Instructional Video3:46
Vlogbrothers

They Hacked Me

6th - 11th
Thank you to Sherri Davidoff from LMG Security for helping me both with this video and also with recovering from my hack. If you're thinking "I won't get hacked, I'm not a public person like Hank," that does NOT protect you. Most hacks...
Instructional Video3:52
Vlogbrothers

Hackers, Cyber crime, and a New Kind of War.

6th - 11th
In which Hank talks briefly about the fundamental shift in espionage, warfare, crime, and activism that may re-define our age. Hackers have been mounting increasingly sophisticated attacks. Billions of dollars have been stolen, and even...
Instructional Video3:58
Curated Video

Wireshark D2 V7 - Global prefrences

Higher Ed
DAY TWO - We will explore Wireshark interface in details - Video 7: Configure global preferences
Instructional Video7:02
Curated Video

Wireshark D4 V4 - IPv4 Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 4: IPv4 deep-dive
Instructional Video11:12
Curated Video

Introduction to IT and Cybersecurity: IT Control Frameworks (ISO, NIST)

Higher Ed
Part 10/16 of Introduction to IT and Cybersecurity series: This video discusses the major IT control frameworks and their use in maintaining the effectiveness and efficiency of operations, financial governance, reporting, and compliance...
Instructional Video6:52
Curated Video

Wireshark D2 V6 - Statistics Menu

Higher Ed
DAY TWO - We will explore Wireshark interface in details - Video 6: Statistics menu
Instructional Video21:29
Curated Video

AWS Security Boiled Down

Higher Ed
A general overview about AWS security architecture and tools. Learn more about VPC, EC2, S3, AIM, Security Groups, and NACLs. This video will give you a quick jump into cloud security.
Instructional Video6:43
Curated Video

Introduction to IT and Cybersecurity: Functional Areas of IT Operations

Higher Ed
Part 6/16 of Introduction to IT and Cybersecurity series: The video discusses the various functional areas of an IT department, starting with the basic organizational chart that includes positions such as IT manager, CTO/CIO, application...
Instructional Video1:47
Curated Video

Dealing With Security Incidents

Higher Ed
This video will advise you on how to deal with cyber security incidents once they happen, and whom to contact in order to get help
Instructional Video2:35
Curated Video

Wireshark D1 V2 - Wireshark Throughout History

Higher Ed
DAY ONE - We will introduce Wireshark and setup our environment - Video 2: Wireshark throughout history
Instructional Video4:28
Curated Video

DKIM Email Security

Higher Ed
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Instructional Video3:40
Curated Video

Wireshark D3 V1 - How is traffic captured

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 1: How is traffic captured
Instructional Video2:30
Curated Video

Security Playbooks Benefits

Higher Ed
A cybersecurity playbook is a comprehensive, company-wide guideline that specifies exactly what steps to take in the event of data loss.
Instructional Video1:31
Curated Video

Security Misconfiguration

Higher Ed
Security configuration is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Instructional Video6:49
Curated Video

Wireshark D5 V2 - HTTP analysisFTP analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 2: FTP analysis
Instructional Video2:48
Curated Video

Wireshark D1 V1 - Master Wireshark Overview

Higher Ed
DAY ONE - We will introduce Wireshark and setup our environment - Video 1: Overview
Instructional Video3:58
Curated Video

Wireshark D5 V7 - HTTP analysisTroubleshoot your network

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 7: Troubleshoot your network
Instructional Video3:09
Curated Video

Wireshark D3 V7 - Expressions and buttons

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 7: Expressions and buttons
Instructional Video3:12
Curated Video

Wireshark D5 V1 - HTTP analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 1: HTTP analysis
Instructional Video5:43
Curated Video

Wireshark D4 V7 - ICMPv6 Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 7: ICMPv6 deep-dive
Instructional Video4:48
Curated Video

Wireshark D4 V5 - IPv6 Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 5: IPv6 deep-dive
Instructional Video4:44
Curated Video

Wireshark D2 V4 - View Menu

Higher Ed
DAY TWO - We will explore Wireshark interface in details - Video 4: View menu
Instructional Video0:50
Curated Video

Tips to Improve Your Wireless Network Security

Higher Ed
This video will teach you some tips on how to protect your network
Instructional Video2:33
Curated Video

Metasploitable VM

Higher Ed
Metasploitable MV is an intentionaly vulnerable machine by Rapid7, it is made for learning purposes. We will learn how to setup this virtual machine to exploit it in many of the videos in this course