Curated Video
Practical Cyber Hacking Skills for Beginners - Section Preview-5
This video briefly outlines the section concepts, including a typical home network setup, DHCP and DNS, commands used in them, TCP versus UDP, and firewalls and hardening networks to prevent attacks.
Curated Video
Risk Management for Cyber Security Managers - Implementation of Security Controls
This lesson will look at the practical methods available to implement security controls in order to avoid/mitigate risks.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Anonymizer
In this video, we will look at the tools and software used to make activity on the Internet untraceable.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Working with Security Groups
You might wonder how you can control who has access to the EC2 instances you implement. One method is with the use of security groups and this video introduces the concept.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Security Groups Overview
If you have worked around networking for a while, you have probably heard of groups or security groups. AWS offers security groups, but they are different from the traditional concept, and this video explains how.
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Dumping Database Table Entries Demo
This is a demo video on how to dump database table entries. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - The Basics of Sqlmap Demo
This is a demo video of the basics of Sqlmap. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on how...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Dealing with Threats
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This video covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Windows Firewall
Like all operating systems, Windows comes with a built-in software firewall. Unlike the firewall on your router, this firewall only protects a single system. It's important for techs – and the users they support – to understand how to...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Firewall Configuration
Setting up a hardware firewall is an obvious first step to making sure your network is protected. Even the most basic router has several different types of firewall settings – without proper configuration, you will either leave your...
Curated Video
Linux Operating System: A Complete Linux Guide for Beginners - Firewall
In this video, we will discuss about firewall. This clip is from the chapter "Networking" of the series "Linux Operating System: A Complete Linux Guide for Beginners".In this section, we will cover networking, learn how to check our IP...
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Network Firewalls
Let's understand network firewalls, security devices used to stop or mitigate unauthorized access to private networks connected to the Internet, especially intranets.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Introduction to Firewalls
You will now learn the basics of firewalls. Firewalls use stateful filtering to keep track of all incoming and outgoing connections.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Introduction to Security Groups
This lecture illustrates in detail security groups. You will learn about some of the key characteristics of a security group.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Hosted Software Firewalls UFW
Learn how to use UFW (Uncomplicated Firewall) to manage your firewall on Ubuntu, Debian, or Arch Linux.
Curated Video
Real-World DevOps Project From Start to Finish - iRedMail - Part 3
In this video, we take a deep dive into advanced configurations of iRedMail and learn to implement anti-spam measures, enable SSL/TLS encryption for secure communication, and establish effective backup strategies to safeguard your email...
Curated Video
Real-World DevOps Project From Start to Finish - Docker - Part 3
This video will teach us about Docker's best practices and optimization techniques. We will discover strategies for building efficient Docker images, managing container resources, and securing our Docker environment. This clip is from...
Curated Video
Real-World DevOps Project From Start to Finish - Security - SSH Daemon, iptables, SSH Config, LISH Console
This video provides in-depth insights into securing the DevOps environment through various measures such as securing the SSH daemon, configuring iptables for firewall protection, optimizing SSH configuration for enhanced security, and...
Curated Video
Detection and Response tools
This video will introcude you to many technologies that serve to help you identify threatrs and respond to them
Curated Video
Dissecting FTP
In this tutorial, you will learn the modes FTP functions under as well as their security architecture.
Curated Video
How Does Port Scanning Work
In this video, you will learn the two main techniques used in port scanning. We will be mainly using NMAP tool
Curated Video
Wireshark D5 V2 - HTTP analysisFTP analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 2: FTP analysis
Curated Video
Managed Services
An MSSP (managed security service provider) offers outsourced management and monitoring of security systems and equipment. Managed firewall, intrusion detection, virtual private network, vulnerability screening, and anti-viral services...
Curated Video
Firewalls and Security Appliances
Any type of server appliance intended to safeguard computer networks from unauthorized traffic is referred to as a security appliance.