Instructional Video6:59
Curated Video

Dissecting FTP

Higher Ed
In this tutorial, you will learn the modes FTP functions under as well as their security architecture.
Instructional Video4:09
Curated Video

Why a Regular Domain User Can be a Real Security Threat

Higher Ed
In this video you will learn about the reasons why a regular domain user can be a real danger to your environment, and why those generic and shared Active Directory accounts should not exist.
Instructional Video6:49
Curated Video

Wireshark D5 V2 - HTTP analysisFTP analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 2: FTP analysis
Instructional Video2:48
Curated Video

Wireshark D1 V1 - Master Wireshark Overview

Higher Ed
DAY ONE - We will introduce Wireshark and setup our environment - Video 1: Overview
Instructional Video3:58
Curated Video

Wireshark D5 V7 - HTTP analysisTroubleshoot your network

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 7: Troubleshoot your network
Instructional Video3:09
Curated Video

Wireshark D3 V7 - Expressions and buttons

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 7: Expressions and buttons
Instructional Video5:43
Curated Video

No Password !! No Issue, You Can Still Hack

Higher Ed
No Password !! No Issue, You Can Still Hack
Instructional Video3:12
Curated Video

Wireshark D5 V1 - HTTP analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 1: HTTP analysis
Instructional Video5:43
Curated Video

Wireshark D4 V7 - ICMPv6 Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 7: ICMPv6 deep-dive
Instructional Video4:48
Curated Video

Wireshark D4 V5 - IPv6 Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 5: IPv6 deep-dive
Instructional Video4:44
Curated Video

Wireshark D2 V4 - View Menu

Higher Ed
DAY TWO - We will explore Wireshark interface in details - Video 4: View menu
Instructional Video5:54
Curated Video

Wireshark D5 V3 - HTTP analysisDNS analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 3: DNS analysis
Instructional Video3:28
Curated Video

Wireshark D3 V4 - How is traffic capturedCapture Filters

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 4: Capture filters
Instructional Video3:42
Curated Video

Wireshark D3 V2 - How is traffic capturedSPAN Port

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 2: SPAN ports
Instructional Video3:41
Curated Video

Wireshark D2 V1 - File Menu

Higher Ed
DAY TWO - We will explore Wireshark interface in details - Video 1: File menu
Instructional Video1:49
Curated Video

Insufficient Logging and Monitoring

Higher Ed
Insufficient logging and monitoring is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Instructional Video9:36
Curated Video

Wireshark D4 V2 - TCP Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 2: TCP deep-dive
Instructional Video3:37
Curated Video

Wireshark D3 V6 - Finding and marking packets

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 6: Finding and marking packets
Instructional Video4:44
Curated Video

Wireshark D5 V5 - HTTP analysisMTP analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 5: SMTP analysis
Instructional Video5:14
Curated Video

Wireshark D2 V3 - Edit Menu

Higher Ed
DAY TWO - We will explore Wireshark interface in details - Video 3: Edit menu
Instructional Video5:11
Curated Video

Explore Main Services and Install Necessary Programs

Higher Ed
This video will help you get started in setting up your lab
Instructional Video2:56
Curated Video

Wireshark D5 V6 - HTTP analysisARP analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 6: ARP analysis
Instructional Video3:07
Curated Video

Wireshark D3 V5 - Display filters

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 5: Display filters
Instructional Video3:35
Curated Video

Broken Authentication

Higher Ed
This video will explain the broken authentication on web applications and how can attackers leverage this vulnerability to gain unauthorized access