Curated Video
Beyond The Textbooks
Physicist Paul Steinhardt, Princeton University, describes his early experiences that led him on the road towards the discovery of so-called quasicrystals, a new state of matter.
Curated Video
The Mentalizing Brain
UCL developmental psychologist Uta Frith describes how she used brain scanning technology to illustrate that the brain uses specific networks when involved in so-called “mentalizing activities” central to understanding autism.
Curated Video
Out of Thin Air
Psychologist and memory scientist Elizabeth Loftus (UC Irvine) describes her confusion at the scientific basis for so-called "repressed memory therapy," and how her puzzlement led to future research avenues.
Curated Video
Networks, Limbic Tissue & Memory
Cognitive scientist Lisa Feldman Barrett (Northeastern) highlights the key roles that brain networks play in key areas of cognition, including memory.
Global Health with Greg Martin
How to survive your MPH
If you're about to or have started a Master of Public Health degree or MSc Public Health, then this video will talk you through what you need to do to get the most out of the experience. Public Health includes health promotion, health...
Curated Video
Wireshark D2 V7 - Global prefrences
DAY TWO - We will explore Wireshark interface in details - Video 7: Configure global preferences
Curated Video
Wireshark D4 V4 - IPv4 Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 4: IPv4 deep-dive
Curated Video
Wireshark D2 V6 - Statistics Menu
DAY TWO - We will explore Wireshark interface in details - Video 6: Statistics menu
Curated Video
Steps to plan a successfull pentest
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Curated Video
Create a Simple SIEM
Learn the basic feature of SIEM solutions; logs aggregation using Powershell commands.
Curated Video
Identify a DNS Zone Transfer Vulnerability
Learn how to check for the DNS zone transfer vulnerability, a serious weakness that might lead to fully leaking your domain information.
Curated Video
Wireshark D1 V2 - Wireshark Throughout History
DAY ONE - We will introduce Wireshark and setup our environment - Video 2: Wireshark throughout history
Curated Video
Types of Attackers and Cybersecurity Professionals
In the field of information security, there are three well-known categories of hackers: black hats, white hats, and grey hats. In an effort to set themselves apart from one another and distinguish the good hackers from the evil, hackers...
Curated Video
Wireshark D3 V1 - How is traffic captured
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 1: How is traffic captured
Curated Video
How to Detect Attacks
standard software and files that won't run or open. Without your knowledge, files have been removed or their contents have changed. Passwords have unexpectedly changed, you discover. Unknown software arrives or starts installing all of a...
Curated Video
Security Playbooks Benefits
A cybersecurity playbook is a comprehensive, company-wide guideline that specifies exactly what steps to take in the event of data loss.
Curated Video
Why a Regular Domain User Can be a Real Security Threat
In this video you will learn about the reasons why a regular domain user can be a real danger to your environment, and why those generic and shared Active Directory accounts should not exist.
Curated Video
Wireshark D5 V2 - HTTP analysisFTP analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 2: FTP analysis
Curated Video
Wireshark D1 V1 - Master Wireshark Overview
DAY ONE - We will introduce Wireshark and setup our environment - Video 1: Overview
Curated Video
Managed Services
An MSSP (managed security service provider) offers outsourced management and monitoring of security systems and equipment. Managed firewall, intrusion detection, virtual private network, vulnerability screening, and anti-viral services...
Curated Video
Wireshark D5 V7 - HTTP analysisTroubleshoot your network
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 7: Troubleshoot your network
Curated Video
Firewalls and Security Appliances
Any type of server appliance intended to safeguard computer networks from unauthorized traffic is referred to as a security appliance.
Curated Video
Wireshark D3 V7 - Expressions and buttons
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 7: Expressions and buttons
Curated Video
No Password !! No Issue, You Can Still Hack
No Password !! No Issue, You Can Still Hack