Instructional Video3:46
Vlogbrothers

They Hacked Me

6th - 11th
Thank you to Sherri Davidoff from LMG Security for helping me both with this video and also with recovering from my hack. If you're thinking "I won't get hacked, I'm not a public person like Hank," that does NOT protect you. Most hacks...
Instructional Video1:17
Curated Video

Additional Risks to Consider

Higher Ed
This video will extra attack vectors on Web applications
Instructional Video8:24
Curated Video

Get Started with Linux Commands

Higher Ed
This video will teach you the basic commands we will use in this course
Instructional Video6:21
Curated Video

Cracking WPA and WPA2 new 2

Higher Ed
This video will explain the difference between two famous wireless protocols, and will show you a technique on cracking the passwords by deauthenticating users connected to a specific SSID
Instructional Video4:24
Curated Video

Android Dynamic Malware Analysis

Higher Ed
In this tutorial, you will learn how to perform dynamic malware analysis for an APK file using MobSF or Mobile Security Framework, which is a super handy tool for analyzing Android applications.
Instructional Video5:33
Curated Video

Threat Modeling

Higher Ed
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized. In this video, you will learn about...
Instructional Video3:57
Curated Video

SE Attack Vectors

Higher Ed
This video will explain the various attack vectors used in social engineering
Instructional Video1:32
Curated Video

Open-source Intelligence (OSINT)

Higher Ed
In this video, you will learn about OSINT (Open-source intelligence), which is a multi-methods methodology for collecting, analyzing and making decisions about data accessible in publicly available sources to be used in an intelligence...
Instructional Video2:27
Curated Video

Web Applications Security Overview

Higher Ed
This video will highlight the security concerns when it comes to web applications
Instructional Video7:07
Curated Video

Reverse Engineer an Android Application

Higher Ed
This is a hands on tutorial on how to reverse engineer an Android application
Instructional Video1:32
Curated Video

Understand Color Codings

Higher Ed
This video will teach you the difference in Linux terminal color coding
Instructional Video3:59
Curated Video

Mobile Attack Surface

Higher Ed
In this video, you will get an overview on the different types of threats that affect a mobile application.
Instructional Video5:59
Curated Video

Web Applications Attack Surface

Higher Ed
This video will shed the light on all possible attack vectors for web applications
Instructional Video3:54
Curated Video

Steps to plan a successfull pentest

Higher Ed
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Instructional Video6:52
Curated Video

Hack Facebook, Twitter, and Gmail Accounts

Higher Ed
We will use the SET tool to setup a phishing campaign in order to hack social media accounts
Instructional Video3:59
Curated Video

Mobile Attacks Surface

Higher Ed
This video will shed the light on all possible attack vectors for mobile phones
Instructional Video4:19
Curated Video

Crack Passwords with Rainbow Tables

Higher Ed
This video will explain the concept of Rainbow tables, and how you can use them to expedite password cracking time
Instructional Video8:07
Curated Video

The Powerful Armitage Tool

Higher Ed
This video will demonstrate the powerful armitage tool, which is a GUI application for the metasploit framework
Instructional Video0:59
Curated Video

Root User Color Coding

Higher Ed
This video will show you how to change the color of the terminal when using a root user
Instructional Video3:43
Curated Video

Identify a DNS Zone Transfer Vulnerability

Higher Ed
Learn how to check for the DNS zone transfer vulnerability, a serious weakness that might lead to fully leaking your domain information.
Instructional Video10:09
Curated Video

Design Effective Wordlists

Higher Ed
Learn how to effectively create wordlists that will aid you in cracking passwords
Instructional Video1:51
Curated Video

Who is Selling Your Email Addresses

Higher Ed
This video will help you identify those companies you sign up to, who in return sell your email addresses to companies who will spam you. You can easily identify those now.
Instructional Video9:29
Curated Video

Getting Started With Powershell Empire

Higher Ed
This video will show you how to install Powershell Empire and install a keylogger on a victim's machine. A jump-start tutorial on how to use this tool.
Instructional Video8:26
Curated Video

Control a Database Server with SQLMap-2 new

Higher Ed
This video will show you how to leverage SQL injection vulnerability to take full control over a Database server