Curated Video
Wireshark D4 V1 - 3 way handshake
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 1: 3-way handshake
Curated Video
Wireshark D3 V3 - How is traffic capturedCapture Options
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 3: Capture options
Curated Video
Wireshark D2 V8 - Confguration profiles
DAY TWO - We will explore Wireshark interface in details - Video 8: Configuration profiles
Curated Video
Wireshark D1 V3 - Setup Wireshark
DAY ONE - We will introduce Wireshark and setup our environment - Video 3: Setup Wireshark
Curated Video
How to Secure Wireless Networks
This video will show you how to hide your SSID on your WiFi network
Curated Video
Wireshark D2 V5 - Toolbars
DAY TWO - We will explore Wireshark interface in details - Video 5: Toolbars
Curated Video
Cyber Security Issues
This video sheds the light on some ethical issues of cyber security jobs
Curated Video
Run a Simple Ransomware
In this tutorial, you will learn how to create a very simple Ransomware to encrypt files, and how to use a Decrypter to gain access to these files again. THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR YOUR ACTIONS....
Curated Video
Wireshark D4 V3 - UDP Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 3: UDP deep-dive
Curated Video
How to Protect Your Data
This video introduces different techniques on how to protect your data
Curated Video
Ethical Hacking with Kali Linux Introduction
This video is an introduction on ethical hacking
Curated Video
Bluetooth Devices Recon
In this tutorial, you will learn how to recon BT devices and enumerate its services.
Curated Video
History of iPhone Attacks
In this video, we delve into the fascinating and often alarming history of iPhone attacks. From the first jailbreaks to the infamous iCloud celebrity photo leak, we explore the various ways in which hackers have targeted Apple's iconic...
Curated Video
OWASP Mobile op 10
In this video, we will be discussing the OWASP Mobile Top 10, which is a list of the most critical security risks for mobile applications. We will go through each of the top 10 risks and explain what they are, how they can be exploited,...
National Institute of Standards and Technology
Launch of the National Cybersecurity Center of Excellence
At a news briefing held on Feb. 21, 2012, the National Institute of Standards and Technology (NIST) announced the launch of the National Cybersecurity Center of Excellence, a public-private collaboration for accelerating the widespread...
Next Animation Studio
How China used iPhone hack in Uyghur genocide
MIT’s Technology Review magazine recently analyzed the infamous Chaos hack that targeted iPhones in 2018, suggesting that China used a civilian competition to create the hack and then used it to spy on its Uyghur Muslim minority. The...
National Institute of Standards and Technology
Information Technology Security For Small Business
Gives small business owners a glimpse into the resources from NIST, SBA, and the FBI that will help protect them from cyber crime. The video describes computer hacking, denial-of-service, laptop theft, insider abuse, computer viruses,...
Curated Video
Guiding Principle - Reliability and Safety
In this video, we will cover a guiding principle - reliability and safety. This clip is from the chapter "AI Workloads and Considerations (15-20%)" of the series "AI-900: Microsoft Azure AI Fundamentals Video Course + Ques".In this...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Confidentiality, Availability, and Integrity Attacks
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. It’s important to know the main...
Science360
Researchers discover how coffee house hackers are stealing computer data - Science Now 30
In this week's episode, we explore how babies learn, discover what is threatening coral reefs, see how coffee house hackers are stealing computer data, and finally, we explore how our brain remembers information. Check it out!
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Risk - Attackers and Types of Attacks - Part 1
This is the first part of the two-part video that explains risk attackers and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Next Animation Studio
North Korean hackers stole sensitive information from Microsoft users
Microsoft has filed a lawsuit against two anonymous North Korean hackers for stealing user information in a hacking operation called Thallium.
Science360
Researchers explore how babies learn! NSF Science Now 30
In this week’s episode, we explore how babies learn, discover what is threatening coral reefs, see how coffee house hackers are stealing computer data and, finally, we explore our memories. Check it out!
Science360
NSF Science Now: Episode 30
In this week's episode, we explore how babies learn, discover what is threatening coral reefs, see how coffee house hackers are stealing computer data and, finally, we explore our memories. Check it out!