Curated Video
CISSP Crash Course - Security Governance
This video explains security policy and how to apply security governance. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Curated Video
Ensuring Information Security: Challenges and Preparations for Major Events
The video discusses the importance of information security in the world of technology, highlighting the potential threats from organized crime and individual hackers. It also mentions the massive undertaking of ensuring information...
Curated Video
Risk Management
Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings. These risks stem from a variety of sources including financial uncertainties, legal liabilities, technology...
Curated Video
AWS Security Boiled Down
A general overview about AWS security architecture and tools. Learn more about VPC, EC2, S3, AIM, Security Groups, and NACLs. This video will give you a quick jump into cloud security.
Curated Video
Mobile Attack Surface
In this video, you will get an overview on the different types of threats that affect a mobile application.
Curated Video
Types of Data
On social networking sites like Facebook, Twitter, and Linked in, as well as online photo sharing sites like Instagram and Picasa and video sharing sites like YouTube, users are producing a lot of data. Blogs, email, text messages on...
Curated Video
Create a Simple SIEM
Learn the basic feature of SIEM solutions; logs aggregation using Powershell commands.
Curated Video
Who is Selling Your Email Addresses
This video will help you identify those companies you sign up to, who in return sell your email addresses to companies who will spam you. You can easily identify those now.
Curated Video
Hack Using Google ONLY
You will learn how to easily perform hacking using search engines and publicly available information. Find passwords, confidential files, and gain access to systems with minimum efforts.
Curated Video
DKIM Email Security
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Curated Video
Hack Using a Rogue Access Point
In this tutorial, you will learn how to create a fake wireless access point and use it to hack the users logged on to it. We will use WiFi Pineapple device.
Curated Video
DNS Poisoning Attack
In this video, you will use KALI to learn how to cache poison the DNS (Domain Name Server) entries to redirect the requester to a different page.
Curated Video
Risk Analysis
Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. This process is done in order to help organizations avoid or mitigate those risks.
Curated Video
Why a Regular Domain User Can be a Real Security Threat
In this video you will learn about the reasons why a regular domain user can be a real danger to your environment, and why those generic and shared Active Directory accounts should not exist.
Curated Video
Hack an Android Phone
In this video, you will learn how to hack into an android phone by deploying a malicious application. Gain total control over the mobile phone and manage it through Armitage on KALI.
Curated Video
Hidden Tear Ransomware Setup
In this tutorial, you will learn how to customize one of the publicly available forks of the Hidden Tear Ransomware, and how to deploy it. Use this only for learning purposes. Use this only in test VM environment. I'm not responsible for...
Curated Video
Create Your First Trojan
In this video, you will learn how to create your first Trojan file, and how to use this file once it is invoked by the victim. The Trojan file is moved to the victim's machine by using various social engineering techniques.
Curated Video
Takeover a Database Server
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully. Use this technique ethically.
Curated Video
Hashing in a Nutshell
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Curated Video
Bloodhound and Sharphound
Learn how attackers use Bloodhound and Sharphound to Get Active Directory Domain Admin Access.
Curated Video
Hide a Payload in an Image
In this video, you will learn how to hide a payload in a JPEG image.
Curated Video
Install a Backdoor
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor. Use this approach ethically !!!