All In One Social Media
This social media scheduling tool is a game changer!
When we are talking about simplifying our social media life being able to schedule our content is vital. So when you combine amazing social graphics and the ability to publish all in the same place for a really great price, I am all...
Brainwaves Video Anthology
Nick Higgins - Teachers Make a Difference - Summer Boismier
Nick Higgins is the Chief Librarian at Brooklyn Public Library in charge of public service across Brooklyn. In concert with other members of the senior management team Nick leads the leads the development of transformative library...
Curated Video
AWS Security Boiled Down
A general overview about AWS security architecture and tools. Learn more about VPC, EC2, S3, AIM, Security Groups, and NACLs. This video will give you a quick jump into cloud security.
Curated Video
Mobile Attack Surface
In this video, you will get an overview on the different types of threats that affect a mobile application.
Curated Video
Steps to plan a successfull pentest
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Curated Video
Types of Data
On social networking sites like Facebook, Twitter, and Linked in, as well as online photo sharing sites like Instagram and Picasa and video sharing sites like YouTube, users are producing a lot of data. Blogs, email, text messages on...
Curated Video
Dangerous Permissions
A very important part of doing static malware analysis is to check the dangerous permissions acquired by an application. This video will teach you how to spot those dangerous permissions.
Curated Video
Android Security Features
This video will highlight the various security features oferred by Android
Curated Video
Multi Factor Authentication
This video will shed the light on the additional security layer you need in order to protect your everything. Multi factor authentication or MFA
Curated Video
GDPR Data Subjects Rights
This section provides information that will help participants gain knowledge on the key concepts of the GDPR, the data protection principles, and the rights of the data subject.
Curated Video
Various Password Attacks
This video will show you the various techniques used in hacking passowrds
Curated Video
How to Attack Modern Wireless Networks - Introduction
This video is a general overview on how to attack wireless networks
Curated Video
Pass the Hash with Mimikatz on Windows
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Curated Video
Wi-Fi Security
You will learn how to protect your home WiFi and be vigilant when you are using public Wifi
Curated Video
Install a Backdoor
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor. Use this approach ethically !!!
Curated Video
How to Protect Your Smartphone
This video will provide you with the needful tips on how to protect your smartphone from security breaches
Curated Video
Handle Passwords Safely
This video will introduce you to best practices in handling your passwords
Curated Video
GDPR Program Audit
This section provides you with the techniques needed to audit your GDPR program
Curated Video
Execute Man-in-the-Middle Attacks
Learn how to execute MITM attacks using Ettercap tool, a very powerful application in Kali
Curated Video
Rogue Hotpot with Fake Facebook Page
Learn how to create a rogue access point, install a fake social media website, and capture the traffic. We will use Evil Portal component.
Curated Video
Introduction to IT and Cybersecurity: Information Protection
Part 14/16 of Introduction to IT and Cybersecurity series: In this video, the presenter discusses the various approaches and controls that can be implemented to protect information. The video explains how an organization's internal...