Instructional Video3:46
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Peer Updates

Higher Ed
This video illustrates how the privacy of Windows 10 OS can be improved by turning off the peer updates features from other computers, especially where the internet is unreliable.
Instructional Video1:50
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Meet Eldo Kim

Higher Ed
This video talks about Eldo Kim and his devious plans.
Instructional Video4:43
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacking Tor - The End-to-End Correlation Hack

Higher Ed
This video will discuss a significant attack on Tor, the end-to-end correlation attack.
Instructional Video7:13
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - NordVPN

Higher Ed
In this video, the author illustrates more about NordVPN and the benefits and cons of the VPN.
Instructional Video6:45
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The Internet Protocol Suite - TCP/IP

Higher Ed
In this lesson, we will understand the two foundational protocols, TCP and IP, used on the Internet.
Instructional Video2:38
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Ethernet 101

Higher Ed
This lesson will look at the ethernet protocol, referred to as the IEEE 802.3 protocol.
Instructional Video5:21
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Hubs, Switches, and Routers

Higher Ed
This video will look at hubs, switches, and routers, how they connect to network devices, and how they establish network connections.
Instructional Video7:38
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - MAC Addresses and IP Addresses

Higher Ed
In this video, we will understand machine access control and Internet Protocol addresses.
Instructional Video12:43
Curated Video

Practical Cyber Hacking Skills for Beginners - Firewall and IDS Evasion Techniques

Higher Ed
In this video, we will understand a firewall and the intrusion detecting system in NMAP for a packet or probe coming specifically from NMAP.
Instructional Video10:43
Curated Video

Practical Cyber Hacking Skills for Beginners - Host Discovery Controls - Part 2

Higher Ed
This video continues where we left off, understanding the host discovery controls and the scanning techniques used briefly.
Instructional Video11:06
Curated Video

Practical Cyber Hacking Skills for Beginners - Host Discovery Controls

Higher Ed
In this lesson, we will look at the different probes used by the NMAP, including ICMP Echo request, TCP Syn packet to port 443, TCP ACK packet to port 80, and ICMP timestamp request.
Instructional Video1:26
Curated Video

Practical Cyber Hacking Skills for Beginners - Section Preview-6

Higher Ed
This video briefly outlines the concepts you will learn in this section regarding NMAP, its installation, and its use.
Instructional Video8:33
Curated Video

Practical Cyber Hacking Skills for Beginners - Windows 10 Firewall Demo

Higher Ed
This video walks us through the built-in firewall of the Windows 10 operating system. The advantages of using the firewall, and how it protects the operating system.
Instructional Video6:37
Curated Video

Practical Cyber Hacking Skills for Beginners - Hardening Networks

Higher Ed
Here, you will learn how to harden networks. What devices and protocols are available to harden a network from being hacked?
Instructional Video5:51
Curated Video

Practical Cyber Hacking Skills for Beginners - Ports and Protocols

Higher Ed
This video explores the ports, networks, and protocols used to operate each port.
Instructional Video9:22
Curated Video

Practical Cyber Hacking Skills for Beginners - Working with DHCP Commands

Higher Ed
This video takes us through the different commands to operate the DHCP and protect a system or network from attacks.
Instructional Video0:49
Curated Video

Practical Cyber Hacking Skills for Beginners - Fixing NAT Network Issue

Higher Ed
This video demonstrates the minor fixes for errors that might occur during the Kali Linux installation.
Instructional Video6:19
Curated Video

Practical Cyber Hacking Skills for Beginners - The Hacking Methodology

Higher Ed
Here, you will learn more about the different hacking methodologies that hackers employ to cause harm to a system or a network and also understand the possibilities of minimizing the attacks.
Instructional Video6:48
Curated Video

Practical Cyber Hacking Skills for Beginners - Ransomware

Higher Ed
In this video, you will learn about ransomware, the types of ransomwares, the effects and harm that the ransomware causes, and how to minimize the damage.
Instructional Video5:20
Curated Video

Practical Cyber Hacking Skills for Beginners - Malware Revisited

Higher Ed
This video revisits the concepts of malware, the kinds of malware, and the options available to us to mitigate the problem as much as possible.
Instructional Video5:32
Curated Video

Practical Cyber Hacking Skills for Beginners - The Bad Guys - Black Hats, Cyber Criminals and Disgruntled Employees

Higher Ed
Here, you will learn more about hackers, how they operate, their intentions, and how they differ based on the hacking methodologies.
Instructional Video11:08
Curated Video

Risk Management for Cyber Security Managers - Business Continuity and Disaster Recovery Plans

Higher Ed
This video elaborates on how an organization can develop a plan for continuity or recovery when a cyber-attack occurs.
Instructional Video8:19
Curated Video

Risk Management for Cyber Security Managers - Implementation of Security Controls

Higher Ed
This lesson will look at the practical methods available to implement security controls in order to avoid/mitigate risks.
Instructional Video4:41
Curated Video

Risk Management for Cyber Security Managers - Third-Party Cyber Risk Management

Higher Ed
This video elaborates on the various options for transferring or outsourcing risk management to a third party or a vendor.