Packt
Find My Device - Android
This video explains the Find My Device setting in Android and how to best use it. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to Cybersecurity - Part 3".This section introduces...
Packt
Android Security Tweaks
This video talks about a few more settings that you might need to tweak to keep your Android device safe from attacks. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to Cybersecurity...
Packt
How to Use Malwarebytes
This video explains Malwarebytes, which is one of the main tools to beat malware, and how to best use it. This clip is from the chapter "Mobile Threats and Countermeasures" of the series "The Absolute Beginners 2023 Guide to...
Packt
The 4 Main Symptoms of Malware Infection
This video explains the four main symptoms of a malware-infected mobile device, such as slow speed and performance, pop-up ads, and more. This clip is from the chapter "Mobile Threats and Countermeasures" of the series "The Absolute...
Packt
Viruses and Spyware
Viruses and spyware are the two major forms of mobile malware, and this video explains what viruses and spyware are and how to protect your mobile device from them. This clip is from the chapter "Mobile Threats and Countermeasures" of...
Packt
4 Ways to Work Safely with Mobile Applications
This video shares four ways by which you can stay safe while downloading and working with mobile applications. This clip is from the chapter "Understanding Applications" of the series "The Absolute Beginners 2023 Guide to Cybersecurity -...
Packt
Checking Default App Permissions - IOS
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Understanding Applications" of the series "The Absolute Beginners...
Packt
Checking Default App Permissions - Android
This video talks about the kinds of permissions the applications have on an Android device. We will look at app permissions such as Instagram, Rebtel, and introduce to you an app to manage the permissions quickly and effectively. This...
Packt
Understanding App Permissions
This video talks about app permissions and the kind of permissions that an application demands while you install them on your phone. These permissions can be features or tools that the app needs in order to function properly. This clip...
Packt
The Truth about Jail Breaking an IOS Device
In this video, the author talks about a practice that is common with many iPhone users—the practice of jail breaking. Apple imposes restrictions on what users can do on their iPhone/iPad as compared to Android users. This is where jail...
Vlogbrothers
Hackers, Cyber crime, and a New Kind of War.
In which Hank talks briefly about the fundamental shift in espionage, warfare, crime, and activism that may re-define our age. Hackers have been mounting increasingly sophisticated attacks. Billions of dollars have been stolen, and even...
Curated Video
Get Started with Linux Commands
This video will teach you the basic commands we will use in this course
Curated Video
Cracking WPA and WPA2 new 2
This video will explain the difference between two famous wireless protocols, and will show you a technique on cracking the passwords by deauthenticating users connected to a specific SSID
Curated Video
Dynamic Analysis
This video will explain Dynamic malware analysis in details, which is a runtime approach for analyzing malicious activities
Curated Video
Android Dynamic Malware Analysis
In this tutorial, you will learn how to perform dynamic malware analysis for an APK file using MobSF or Mobile Security Framework, which is a super handy tool for analyzing Android applications.
Curated Video
Threat Modeling
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized. In this video, you will learn about...
Curated Video
Open-source Intelligence (OSINT)
In this video, you will learn about OSINT (Open-source intelligence), which is a multi-methods methodology for collecting, analyzing and making decisions about data accessible in publicly available sources to be used in an intelligence...
Curated Video
Web Applications Security Overview
This video will highlight the security concerns when it comes to web applications
Curated Video
Understand Color Codings
This video will teach you the difference in Linux terminal color coding
Curated Video
Browsing the Internet Safely
The video highlights the tips on how to browse the internet safely and what are the risky habits to avoid over the internet
Curated Video
Android Application Anatomy
This video will shed the light on the components of an Android application