Curated Video
Sender Framework Policy (SPF)
In this tutorial, you will learn about SPF and how to set it up on your DNS server.
Curated Video
Bloodhound and Sharphound
Learn how attackers use Bloodhound and Sharphound to Get Active Directory Domain Admin Access.
Curated Video
Collect and Visualize Data with Maltego
This video will explain the poweful OSINT application called Maltego, and how you can leverage it in collecting open source data on your victim.
Curated Video
Pass the Hash with Mimikatz on Windows
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Curated Video
Wireshark D5 V3 - HTTP analysisDNS analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 3: DNS analysis
Curated Video
Password Spraying
Learn how to spray passwords across many accounts. Password spraying is an attack that attempts to access a large number of accounts (usernames) with a few commonly used passwords. It is different from the traditional brute-force attacks...
Curated Video
Coolest Way to Attack a Network
This video will show you how to acquire the NTLMv2 hashes of users on any Windows network, just by plugging your hacking box into that network that doesn't have any kind of NAC solution.
Curated Video
Perform a DNS Spoofing Attack
This video will teach you how to perform a DNS spoofing attack, and how to take user's URL request to a crafted web application of your own
Curated Video
LAB 3: How to Enable a Firewall
I will show you how to enable the firewall on your Windows OS
Curated Video
Linux Fundamentals - Verifying Connectivity with Remote Servers
This video explains how to verify connectivity with remote servers. This clip is from the chapter "Networking in Linux" of the series "Linux Fundamentals".This section introduces you to networking in Linux. Then, you will learn about...
Curated Video
Introduction to IT and Cybersecurity: Web Infrastructure
Part 7/16 of Introduction to IT and Cybersecurity series: This video explains the basic building blocks of the Internet, including definitions of terms like ISP, NAP, IP address, DNS, URL, protocol, cloud service provider, server, and...
Curated Video
Famous Cyber Security Frameworks
Users need standards for information technology (IT) systems in order to use IT successfully and run their organizations' operations. To connect goods created by several suppliers and transfer software, data, and applications from one...
Curated Video
Protect Yourself from Phishing Attacks
The video explains the phishing attack techniques and how you can identify and avoid them.
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - Amazon OpenSearch Service
This video explains what Amazon OpenSearch services is. This clip is from the chapter "Domain 4: Analysis" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn how to build a more complex...
Curated Video
ISO 27002-2022 Control Examples
In this video, we will be exploring ISO 27002-2022 control examples. ISO 27002-2022 is a globally recognized standard for information security management systems. It provides a framework for organizations to establish, implement,...
Curated Video
What has been added and removed from the ISO 27001 standard
In this video, we will be discussing the changes that have been made to the ISO 27001 standard. We will be exploring what has been added and removed from the latest version of the standard, and how these changes may impact your...
Curated Video
Support and Operation Domain (ISO 27001)
In this video, we will be discussing the Support and Operation Domain of the ISO 27001 standard. This domain is crucial for ensuring the effective implementation and maintenance of an information security management system. We will cover...
Curated Video
Improvement Domain (ISO 27001)
In this video, we will be discussing the Improvement Domain of ISO 27001. This domain is crucial for organizations that want to continuously improve their information security management system. We will cover the key concepts and...
Curated Video
Performance Evaluation Domain (ISO 27001)
In this video, we will be discussing the Performance Evaluation Domain of the ISO 27001 standard. This domain is crucial for ensuring that your organization's information security management system is effective and efficient. We will...
Curated Video
Leadership Domain (ISO 27001)
In this video, we will be discussing the Leadership Domain of the ISO 27001 standard. This domain is crucial for establishing and maintaining an effective information security management system within an organization. We will cover the...