Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Vulnerability Assessment
YouTube
education
#Nessus
Showing:
843
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Basic to Advance Kali Linux
1
rewiews
Comprehensive introduction to ethical hacking using Kali Linux, covering installation, tools, information gathering, vulnerability assessment, exploitation, privilege escalation, and social engineering techniques.
Add to list
12
Lesons
2 hours 30 minutes
On-Demand
Free-Video
IEEE
Detection of Electromagnetic Interference Attacks on Sensor Systems
1
rewiews
Explore a novel detection system for electromagnetic interference attacks on sensor systems, focusing on modulation techniques and implementation in microphone and temperature sensor systems.
Add to list
11
Lesons
16 minutes
On-Demand
Free-Video
HackerSploit
Host Discovery and Vulnerability Scanning With Nessus
1
rewiews
Learn to perform host discovery and vulnerability scanning using Nessus, a powerful proprietary tool. Gain practical skills in identifying network vulnerabilities and enhancing cybersecurity defenses.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Ubuntu OnAir
Python for Offensive Security in Ubuntu
1
rewiews
Explora el uso de Python para desarrollar herramientas de seguridad ofensiva en Ubuntu, enfocándose en Ethical Hacking y Penetration Testing. Aprende a crear scripts personalizados para identificar y explotar vulnerabilidades.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
Bug Hunting
1
rewiews
Comprehensive guide to bug hunting techniques, covering tools like Burp Suite, subdomain discovery, web application testing, and Android penetration testing for aspiring cybersecurity professionals.
Add to list
33
Lesons
7 hours
On-Demand
Free-Video
HuggingFace
Security Updates in Gradio 5
0
rewiews
Explore key security enhancements in Gradio 5, addressing issues identified in an independent audit to strengthen the platform's integrity and user protection.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
Cloud Security Alliance
Subdomain Takeover: Bug Bounty and Cloud Security
0
rewiews
Explore subdomain takeover, bug bounty, and cloud security in this exclusive session led by industry expert Satish Govindappa.
Add to list
1
Lesons
14 minutes
On-Demand
Free-Video
Cloud Security Alliance
Implementing an External Attack Surface Management Program
0
rewiews
Discover and mitigate external vulnerabilities by viewing assets from an attacker's perspective, addressing challenges of digital transformation and expanding attack surfaces.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
Satish C J
Mastering Nessus Scans - A Guide to Host Discovery, Basic Network Scan and Web Application Tests
0
rewiews
Discover essential Nessus scanning techniques for network security, including host discovery, basic network scans, and web application tests. Learn step-by-step instructions and best practices.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Cyber Mentor
Zero to Hero Pentesting - Enumeration - Kioptrix & Hack The Box
0
rewiews
Learn enumeration techniques for penetration testing using Kioptrix and Hack The Box. Covers network discovery, vulnerability scanning, and port enumeration. Includes Q&A on various cybersecurity topics and career advice.
Add to list
45
Lesons
2 hours 49 minutes
On-Demand
Free-Video
Cyber Mentor
Zero to Hero Pentesting - Scanning Tools and Tactics
0
rewiews
Comprehensive tutorial on penetration testing tools and techniques, covering Nmap, Nessus, Metasploit, and BurpSuite. Includes practical demonstrations, Q&A session, and industry insights for aspiring cybersecurity professionals.
Add to list
59
Lesons
3 hours 8 minutes
On-Demand
Free-Video
Cyber Mentor
Pentesting for Noobs
0
rewiews
Learn ethical hacking through hands-on practice with 10 beginner-friendly penetration testing episodes, covering various vulnerabilities and exploitation techniques.
Add to list
10
Lesons
5 hours
On-Demand
Free-Video
John Hammond
Using Snyk to Find & Fix Vulnerabilities
0
rewiews
Learn to use Snyk for finding and fixing vulnerabilities in web applications, including hands-on practice with a vulnerable app and a CTF challenge involving prototype pollution and RCE.
Add to list
17
Lesons
31 minutes
On-Demand
Free-Video
How to Use BurpSuite Professional Like a Pro
0
rewiews
Master Burp Suite Professional for web application penetration testing. Learn to evaluate security, find vulnerabilities, and conduct hands-on testing like a pro in this comprehensive guide.
Add to list
11
Lesons
2 hours 30 minutes
On-Demand
Free-Video
Ethereum Engineering Group
Smart Contract and DApp Security Auditing - A Complete Guide
0
rewiews
Dive into comprehensive smart contract and DApp auditing processes, from initial development through final security verification and issue resolution.
