Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Peer Updates
This video illustrates how the privacy of Windows 10 OS can be improved by turning off the peer updates features from other computers, especially where the internet is unreliable.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Meet Eldo Kim
This video talks about Eldo Kim and his devious plans.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacking Tor - The End-to-End Correlation Hack
This video will discuss a significant attack on Tor, the end-to-end correlation attack.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - NordVPN
In this video, the author illustrates more about NordVPN and the benefits and cons of the VPN.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The Internet Protocol Suite - TCP/IP
In this lesson, we will understand the two foundational protocols, TCP and IP, used on the Internet.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Ethernet 101
This lesson will look at the ethernet protocol, referred to as the IEEE 802.3 protocol.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Hubs, Switches, and Routers
This video will look at hubs, switches, and routers, how they connect to network devices, and how they establish network connections.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - MAC Addresses and IP Addresses
In this video, we will understand machine access control and Internet Protocol addresses.
Curated Video
Practical Cyber Hacking Skills for Beginners - Firewall and IDS Evasion Techniques
In this video, we will understand a firewall and the intrusion detecting system in NMAP for a packet or probe coming specifically from NMAP.
Curated Video
Practical Cyber Hacking Skills for Beginners - Host Discovery Controls - Part 2
This video continues where we left off, understanding the host discovery controls and the scanning techniques used briefly.
Curated Video
Practical Cyber Hacking Skills for Beginners - Host Discovery Controls
In this lesson, we will look at the different probes used by the NMAP, including ICMP Echo request, TCP Syn packet to port 443, TCP ACK packet to port 80, and ICMP timestamp request.
Curated Video
Practical Cyber Hacking Skills for Beginners - Section Preview-6
This video briefly outlines the concepts you will learn in this section regarding NMAP, its installation, and its use.
Curated Video
Practical Cyber Hacking Skills for Beginners - Windows 10 Firewall Demo
This video walks us through the built-in firewall of the Windows 10 operating system. The advantages of using the firewall, and how it protects the operating system.
Curated Video
Practical Cyber Hacking Skills for Beginners - Hardening Networks
Here, you will learn how to harden networks. What devices and protocols are available to harden a network from being hacked?
Curated Video
Practical Cyber Hacking Skills for Beginners - Ports and Protocols
This video explores the ports, networks, and protocols used to operate each port.
Curated Video
Practical Cyber Hacking Skills for Beginners - Working with DHCP Commands
This video takes us through the different commands to operate the DHCP and protect a system or network from attacks.
Curated Video
Practical Cyber Hacking Skills for Beginners - Fixing NAT Network Issue
This video demonstrates the minor fixes for errors that might occur during the Kali Linux installation.
Curated Video
Practical Cyber Hacking Skills for Beginners - The Hacking Methodology
Here, you will learn more about the different hacking methodologies that hackers employ to cause harm to a system or a network and also understand the possibilities of minimizing the attacks.
Curated Video
Practical Cyber Hacking Skills for Beginners - Ransomware
In this video, you will learn about ransomware, the types of ransomwares, the effects and harm that the ransomware causes, and how to minimize the damage.
Curated Video
Practical Cyber Hacking Skills for Beginners - Malware Revisited
This video revisits the concepts of malware, the kinds of malware, and the options available to us to mitigate the problem as much as possible.
Curated Video
Practical Cyber Hacking Skills for Beginners - The Bad Guys - Black Hats, Cyber Criminals and Disgruntled Employees
Here, you will learn more about hackers, how they operate, their intentions, and how they differ based on the hacking methodologies.
Curated Video
Risk Management for Cyber Security Managers - Business Continuity and Disaster Recovery Plans
This video elaborates on how an organization can develop a plan for continuity or recovery when a cyber-attack occurs.
Curated Video
Risk Management for Cyber Security Managers - Implementation of Security Controls
This lesson will look at the practical methods available to implement security controls in order to avoid/mitigate risks.
Curated Video
Risk Management for Cyber Security Managers - Third-Party Cyber Risk Management
This video elaborates on the various options for transferring or outsourcing risk management to a third party or a vendor.