Instructional Video10:29
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - User Redirection through window.opener Tabnabbing – Part 1

Higher Ed
This is the first of the two-part video that talks about how to attack through link. You will work on the user redirection through window.opener tabnabbing. This clip is from the chapter "Hacking Web Applications through PDFs, Images,...
Instructional Video5:49
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - XSS through Image – Part 2

Higher Ed
This is the second of the two-part video that demonstrates the XSS through Image. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation...
Instructional Video4:09
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - XSS through Image – Part 1

Higher Ed
This is first of the two-part video that talks about the theoretical part as to how to attack the image. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert...
Instructional Video15:49
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Token Hijacking through PDF – Part 2

Higher Ed
This is the second of the two-part video that demonstrates token hijacking through PDF. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation...
Instructional Video10:18
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Token Hijacking through PDF – Part 1

Higher Ed
This is the first of the two-part video that demonstrates token hijacking through PDF. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation...
Instructional Video1:31
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Hacking Web Applications via PDFs, Images, and Links

Higher Ed
This video introduces the section. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking web...
Instructional Video17:49
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through AngularJS

Higher Ed
This video explains and demonstrates the bypassing of CSP through AngularJS. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation...
Instructional Video10:43
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through Flash File

Higher Ed
This video demonstrates bypassing CSP through flash file. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section...
Instructional Video1:50
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Bypassing Content Security Policy in Modern Web Applications

Higher Ed
This video introduces the section. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on bypassing Content...
Instructional Video2:04
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction

Higher Ed
This clip is from the chapter "Introduction to the Course" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section introduces the course.
Instructional Video8:38
Curated Video

Modern Espionage: How Your Privacy is Being Compromised

6th - Higher Ed
Discover the surprising ways in which your privacy can be invaded in the modern world. From hidden cameras in everyday objects to sophisticated hacking techniques, learn how spies can access your Smartphone, computer, and even capture...
Instructional Video1:41
The Business Professor

Phishing

Higher Ed
Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
Instructional Video27:57
Neuro Transmissions

The scandal that shook psychology to its core

12th - Higher Ed
In 2011, a scandal broke in psychology that made everyone question whether any of its research could really be believed. For the last decade, psychology has grappled with the aftermath and has tried to understand what went wrong. The...
Instructional Video3:46
Vlogbrothers

They Hacked Me

6th - 11th
Thank you to Sherri Davidoff from LMG Security for helping me both with this video and also with recovering from my hack. If you're thinking "I won't get hacked, I'm not a public person like Hank," that does NOT protect you. Most hacks...
Instructional Video1:17
Curated Video

Additional Risks to Consider

Higher Ed
This video will extra attack vectors on Web applications
Instructional Video8:24
Curated Video

Get Started with Linux Commands

Higher Ed
This video will teach you the basic commands we will use in this course
Instructional Video6:21
Curated Video

Cracking WPA and WPA2 new 2

Higher Ed
This video will explain the difference between two famous wireless protocols, and will show you a technique on cracking the passwords by deauthenticating users connected to a specific SSID
Instructional Video4:24
Curated Video

Android Dynamic Malware Analysis

Higher Ed
In this tutorial, you will learn how to perform dynamic malware analysis for an APK file using MobSF or Mobile Security Framework, which is a super handy tool for analyzing Android applications.
Instructional Video5:33
Curated Video

Threat Modeling

Higher Ed
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized. In this video, you will learn about...
Instructional Video1:32
Curated Video

Open-source Intelligence (OSINT)

Higher Ed
In this video, you will learn about OSINT (Open-source intelligence), which is a multi-methods methodology for collecting, analyzing and making decisions about data accessible in publicly available sources to be used in an intelligence...
Instructional Video2:27
Curated Video

Web Applications Security Overview

Higher Ed
This video will highlight the security concerns when it comes to web applications
Instructional Video1:32
Curated Video

Understand Color Codings

Higher Ed
This video will teach you the difference in Linux terminal color coding
Instructional Video3:59
Curated Video

Mobile Attack Surface

Higher Ed
In this video, you will get an overview on the different types of threats that affect a mobile application.
Instructional Video5:59
Curated Video

Web Applications Attack Surface

Higher Ed
This video will shed the light on all possible attack vectors for web applications