Howard Poston

Howard Poston is a cybersecurity researcher with a background in blockchain, cryptography and malware analysis. He has a master's degree in Cyber Operations from the Air Force Institute of Technology and two years of experience in cybersecurity research and development at Sandia National Labs. He currently works as a freelance consultant providing training and content creation for cyber and blockchain security. He can be reached by email at [email protected] or via his website at https://www.howardposton.com.

Content from Howard Poston

Secure Coding Fundamentals
Learning Path
Secure Coding Fundamentals

Secure Coding Fundamentals

This path describes common development mistakes, how they can be exploited and possible mitigations.

Network Traffic Analysis for Incident Response
Learning Path
Network Traffic Analysis for Incident Response

Network Traffic Analysis for Incident Response

Learn about network traffic analysis tools and techniques and the valuable data that can be extracted from your network traffic.

Blockchain Security
Learning Path
Blockchain Security

Blockchain Security

This learning path introduces blockchain security, discussing security considerations at each level of the blockchain ecosystem.

Python for Cybersecurity
Learning Path
Python for Cybersecurity

Python for Cybersecurity

This Python for Cybersecurity learning path helps you to master the use of Python for a wide variety of cybersecurity tasks.

Introduction to Secure Coding Fundamentals
Course
Introduction to Secure Coding Fundamentals

Introduction to Secure Coding Fundamentals

This course introduces the need for secure coding and the tools used in this learning path.

Buffer Overflows
Course
Buffer Overflows

Buffer Overflows

This course introduces the buffer overflow vulnerability, its exploitation and possible mitigations.

Integer Overflows and Underflows
Course
Integer Overflows and Underflows

Integer Overflows and Underflows

This course introduces integer overflow and underflow vulnerabilities, their exploitation and possible mitigations.

Race Conditions
Course
Race Conditions

Race Conditions

This course introduces race conditions, their exploitation and possible mitigations.

Format String Vulnerabilities
Course
Format String Vulnerabilities

Format String Vulnerabilities

This course introduces format string vulnerabilities, their exploitation and possible mitigations.

Command Injection
Course
Command Injection

Command Injection

This course introduces command injection vulnerabilities, their exploitation and possible mitigations.

Least Privilege
Course
Least Privilege

Least Privilege

This course introduces the principle of least privilege and its importance in secure coding.

Credential Management
Course
Credential Management

Credential Management

This course describes how poor credential management can make an application vulnerable to attack, how it can be exploited and how to manage credentials properly.

Cryptography
Course
Cryptography

Cryptography

This course discusses how the poor use of cryptography can leave an application vulnerable to attack and how it can be exploited, as well as potential mitigations.

SQL Injection
Course
SQL Injection

SQL Injection

This course introduces SQL injection vulnerabilities, their exploitation and possible mitigations.

Cross-Site Scripting
Course
Cross-Site Scripting

Cross-Site Scripting

This course introduces cross-site scripting vulnerabilities, their exploitation and possible mitigations.

Cross-Site Request Forgery
Course
Cross-Site Request Forgery

Cross-Site Request Forgery

This course introduces cross-site request forgery vulnerabilities, their exploitation and possible mitigations.

Poor HTTP Usage
Course
Poor HTTP Usage

Poor HTTP Usage

This course describes how poor use of HTTP and HTML can be exploited, as well as possible mitigations.

Error Handling
Course
Error Handling

Error Handling

This course describes how poor error handling can be exploited and possible mitigations for this problem.

Introduction to Network Traffic Analysis
Course
Introduction to Network Traffic Analysis

Introduction to Network Traffic Analysis

This course provides an introduction to network traffic analysis and describes its primary applications.

Fundamentals of Networking
Course
Fundamentals of Networking

Fundamentals of Networking

This course covers the fundamentals of networking and the purposes of various low-level and high-level networking protocols.

Hands-On Traffic Analysis in Wireshark
Course
Hands-On Traffic Analysis in Wireshark

Hands-On Traffic Analysis in Wireshark

This course provides an introduction to Wireshark and an analysis of some common protocols in Wireshark.

Alternatives to Wireshark
Course
Alternatives to Wireshark

Alternatives to Wireshark

This course demonstrates some of the features of tools other than Wireshark for network traffic analysis.

Network Traffic Intelligence Collection
Course
Network Traffic Intelligence Collection

Network Traffic Intelligence Collection

This course demonstrates tools and techniques for extracting useful intelligence from a network traffic capture.

Common Network Threats
Course
Common Network Threats

Common Network Threats

This course demonstrates how scanning, data exfiltration, DDoS attacks and attacks against IoT devices can appear in network traffic.

Traffic Analysis Case Studies
Course
Traffic Analysis Case Studies

Traffic Analysis Case Studies

This course provides four demonstrations of analysis of network traffic from different malware types.

Data Collection for Network Traffic Analysis
Course
Data Collection for Network Traffic Analysis

Data Collection for Network Traffic Analysis

This course discusses the considerations and available technologies for developing a network traffic analysis program.

Data Analysis for Network Traffic Analysis
Course
Data Analysis for Network Traffic Analysis

Data Analysis for Network Traffic Analysis

This course covers the fundamentals of connection and statistical and event-based analysis of network traffic data.

Fundamentals of Blockchain Security
Course
Fundamentals of Blockchain Security

Fundamentals of Blockchain Security

This course describes the blockchain and the cryptographic algorithms that it is built upon.

Consensus Algorithm Security
Course
Consensus Algorithm Security

Consensus Algorithm Security

This course introduces blockchain consensus algorithms and discusses the security of two major consensus algorithms.

Blockchain in Action
Course
Blockchain in Action

Blockchain in Action

This course discusses attacks that target the block creation process and the nodes and networks that make up the blockchain ecosystem.

Smart Contract Security
Course
Smart Contract Security

Smart Contract Security

This course introduces smart contracts and describes common flaws that occur when implementing them.

Beyond the Basics of Blockchain
Course
Beyond the Basics of Blockchain

Beyond the Basics of Blockchain

This course moves away from focusing solely on blockchain to discuss how blockchain can be replaced, expanded or improved to meet the needs of a particular use case.

Exceptional learning experiences powered by LX Labs cyber expertise

Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.