employee Phishing Education |
| IT Risk Survival Guide |