Curated Video
Other Phishing Techniques
The video explains the phishing attack techniques and how you can identify and avoid them
Curated Video
DKIM Email Security
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Curated Video
DNS Poisoning Attack
In this video, you will use KALI to learn how to cache poison the DNS (Domain Name Server) entries to redirect the requester to a different page.
Curated Video
Why a Regular Domain User Can be a Real Security Threat
In this video you will learn about the reasons why a regular domain user can be a real danger to your environment, and why those generic and shared Active Directory accounts should not exist.
Curated Video
Setup a Stealthy Command and Control Center Online
This video will teach you how to setup a command and control center over the internet to start you actual attacks
Curated Video
Sender Framework Policy (SPF)
In this tutorial, you will learn about SPF and how to set it up on your DNS server.
Curated Video
Bloodhound and Sharphound
Learn how attackers use Bloodhound and Sharphound to Get Active Directory Domain Admin Access.
Curated Video
Collect and Visualize Data with Maltego
This video will explain the poweful OSINT application called Maltego, and how you can leverage it in collecting open source data on your victim.
Curated Video
Pass the Hash with Mimikatz on Windows
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Curated Video
Wireshark D5 V3 - HTTP analysisDNS analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 3: DNS analysis
Curated Video
Password Spraying
Learn how to spray passwords across many accounts. Password spraying is an attack that attempts to access a large number of accounts (usernames) with a few commonly used passwords. It is different from the traditional brute-force attacks...
Curated Video
Coolest Way to Attack a Network
This video will show you how to acquire the NTLMv2 hashes of users on any Windows network, just by plugging your hacking box into that network that doesn't have any kind of NAC solution.
Curated Video
Perform a DNS Spoofing Attack
This video will teach you how to perform a DNS spoofing attack, and how to take user's URL request to a crafted web application of your own
Curated Video
LAB 3: How to Enable a Firewall
I will show you how to enable the firewall on your Windows OS
Curated Video
Linux Fundamentals - Verifying Connectivity with Remote Servers
This video explains how to verify connectivity with remote servers. This clip is from the chapter "Networking in Linux" of the series "Linux Fundamentals".This section introduces you to networking in Linux. Then, you will learn about...
Curated Video
Introduction to IT and Cybersecurity: Web Infrastructure
Part 7/16 of Introduction to IT and Cybersecurity series: This video explains the basic building blocks of the Internet, including definitions of terms like ISP, NAP, IP address, DNS, URL, protocol, cloud service provider, server, and...
Curated Video
Famous Cyber Security Frameworks
Users need standards for information technology (IT) systems in order to use IT successfully and run their organizations' operations. To connect goods created by several suppliers and transfer software, data, and applications from one...
Curated Video
Protect Yourself from Phishing Attacks
The video explains the phishing attack techniques and how you can identify and avoid them.
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - Amazon OpenSearch Service
This video explains what Amazon OpenSearch services is. This clip is from the chapter "Domain 4: Analysis" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn how to build a more complex...
Curated Video
ISO 27002-2022 Control Examples
In this video, we will be exploring ISO 27002-2022 control examples. ISO 27002-2022 is a globally recognized standard for information security management systems. It provides a framework for organizations to establish, implement,...