Instructional Video4:29
Packt

Find My Device - Android

Higher Ed
This video explains the Find My Device setting in Android and how to best use it. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to Cybersecurity - Part 3".This section introduces...
Instructional Video3:15
Packt

Android Security Tweaks

Higher Ed
This video talks about a few more settings that you might need to tweak to keep your Android device safe from attacks. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to Cybersecurity...
Instructional Video6:30
Packt

How to Use Malwarebytes

Higher Ed
This video explains Malwarebytes, which is one of the main tools to beat malware, and how to best use it. This clip is from the chapter "Mobile Threats and Countermeasures" of the series "The Absolute Beginners 2023 Guide to...
Instructional Video2:09
Packt

The 4 Main Symptoms of Malware Infection

Higher Ed
This video explains the four main symptoms of a malware-infected mobile device, such as slow speed and performance, pop-up ads, and more. This clip is from the chapter "Mobile Threats and Countermeasures" of the series "The Absolute...
Instructional Video2:47
Packt

Viruses and Spyware

Higher Ed
Viruses and spyware are the two major forms of mobile malware, and this video explains what viruses and spyware are and how to protect your mobile device from them. This clip is from the chapter "Mobile Threats and Countermeasures" of...
Instructional Video2:38
Packt

4 Ways to Work Safely with Mobile Applications

Higher Ed
This video shares four ways by which you can stay safe while downloading and working with mobile applications. This clip is from the chapter "Understanding Applications" of the series "The Absolute Beginners 2023 Guide to Cybersecurity -...
Instructional Video2:06
Packt

Checking Default App Permissions - IOS

Higher Ed
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Understanding Applications" of the series "The Absolute Beginners...
Instructional Video5:46
Packt

Checking Default App Permissions - Android

Higher Ed
This video talks about the kinds of permissions the applications have on an Android device. We will look at app permissions such as Instagram, Rebtel, and introduce to you an app to manage the permissions quickly and effectively. This...
Instructional Video5:19
Packt

Understanding App Permissions

Higher Ed
This video talks about app permissions and the kind of permissions that an application demands while you install them on your phone. These permissions can be features or tools that the app needs in order to function properly. This clip...
Instructional Video7:36
Packt

The Truth about Jail Breaking an IOS Device

Higher Ed
In this video, the author talks about a practice that is common with many iPhone users—the practice of jail breaking. Apple imposes restrictions on what users can do on their iPhone/iPad as compared to Android users. This is where jail...
Instructional Video3:52
Vlogbrothers

Hackers, Cyber crime, and a New Kind of War.

6th - 11th
In which Hank talks briefly about the fundamental shift in espionage, warfare, crime, and activism that may re-define our age. Hackers have been mounting increasingly sophisticated attacks. Billions of dollars have been stolen, and even...
Instructional Video1:17
Curated Video

Additional Risks to Consider

Higher Ed
This video will extra attack vectors on Web applications
Instructional Video8:24
Curated Video

Get Started with Linux Commands

Higher Ed
This video will teach you the basic commands we will use in this course
Instructional Video6:21
Curated Video

Cracking WPA and WPA2 new 2

Higher Ed
This video will explain the difference between two famous wireless protocols, and will show you a technique on cracking the passwords by deauthenticating users connected to a specific SSID
Instructional Video3:50
Curated Video

Dynamic Analysis

Higher Ed
This video will explain Dynamic malware analysis in details, which is a runtime approach for analyzing malicious activities
Instructional Video4:24
Curated Video

Android Dynamic Malware Analysis

Higher Ed
In this tutorial, you will learn how to perform dynamic malware analysis for an APK file using MobSF or Mobile Security Framework, which is a super handy tool for analyzing Android applications.
Instructional Video2:51
Curated Video

Android Malware Analysis Introduction

Higher Ed
An introduction to malware analysis
Instructional Video5:33
Curated Video

Threat Modeling

Higher Ed
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized. In this video, you will learn about...
Instructional Video1:32
Curated Video

Open-source Intelligence (OSINT)

Higher Ed
In this video, you will learn about OSINT (Open-source intelligence), which is a multi-methods methodology for collecting, analyzing and making decisions about data accessible in publicly available sources to be used in an intelligence...
Instructional Video2:27
Curated Video

Web Applications Security Overview

Higher Ed
This video will highlight the security concerns when it comes to web applications
Instructional Video1:32
Curated Video

Understand Color Codings

Higher Ed
This video will teach you the difference in Linux terminal color coding
Instructional Video2:12
Curated Video

Browsing the Internet Safely

Higher Ed
The video highlights the tips on how to browse the internet safely and what are the risky habits to avoid over the internet
Instructional Video7:44
Curated Video

Analysis of Trojan APK

Higher Ed
This video will deep dive into the analysis of a trojan APK
Instructional Video2:53
Curated Video

Android Application Anatomy

Higher Ed
This video will shed the light on the components of an Android application