Instructional Video1:54
Curated Video

The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Introduction

Higher Ed
This video introduces you to the section where the author will talk about mobile applications. The author helps you understand how an application works and the more applications you have on your device, the more you are prone to...
Instructional Video2:39
Curated Video

The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Android Versus Apple Versus Blackberry

Higher Ed
This video helps us compare the top three mobile operating systems, which are Android, Apple, and Blackberry. The author will take you through the major pros and cons of using each one. By the end of the video, you will understand which...
Instructional Video1:04
Curated Video

The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Mobile Device Usage - The Astounding Number

Higher Ed
This video helps us understand mobile usage and a few surprising numbers associated with it. As of January 2018, the global mobile population amounted to 3.7 billion unique users and an average person spends more than five hours a day on...
Instructional Video2:07
Packt

Find My iPhone

Higher Ed
This video talks about the Find My iPhone service; this tool allows you to physically locate your iPhone in case you misplace your phone, or it's stolen. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute...
Instructional Video4:29
Packt

Find My Device - Android

Higher Ed
This video explains the Find My Device setting in Android and how to best use it. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to Cybersecurity - Part 3".This section introduces...
Instructional Video3:15
Packt

Android Security Tweaks

Higher Ed
This video talks about a few more settings that you might need to tweak to keep your Android device safe from attacks. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to Cybersecurity...
Instructional Video6:30
Packt

How to Use Malwarebytes

Higher Ed
This video explains Malwarebytes, which is one of the main tools to beat malware, and how to best use it. This clip is from the chapter "Mobile Threats and Countermeasures" of the series "The Absolute Beginners 2023 Guide to...
Instructional Video2:09
Packt

The 4 Main Symptoms of Malware Infection

Higher Ed
This video explains the four main symptoms of a malware-infected mobile device, such as slow speed and performance, pop-up ads, and more. This clip is from the chapter "Mobile Threats and Countermeasures" of the series "The Absolute...
Instructional Video2:47
Packt

Viruses and Spyware

Higher Ed
Viruses and spyware are the two major forms of mobile malware, and this video explains what viruses and spyware are and how to protect your mobile device from them. This clip is from the chapter "Mobile Threats and Countermeasures" of...
Instructional Video2:38
Packt

4 Ways to Work Safely with Mobile Applications

Higher Ed
This video shares four ways by which you can stay safe while downloading and working with mobile applications. This clip is from the chapter "Understanding Applications" of the series "The Absolute Beginners 2023 Guide to Cybersecurity -...
Instructional Video2:06
Packt

Checking Default App Permissions - IOS

Higher Ed
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Understanding Applications" of the series "The Absolute Beginners...
Instructional Video5:46
Packt

Checking Default App Permissions - Android

Higher Ed
This video talks about the kinds of permissions the applications have on an Android device. We will look at app permissions such as Instagram, Rebtel, and introduce to you an app to manage the permissions quickly and effectively. This...
Instructional Video5:19
Packt

Understanding App Permissions

Higher Ed
This video talks about app permissions and the kind of permissions that an application demands while you install them on your phone. These permissions can be features or tools that the app needs in order to function properly. This clip...
Instructional Video7:36
Packt

The Truth about Jail Breaking an IOS Device

Higher Ed
In this video, the author talks about a practice that is common with many iPhone users—the practice of jail breaking. Apple imposes restrictions on what users can do on their iPhone/iPad as compared to Android users. This is where jail...
Instructional Video3:52
Vlogbrothers

Hackers, Cyber crime, and a New Kind of War.

6th - 11th
In which Hank talks briefly about the fundamental shift in espionage, warfare, crime, and activism that may re-define our age. Hackers have been mounting increasingly sophisticated attacks. Billions of dollars have been stolen, and even...
Instructional Video1:17
Curated Video

Additional Risks to Consider

Higher Ed
This video will extra attack vectors on Web applications
Instructional Video8:24
Curated Video

Get Started with Linux Commands

Higher Ed
This video will teach you the basic commands we will use in this course
Instructional Video6:21
Curated Video

Cracking WPA and WPA2 new 2

Higher Ed
This video will explain the difference between two famous wireless protocols, and will show you a technique on cracking the passwords by deauthenticating users connected to a specific SSID
Instructional Video3:50
Curated Video

Dynamic Analysis

Higher Ed
This video will explain Dynamic malware analysis in details, which is a runtime approach for analyzing malicious activities
Instructional Video4:24
Curated Video

Android Dynamic Malware Analysis

Higher Ed
In this tutorial, you will learn how to perform dynamic malware analysis for an APK file using MobSF or Mobile Security Framework, which is a super handy tool for analyzing Android applications.
Instructional Video2:51
Curated Video

Android Malware Analysis Introduction

Higher Ed
An introduction to malware analysis
Instructional Video5:33
Curated Video

Threat Modeling

Higher Ed
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized. In this video, you will learn about...
Instructional Video3:57
Curated Video

SE Attack Vectors

Higher Ed
This video will explain the various attack vectors used in social engineering
Instructional Video5:06
Curated Video

Static vs Dynamic Malware Analysis

Higher Ed
The video will explain the main differences between two major approaches in analyzing malware. Static and Dynamic.