Curated Video
Decrypt SSL Session
In this video, we will intercept SSL traffic by decrypting the SSL tunnel between an APK and a server
Curated Video
Cracking WEP
This video will explain the wireless WEP protocol, and will show you how easy it is to crack routers using it
Curated Video
Unzip vs Decode
This video will explaing the differences between unzipping an APK file versus decoding it
Curated Video
DEX File
This video will explain the nature DEX file, which has a a set of bytecode instructions
Curated Video
Insecure Deserialization
Insecure deserialization is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
Decode and Decompile Android Apps
This is a hands on tutorial on how to reverse engineer an Android application
Curated Video
NMAP and ZENMAP Simplified
ZENMAP is the GUI version of NMAP, you will learn how to use both applications
Curated Video
Introducing NMAP
NMAP is the classic network scanner, in this video we will deep dive into its features
Curated Video
Understand NETBIOS and SMB Attacks
This video will teach you how to perform NETBIOS and SMB attacks using various tools in Kali
Curated Video
Update, Upgrade, and Alias Commands
This video will show you how to keep your pentest box up-to-date
Curated Video
How to Prepare and Present Your Report final mp4 new
This video will teach you how to professionally present your findings to a client
Curated Video
Cyber Security Issues
This video sheds the light on some ethical issues of cyber security jobs
Curated Video
Run a Simple Ransomware
In this tutorial, you will learn how to create a very simple Ransomware to encrypt files, and how to use a Decrypter to gain access to these files again. THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR YOUR ACTIONS....
Curated Video
Android Platform
This video explains Android platform in general. It is a pre-requisite before going ahead with the other videos.
Curated Video
Injection
SQL injection is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
Broken Access Control
This video will explain the broken access attack vector on web applications and how can attackers leverage this vulnerability to gain unauthorized access
Curated Video
Android Security Architecture
A very important video that details the security architecture of an APK app and how it interacts with the Android platform
Curated Video
Ethical Hacking with Kali Linux Introduction
This video is an introduction on ethical hacking
Curated Video
Bluetooth Devices Recon
In this tutorial, you will learn how to recon BT devices and enumerate its services.
Curated Video
Cyber Security Jobs
This video will help you explore the roles and opportunities in the cyber security world
Curated Video
Five attributes in ISO 27002
In this video, we will be discussing the five key attributes outlined in ISO 27002. ISO 27002 is a globally recognized standard for information security management systems. These attributes include confidentiality, integrity,...
Curated Video
How can ISO 27002- 2022 support ISMS certification
In this video, we will explore how ISO 27002-2022 can support ISMS certification. ISO 27002-2022 is a standard that provides guidelines for information security management systems (ISMS). It outlines best practices for managing and...
National Institute of Standards and Technology
Shaping the Future of Cybersecurity Education
Governor of Maryland, Martin O'Malley, addressed cybersecurity participants from academia, Industry, and government as the closing keynote speaker for the first day of a workshop hosted by the National Initiative on Cyber Education...