Hi, what do you want to do?
Curated Video
The Beginners 2025 Cyber Security Awareness Training Course - Targeted Email Phishing Part I
In Part I of this engaging module, you will learn how targeted email phishing is executed against you, as well as recognize some of the major red flags to be able to readily detect these emails in the future.
Curated Video
The Beginners 2025 Cyber Security Awareness Training Course - How Hard Is it to Get Hacked?
You will learn how hard it has become to hack into systems and company networks these days.
Curated Video
The Beginners 2025 Cyber Security Awareness Training Course - Smartphones and Mobile Apps Part III
In Part III, you will learn some great solutions that Google has put in place to protect you from the bad guys when you are using an Android device. We will also discuss Google Play Protect and how it is designed to help you detect and...
Curated Video
The Beginners 2025 Cyber Security Awareness Training Course - Greeting from Your Instructor, Reza
Here is a brief video introducing cyber security, and why this course is the most effective, entertaining, and memorable cyber security awareness training you will take! You will learn a little about your instructor, and what you should...
Seven Dimensions
Protecting Data and Sensitive Information at Work
An organization’s data is a valuable asset that needs to be protected from unauthorized access by competitors, cybercriminals, or any unverified third party. It is important to have strict policies around sensitive information. Know who...
Curated Video
QR Code Attacks
Delve into the world of QR code attacks in this revelatory video. Gain valuable insights into the potential risks and vulnerabilities associated with QR codes, and learn how cybercriminals exploit these seemingly harmless codes to...
Curated Video
Web Shoppers Beware: The SCOB Virus and the Threat to Online Security
This video discusses the SCOB virus, a recent web virus that has infected numerous computers and servers. The virus spreads through banner ads, pictures, and logos on trusted websites like eBay and Yahoo. Unlike traditional viruses, SCOB...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Patching and Updates
This video demonstrates how applying Windows safety patches and updates is essential in constantly keeping the system safe and how to use these patches and updates.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The World of Electronic Mails – Dangers, Attacks, and Protection
This section focuses on emails, the dangers of not protecting the emails or opening dangerous emails, how hackers attack using emails, and how to protect yourself from being hacked by emails.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Reconnaissance Methods
In this lesson, you will learn about footprinting, or the art of collecting information about a person or object of interest, called reconnaissance.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - What are Privacy, Anonymity, and Pseudonymity
In this video, you will learn more about privacy, anonymity, and pseudonymity concepts.
Curated Video
Practical Cyber Hacking Skills for Beginners - Target Reconnaissance
In this video, you will learn how to perform reconnaissance based on a specific target, usually, a location, understand the groundwork and infrastructure involved, and the possibilities of being able to hack.
Curated Video
Practical Cyber Hacking Skills for Beginners - Firewall and IDS Evasion Techniques
In this video, we will understand a firewall and the intrusion detecting system in NMAP for a packet or probe coming specifically from NMAP.
Curated Video
Practical Cyber Hacking Skills for Beginners - Phishing Notes
This continuation of the previous video explains phishing emails in detail and how to avoid phishing attacks.
Curated Video
Practical Cyber Hacking Skills for Beginners - NMAP Scripting
In this video, we will look at the different scripts used in NMAP, programs, or codes used to check the vulnerability of networks and other functional availabilities.
Curated Video
Flaws in the Internet's Border Gateway Protocol
The White House recently unveiled a plan to deal with networking weaknesses in the Border Gateway Protocol. In the past, the BGP has been exploited or misconfigured to cause massive disruptions on the Internet. Topics Covered: Biggest...
Science ABC
How Are Computer Games ‘Cracked’?
Game cracking involves bypassing security checks implemented by gaming companies. Hackers use tools such as kernel-mode debuggers, disassemblers, and hex-editors, which allow manipulation of the game's code. In this video, we will...
Curated Video
JavaScript Mastery from Zero to Hero - Prepare for Coding Interviews - Exercise - Virus Detection Algorithm with Asymmetric Arrays
This is an exercise video where you will work on a virus detection algorithm with the help of asymmetric arrays.
<
br/>
This clip is from the chapter "Algorithms and Data Structures - Intermediate to Advanced" of the series...
<
br/>
This clip is from the chapter "Algorithms and Data Structures - Intermediate to Advanced" of the series...
Curated Video
A Detailed Guide to the OWASP Top 10 - API9:2023 Improper Inventory Management
In this session, we will address the challenges of Improper Inventory Management in API ecosystems and propose solutions for better management.
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - You Have Been HACKED - Now What?
In this video, you will look at steps to take after you have been hacked and how exactly you would respond.
<
br/>
This clip is from the chapter "Conclusion" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part...
<
br/>
This clip is from the chapter "Conclusion" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Identify Legit Apps
In this video, the author shares a few tips on how to successfully navigate Google Play Store and download the right kind of application to help you identify legit apps and spot the fake apps out there.
<
br/>
This clip is from the...
<
br/>
This clip is from the...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Personal Cybersecurity - What I Do
In this video, the author talks about the necessary steps that he takes to keep himself and his data safe from malware and hackers.
<
br/>
This clip is from the chapter "Introduction" of the series "The Absolute Beginners Guide to...
<
br/>
This clip is from the chapter "Introduction" of the series "The Absolute Beginners Guide to...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - IOS
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device.
<
br/>
This clip is from the chapter "Mobile Security" of the series "The Absolute Beginners...
<
br/>
This clip is from the chapter "Mobile Security" of the series "The Absolute Beginners...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - Android
This video talks about the kinds of permissions the applications have on an Android device. We will look at app permissions such as Instagram, Rebtel, and introduce to you an app to manage the permissions quickly and effectively.
<
br/>...
<
br/>...