Add to list
1
Lesons
1 hour 9 minutes
On-Demand
Free-Video
Curso de Linux Básico para Principiantes - desde Cero y Gratis - 2021
0
rewiews
Domina Linux desde cero: historia, instalación, comandos básicos y avanzados, configuración, personalización y seguridad. Aprende a usar la terminal y optimiza tu experiencia con este sistema operativo.
Add to list
25
Lesons
3 hours 30 minutes
On-Demand
Free-Video
Capturing Passwords into the Secure Desktop - PasswordsCon 2014
0
rewiews
Aprenda técnicas avançadas de captura de senhas no ambiente de desktop seguro, explorando vulnerabilidades e métodos de proteção.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
The State of Vulnerabilities in Cloud Native Applications
0
rewiews
Análise abrangente das vulnerabilidades em aplicações cloud native, destacando riscos comuns e críticos, suas causas e estratégias de prevenção para usuários e organizações.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Ubuntu OnAir
Linux Security Tools: Attack and Defense Strategies
0
rewiews
Explora herramientas de Linux para ciberseguridad, aprendiendo técnicas de ataque y defensa para fortalecer sistemas y redes informáticas.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
secwestnet
Hacking Fingerprint Recognition Systems - Japanese Version
0
rewiews
指紋認証システムのハッキング手法を解説。古典的な研究でありながら、現代にも通用する貴重な情報を提供。セキュリティ専門家向けの高度な内容を日本語で解説。
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Buscando de Manera Incorrecta en el Lugar Equivocado - Cyberfinance
0
rewiews
Exploración de estrategias de búsqueda en ciberseguridad financiera, analizando enfoques incorrectos y lugares equivocados para mejorar la eficacia en la detección de amenazas.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Hackeá tu Primer Banco - Vulnerabilidades Comunes en Sistemas Bancarios
0
rewiews
Demostración de vulnerabilidades comunes en un banco ficticio y resolución de turboworkshops del Village de CyberFinance, presentado por expertos en ciberseguridad.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Exploiting Medium-Risk Vulnerabilities: Strategies and Techniques - Ekoparty 2023
0
rewiews
Explora estrategias para identificar y explotar vulnerabilidades de criticidad media y baja, frecuentemente subestimadas, ofreciendo una comprensión más profunda para reforzar sistemas y redes contra estas amenazas.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Revealing SSNs and Hacking Reddit: A Bug Bounty Journey
0
rewiews
Descubre cómo identificar vulnerabilidades IDOR y aplicarlas en bug bounty. Aprende de experiencias reales en la búsqueda de fallos de seguridad en plataformas populares.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Exploring Web Applications Through Their JavaScript - Uncovering Hidden Information
0
rewiews
Descubre cómo analizar el código JavaScript de sitios web para encontrar información valiosa como API Keys, endpoints internos y usuarios, mejorando tus habilidades en seguridad web.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Button Combo Crash: Analyzing a POS Device Without Disassembly
0
rewiews
Análisis de vulnerabilidades en un posnet sin abrirlo, explorando combinaciones de botones para descubrir fallos de seguridad y posibles explotaciones en dispositivos de pago.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Mobile Hacking 101 - A Cross-Platform Audit Journey
0
rewiews
Descubre técnicas y herramientas para auditar la seguridad de aplicaciones móviles multiplataforma, identificando riesgos y vulnerabilidades en prácticas de programación deficientes.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
Ekoparty Security Conference
100 Vulnerabilities in 30 Days - Hacking the World's Largest Insurance Company
0
rewiews
Descubre cómo un equipo de seguridad identificó 100 vulnerabilidades en 30 días en la mayor aseguradora mundial. Aprende métodos, herramientas y lecciones de este impresionante logro en bug bounty.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Hunting Web Vulnerabilities - Introduction to Ethical Hacking - Workshop 3
0
rewiews
Taller práctico sobre hacking ético de sitios web. Aprende técnicas legales para identificar vulnerabilidades, comprender el funcionamiento de la web y explorar oportunidades en seguridad informática.
