Vlogbrothers
They Hacked Me
Thank you to Sherri Davidoff from LMG Security for helping me both with this video and also with recovering from my hack. If you're thinking "I won't get hacked, I'm not a public person like Hank," that does NOT protect you. Most hacks...
Vlogbrothers
Hackers, Cyber crime, and a New Kind of War.
In which Hank talks briefly about the fundamental shift in espionage, warfare, crime, and activism that may re-define our age. Hackers have been mounting increasingly sophisticated attacks. Billions of dollars have been stolen, and even...
Curated Video
Wireshark D2 V7 - Global prefrences
DAY TWO - We will explore Wireshark interface in details - Video 7: Configure global preferences
Curated Video
Wireshark D4 V4 - IPv4 Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 4: IPv4 deep-dive
Curated Video
Introduction to IT and Cybersecurity: IT Control Frameworks (ISO, NIST)
Part 10/16 of Introduction to IT and Cybersecurity series: This video discusses the major IT control frameworks and their use in maintaining the effectiveness and efficiency of operations, financial governance, reporting, and compliance...
Curated Video
Wireshark D2 V6 - Statistics Menu
DAY TWO - We will explore Wireshark interface in details - Video 6: Statistics menu
Curated Video
AWS Security Boiled Down
A general overview about AWS security architecture and tools. Learn more about VPC, EC2, S3, AIM, Security Groups, and NACLs. This video will give you a quick jump into cloud security.
Curated Video
Introduction to IT and Cybersecurity: Functional Areas of IT Operations
Part 6/16 of Introduction to IT and Cybersecurity series: The video discusses the various functional areas of an IT department, starting with the basic organizational chart that includes positions such as IT manager, CTO/CIO, application...
Curated Video
Dealing With Security Incidents
This video will advise you on how to deal with cyber security incidents once they happen, and whom to contact in order to get help
Curated Video
Wireshark D1 V2 - Wireshark Throughout History
DAY ONE - We will introduce Wireshark and setup our environment - Video 2: Wireshark throughout history
Curated Video
DKIM Email Security
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Curated Video
Wireshark D3 V1 - How is traffic captured
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 1: How is traffic captured
Curated Video
Security Playbooks Benefits
A cybersecurity playbook is a comprehensive, company-wide guideline that specifies exactly what steps to take in the event of data loss.
Curated Video
Security Misconfiguration
Security configuration is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
Wireshark D5 V2 - HTTP analysisFTP analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 2: FTP analysis
Curated Video
Wireshark D1 V1 - Master Wireshark Overview
DAY ONE - We will introduce Wireshark and setup our environment - Video 1: Overview
Curated Video
Wireshark D5 V7 - HTTP analysisTroubleshoot your network
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 7: Troubleshoot your network
Curated Video
Wireshark D3 V7 - Expressions and buttons
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 7: Expressions and buttons
Curated Video
Wireshark D5 V1 - HTTP analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 1: HTTP analysis
Curated Video
Wireshark D4 V7 - ICMPv6 Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 7: ICMPv6 deep-dive
Curated Video
Wireshark D4 V5 - IPv6 Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 5: IPv6 deep-dive
Curated Video
Wireshark D2 V4 - View Menu
DAY TWO - We will explore Wireshark interface in details - Video 4: View menu
Curated Video
Tips to Improve Your Wireless Network Security
This video will teach you some tips on how to protect your network
Curated Video
Metasploitable VM
Metasploitable MV is an intentionaly vulnerable machine by Rapid7, it is made for learning purposes. We will learn how to setup this virtual machine to exploit it in many of the videos in this course