Hi, what do you want to do?
Curated Video
Becoming a Cyber Security Professional - A Beginner's Career Guide - Bug Hunter
In this lesson, the author discusses a very popular career role, bug hunting and explains the role and the intricacies and criteria for the role if you are looking to become a bug hunter.
Curated Video
Becoming a Cyber Security Professional - A Beginner's Career Guide - Security Architect
In this video, we will explore the roles of security officers including that of a security architect, which is a senior position.
Curated Video
Becoming a Cyber Security Professional - A Beginner's Career Guide - Security Analyst
The first kind of job discussed in this lecture is the role of a security analyst, the prerequisites and paygrades of the job, and other information.
Curated Video
Becoming a Cyber Security Professional - A Beginner's Career Guide - Introduction
This introductory video talks about the various career roles in brief and outlines the various components required to become a successful cybersecurity professional.
Curated Video
Becoming a Cyber Security Professional - A Beginner's Career Guide - Soft Skills – Part 2
This video continues from where we left off in the previous and talks about how to communicate effectively and why it is so important to be able to communicate effectively.
Curated Video
Becoming a Cyber Security Professional - A Beginner's Career Guide - Soft Skills – Part 1
This video discusses the importance of soft skills and the importance of being able to communicate effectively and in a likeable manner.
Curated Video
Becoming a Cyber Security Professional - A Beginner's Career Guide - The Most Essential Skills to Learn
This video illustrates the essential skills that are required to be inculcated and the practical skill sets required to learn and build a cybersecurity professional career.
Curated Video
Becoming a Cyber Security Professional - A Beginner's Career Guide - You Don't need a Degree?
In this video, you will learn whether it is important to have a degree or not for a career in this industry, if so, what degrees are best suited for these job roles.
Curated Video
Becoming a Cyber Security Professional - A Beginner's Career Guide - Four Things You Must Know about a Cyber Security Career
This video elaborates on the concepts of cybersecurity briefly and outlines the prerequisites of starting a career in this discipline.
Curated Video
Becoming a Cyber Security Professional - A Beginner's Career Guide - Start and Grow your Career in Cyber Security
This brief overview talks about the course and cybersecurity in general and how this course could benefit you if you are planning to build a career in this industry.
Curated Video
Risk Management for Cyber Security Managers - Standards
This video provides an overview of the crucial role standards play in risk management, distinguishing between regulatory and non-regulatory standards, and introduces the main cybersecurity risk management frameworks from NIST and ISO.
Curated Video
CISSP Crash Course - Security Governance
This video explains security policy and how to apply security governance.
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on...
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on...
Curated Video
Ensuring Information Security: Challenges and Preparations for Major Events
The video discusses the importance of information security in the world of technology, highlighting the potential threats from organized crime and individual hackers. It also mentions the massive undertaking of ensuring information...
Curated Video
Risk Management
Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings. These risks stem from a variety of sources including financial uncertainties, legal liabilities, technology...
Curated Video
AWS Security Boiled Down
A general overview about AWS security architecture and tools. Learn more about VPC, EC2, S3, AIM, Security Groups, and NACLs. This video will give you a quick jump into cloud security.
Curated Video
Mobile Attack Surface
In this video, you will get an overview on the different types of threats that affect a mobile application.
Curated Video
Types of Data
On social networking sites like Facebook, Twitter, and Linked in, as well as online photo sharing sites like Instagram and Picasa and video sharing sites like YouTube, users are producing a lot of data. Blogs, email, text messages on...
Curated Video
Create a Simple SIEM
Learn the basic feature of SIEM solutions; logs aggregation using Powershell commands.
Curated Video
Who is Selling Your Email Addresses
This video will help you identify those companies you sign up to, who in return sell your email addresses to companies who will spam you. You can easily identify those now.
Curated Video
Hack Using Google ONLY
You will learn how to easily perform hacking using search engines and publicly available information. Find passwords, confidential files, and gain access to systems with minimum efforts.
Curated Video
DKIM Email Security
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Curated Video
Hack Using a Rogue Access Point
In this tutorial, you will learn how to create a fake wireless access point and use it to hack the users logged on to it. We will use WiFi Pineapple device.
Curated Video
DNS Poisoning Attack
In this video, you will use KALI to learn how to cache poison the DNS (Domain Name Server) entries to redirect the requester to a different page.
Curated Video
Risk Analysis
Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. This process is done in order to help organizations avoid or mitigate those risks.