Curated Video
The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Introduction
This video introduces you to the section where the author will talk about mobile applications. The author helps you understand how an application works and the more applications you have on your device, the more you are prone to...
Curated Video
The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Android Versus Apple Versus Blackberry
This video helps us compare the top three mobile operating systems, which are Android, Apple, and Blackberry. The author will take you through the major pros and cons of using each one. By the end of the video, you will understand which...
Curated Video
The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Mobile Device Usage - The Astounding Number
This video helps us understand mobile usage and a few surprising numbers associated with it. As of January 2018, the global mobile population amounted to 3.7 billion unique users and an average person spends more than five hours a day on...
Packt
Find My iPhone
This video talks about the Find My iPhone service; this tool allows you to physically locate your iPhone in case you misplace your phone, or it's stolen. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute...
Packt
Find My Device - Android
This video explains the Find My Device setting in Android and how to best use it. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to Cybersecurity - Part 3".This section introduces...
Packt
Android Security Tweaks
This video talks about a few more settings that you might need to tweak to keep your Android device safe from attacks. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to Cybersecurity...
Packt
How to Use Malwarebytes
This video explains Malwarebytes, which is one of the main tools to beat malware, and how to best use it. This clip is from the chapter "Mobile Threats and Countermeasures" of the series "The Absolute Beginners 2023 Guide to...
Packt
The 4 Main Symptoms of Malware Infection
This video explains the four main symptoms of a malware-infected mobile device, such as slow speed and performance, pop-up ads, and more. This clip is from the chapter "Mobile Threats and Countermeasures" of the series "The Absolute...
Packt
Viruses and Spyware
Viruses and spyware are the two major forms of mobile malware, and this video explains what viruses and spyware are and how to protect your mobile device from them. This clip is from the chapter "Mobile Threats and Countermeasures" of...
Packt
4 Ways to Work Safely with Mobile Applications
This video shares four ways by which you can stay safe while downloading and working with mobile applications. This clip is from the chapter "Understanding Applications" of the series "The Absolute Beginners 2023 Guide to Cybersecurity -...
Packt
Checking Default App Permissions - IOS
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Understanding Applications" of the series "The Absolute Beginners...
Packt
Checking Default App Permissions - Android
This video talks about the kinds of permissions the applications have on an Android device. We will look at app permissions such as Instagram, Rebtel, and introduce to you an app to manage the permissions quickly and effectively. This...
Packt
Understanding App Permissions
This video talks about app permissions and the kind of permissions that an application demands while you install them on your phone. These permissions can be features or tools that the app needs in order to function properly. This clip...
Packt
The Truth about Jail Breaking an IOS Device
In this video, the author talks about a practice that is common with many iPhone users—the practice of jail breaking. Apple imposes restrictions on what users can do on their iPhone/iPad as compared to Android users. This is where jail...
Vlogbrothers
Hackers, Cyber crime, and a New Kind of War.
In which Hank talks briefly about the fundamental shift in espionage, warfare, crime, and activism that may re-define our age. Hackers have been mounting increasingly sophisticated attacks. Billions of dollars have been stolen, and even...
Curated Video
Get Started with Linux Commands
This video will teach you the basic commands we will use in this course
Curated Video
Cracking WPA and WPA2 new 2
This video will explain the difference between two famous wireless protocols, and will show you a technique on cracking the passwords by deauthenticating users connected to a specific SSID
Curated Video
Dynamic Analysis
This video will explain Dynamic malware analysis in details, which is a runtime approach for analyzing malicious activities
Curated Video
Android Dynamic Malware Analysis
In this tutorial, you will learn how to perform dynamic malware analysis for an APK file using MobSF or Mobile Security Framework, which is a super handy tool for analyzing Android applications.
Curated Video
Threat Modeling
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized. In this video, you will learn about...
Curated Video
SE Attack Vectors
This video will explain the various attack vectors used in social engineering
Curated Video
Static vs Dynamic Malware Analysis
The video will explain the main differences between two major approaches in analyzing malware. Static and Dynamic.