Instructional Video5:35
Curated Video

Sender Framework Policy (SPF)

Higher Ed
In this tutorial, you will learn about SPF and how to set it up on your DNS server.
Instructional Video5:28
Curated Video

Cross Site Scripting

Higher Ed
This video will explain what CSS is
Instructional Video4:55
Curated Video

Bloodhound and Sharphound

Higher Ed
Learn how attackers use Bloodhound and Sharphound to Get Active Directory Domain Admin Access.
Instructional Video4:47
Curated Video

Collect and Visualize Data with Maltego

Higher Ed
This video will explain the poweful OSINT application called Maltego, and how you can leverage it in collecting open source data on your victim.
Instructional Video6:32
Curated Video

Pass the Hash with Mimikatz on Windows

Higher Ed
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Instructional Video5:54
Curated Video

Wireshark D5 V3 - HTTP analysisDNS analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 3: DNS analysis
Instructional Video4:42
Curated Video

Password Spraying

Higher Ed
Learn how to spray passwords across many accounts. Password spraying is an attack that attempts to access a large number of accounts (usernames) with a few commonly used passwords. It is different from the traditional brute-force attacks...
Instructional Video5:30
Curated Video

Coolest Way to Attack a Network

Higher Ed
This video will show you how to acquire the NTLMv2 hashes of users on any Windows network, just by plugging your hacking box into that network that doesn't have any kind of NAC solution.
Instructional Video3:54
Curated Video

Stay Anonymous Online

Higher Ed
This video will show you how to conceal your identity online
Instructional Video5:21
Curated Video

Perform a DNS Spoofing Attack

Higher Ed
This video will teach you how to perform a DNS spoofing attack, and how to take user's URL request to a crafted web application of your own
Instructional Video2:28
Curated Video

LAB 3: How to Enable a Firewall

Higher Ed
I will show you how to enable the firewall on your Windows OS
Instructional Video6:19
Curated Video

Linux Fundamentals - Verifying Connectivity with Remote Servers

Higher Ed
This video explains how to verify connectivity with remote servers. This clip is from the chapter "Networking in Linux" of the series "Linux Fundamentals".This section introduces you to networking in Linux. Then, you will learn about...
Instructional Video10:05
Curated Video

Introduction to IT and Cybersecurity: Web Infrastructure

Higher Ed
Part 7/16 of Introduction to IT and Cybersecurity series: This video explains the basic building blocks of the Internet, including definitions of terms like ISP, NAP, IP address, DNS, URL, protocol, cloud service provider, server, and...
Instructional Video2:37
Curated Video

Famous Cyber Security Frameworks

Higher Ed
Users need standards for information technology (IT) systems in order to use IT successfully and run their organizations' operations. To connect goods created by several suppliers and transfer software, data, and applications from one...
Instructional Video0:44
Curated Video

The domain

K - 8th
The domain
Instructional Video7:08
Curated Video

Protect Yourself from Phishing Attacks

Higher Ed
The video explains the phishing attack techniques and how you can identify and avoid them.
Instructional Video1:25
Curated Video

I WONDER - What Is A URL?

Pre-K - 5th
This video is answering the question of what is a URL.
Instructional Video7:55
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - Amazon OpenSearch Service

Higher Ed
This video explains what Amazon OpenSearch services is. This clip is from the chapter "Domain 4: Analysis" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn how to build a more complex...
Instructional Video5:08
Curated Video

ISO 27002-2022 Control Examples

Higher Ed
In this video, we will be exploring ISO 27002-2022 control examples. ISO 27002-2022 is a globally recognized standard for information security management systems. It provides a framework for organizations to establish, implement,...
Instructional Video3:44
Curated Video

What has been added and removed from the ISO 27001 standard

Higher Ed
In this video, we will be discussing the changes that have been made to the ISO 27001 standard. We will be exploring what has been added and removed from the latest version of the standard, and how these changes may impact your...
Instructional Video5:07
Curated Video

Support and Operation Domain (ISO 27001)

Higher Ed
In this video, we will be discussing the Support and Operation Domain of the ISO 27001 standard. This domain is crucial for ensuring the effective implementation and maintenance of an information security management system. We will cover...
Instructional Video1:25
Curated Video

Improvement Domain (ISO 27001)

Higher Ed
In this video, we will be discussing the Improvement Domain of ISO 27001. This domain is crucial for organizations that want to continuously improve their information security management system. We will cover the key concepts and...
Instructional Video1:47
Curated Video

Performance Evaluation Domain (ISO 27001)

Higher Ed
In this video, we will be discussing the Performance Evaluation Domain of the ISO 27001 standard. This domain is crucial for ensuring that your organization's information security management system is effective and efficient. We will...
Instructional Video1:10
Curated Video

Leadership Domain (ISO 27001)

Higher Ed
In this video, we will be discussing the Leadership Domain of the ISO 27001 standard. This domain is crucial for establishing and maintaining an effective information security management system within an organization. We will cover the...