Instructional Video7:53
All In One Social Media

This social media scheduling tool is a game changer!

Higher Ed
When we are talking about simplifying our social media life being able to schedule our content is vital. So when you combine amazing social graphics and the ability to publish all in the same place for a really great price, I am all...
Instructional Video3:59
Brainwaves Video Anthology

Nick Higgins - Teachers Make a Difference - Summer Boismier

Higher Ed
Nick Higgins is the Chief Librarian at Brooklyn Public Library in charge of public service across Brooklyn. In concert with other members of the senior management team Nick leads the leads the development of transformative library...
Instructional Video21:29
Curated Video

AWS Security Boiled Down

Higher Ed
A general overview about AWS security architecture and tools. Learn more about VPC, EC2, S3, AIM, Security Groups, and NACLs. This video will give you a quick jump into cloud security.
Instructional Video7:44
Curated Video

Analysis of Trojan APK

Higher Ed
This video will deep dive into the analysis of a trojan APK
Instructional Video3:59
Curated Video

Mobile Attack Surface

Higher Ed
In this video, you will get an overview on the different types of threats that affect a mobile application.
Instructional Video3:54
Curated Video

Steps to plan a successfull pentest

Higher Ed
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Instructional Video9:47
Curated Video

Types of Data

Higher Ed
On social networking sites like Facebook, Twitter, and Linked in, as well as online photo sharing sites like Instagram and Picasa and video sharing sites like YouTube, users are producing a lot of data. Blogs, email, text messages on...
Instructional Video1:01
Curated Video

Dangerous Permissions

Higher Ed
A very important part of doing static malware analysis is to check the dangerous permissions acquired by an application. This video will teach you how to spot those dangerous permissions.
Instructional Video1:46
Curated Video

Android Security Features

Higher Ed
This video will highlight the various security features oferred by Android
Instructional Video0:56
Curated Video

Multi Factor Authentication

Higher Ed
This video will shed the light on the additional security layer you need in order to protect your everything. Multi factor authentication or MFA
Instructional Video5:28
Curated Video

Cross Site Scripting

Higher Ed
This video will explain what CSS is
Instructional Video14:07
Curated Video

GDPR Data Subjects Rights

Higher Ed
This section provides information that will help participants gain knowledge on the key concepts of the GDPR, the data protection principles, and the rights of the data subject.
Instructional Video3:35
Curated Video

Various Password Attacks

Higher Ed
This video will show you the various techniques used in hacking passowrds
Instructional Video7:11
Curated Video

How to Attack Modern Wireless Networks - Introduction

Higher Ed
This video is a general overview on how to attack wireless networks
Instructional Video6:32
Curated Video

Pass the Hash with Mimikatz on Windows

Higher Ed
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Instructional Video3:56
Curated Video

Wi-Fi Security

Higher Ed
You will learn how to protect your home WiFi and be vigilant when you are using public Wifi
Instructional Video1:13
Curated Video

God Mode on Windows 10

Higher Ed
redpython.{ED7BA470-8E54-465E-825C-99712043E01C}
Instructional Video6:13
Curated Video

Install a Backdoor

Higher Ed
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor. Use this approach ethically !!!
Instructional Video2:05
Curated Video

How to Protect Your Smartphone

Higher Ed
This video will provide you with the needful tips on how to protect your smartphone from security breaches
Instructional Video2:42
Curated Video

Handle Passwords Safely

Higher Ed
This video will introduce you to best practices in handling your passwords
Instructional Video7:57
Curated Video

GDPR Program Audit

Higher Ed
This section provides you with the techniques needed to audit your GDPR program
Instructional Video8:35
Curated Video

Execute Man-in-the-Middle Attacks

Higher Ed
Learn how to execute MITM attacks using Ettercap tool, a very powerful application in Kali
Instructional Video4:15
Curated Video

Rogue Hotpot with Fake Facebook Page

Higher Ed
Learn how to create a rogue access point, install a fake social media website, and capture the traffic. We will use Evil Portal component.
Instructional Video17:44
Curated Video

Introduction to IT and Cybersecurity: Information Protection

Higher Ed
Part 14/16 of Introduction to IT and Cybersecurity series: In this video, the presenter discusses the various approaches and controls that can be implemented to protect information. The video explains how an organization's internal...