Add to list
16
Lesons
2 hours
On-Demand
Free-Video
Ekoparty Security Conference
100 Vulnerabilities in 30 Days - Hacking the World's Largest Insurance Company
0
rewiews
Descubre cómo un equipo de seguridad identificó 100 vulnerabilidades en 30 días en una gran aseguradora, explorando métodos, herramientas y lecciones aprendidas en bug bounty.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
PyCon US
Entendiendo y Confiando en tus Dependencias en Python
0
rewiews
Análisis de dependencias en Python: riesgos ocultos, ataques como typosquatting y estrategias para evaluar y confiar en paquetes de terceros. Herramientas y prácticas para realizar controles de seguridad efectivos.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
Linux Foundation
Security Threat Model Analysis and Protection Practice in Edge Computing Scenarios
0
rewiews
Analyze security threats in edge computing, explore KubeEdge's audit process, and learn protection practices for cloud-native environments. Gain insights on improving security in multi-cloud and hybrid scenarios.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
media.ccc.de
Bumpy Roads - Exploring Security Vulnerabilities in Regional Carsharing Systems
0
rewiews
Entdecke Schwachstellen und unsichere Software eines regionalen Carsharing-Anbieters. Tauche ein in ein Korallenriff voller Sicherheitslücken und lerne über Web-Applikationen, deren Schwachstellen und unsicheres Design.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
DevSecCon
Introdução ao Cyber Threat Intelligence
0
rewiews
Explore os fundamentos e desafios da inteligência de ameaças cibernéticas com especialistas renomados. Aprenda sobre CTI, segurança de aplicativos e sua relevância no cenário atual de cibersegurança.
Add to list
1
Lesons
1 hour 48 minutes
On-Demand
Free-Video
DevSecCon
Dynamic Analysis of Complex Mobile Applications
0
rewiews
Aprenda a realizar análisis de seguridad en aplicaciones móviles complejas, superando protecciones criptográficas y encontrando vulnerabilidades mediante herramientas como Frida, Burp Suite y Brida.
Add to list
1
Lesons
1 hour 13 minutes
On-Demand
Free-Video
INFOSEC TRAIN
Advanced Penetration Testing: Scripting for Ethical Hackers - Part 1
0
rewiews
Master advanced ethical hacking techniques through hands-on scripting exercises, focusing on bash environment, variables, functions, and automated scanning tasks for enhanced penetration testing skills.
Add to list
1
Lesons
1 hour 8 minutes
On-Demand
Free-Video
IEEE
Touching the Untouchables - Dynamic Security Analysis of the LTE Control Plane
0
rewiews
Dynamic security analysis of LTE control plane procedures, uncovering 36 vulnerabilities in operational networks. Demonstrates attacks affecting service availability, SMS spoofing, and data manipulation.
Add to list
16
Lesons
21 minutes
On-Demand
Free-Video
IEEE
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study
0
rewiews
Explore findings from an extensive, long-term study on organizational phishing, covering vulnerability patterns, training effectiveness, and reporting mechanisms.
Add to list
8
Lesons
23 minutes
On-Demand
Free-Video
IEEE
Identifying Ubiquitous Third Party Libraries in Compiled Executables Using Annotated and Translated
0
rewiews
Explore techniques for identifying third-party libraries in compiled executables, focusing on firmware indicator translation and machine learning approaches for enhanced security analysis.
Add to list
9
Lesons
34 minutes
On-Demand
Free-Video
IEEE
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises
0
rewiews
Analyze online vulnerability discovery exercises, exploring methodology, results, feedback, metacognition, and learning environments for effective cybersecurity education.
Add to list
6
Lesons
15 minutes
On-Demand
Free-Video
zseano
Unique Mindset - Hacking Techniques and Favorite Findings
0
rewiews
Explore zseano's unique hacking mindset through real-world examples, favorite findings, and insights on identifying critical vulnerabilities in web applications.
Add to list
8
Lesons
27 minutes
On-Demand
Free-Video
Bugcrowd
LevelUp 0x04 - Blueprint for Becoming a Penetration Tester
0
rewiews
Blueprint for aspiring pen testers: expert insights, career tips, and actionable steps to enter the field of ethical hacking and penetration testing.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
Bugcrowd
Bug Hunting as a Team: Challenges and Insights - LevelUp 0x04
0
rewiews
Insights on collaborative bug hunting: organizing teams, sharing information, splitting bounties, and overcoming challenges in the evolving field of cybersecurity.
Add to list
13
Lesons
56 minutes
On-Demand
Free-Video
Bugcrowd
LevelUp 0x04: Advanced Bug Bounty Techniques - Day 2
0
rewiews
Explore advanced bug bounty techniques and strategies with industry experts in this comprehensive cybersecurity event focused on enhancing hacking skills and knowledge.
Add to list
1
Lesons
4 hours 37 minutes
On-Demand
Free-Video
Bugcrowd
IoT Security - Attacker's Perspective on Common Vulnerabilities
0
rewiews
Explore IoT vulnerabilities from an attacker's perspective, covering famous exploits, OWASP IoT Top10, and practical attack methodologies. Gain insights for both security professionals and IoT developers.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
Bugcrowd
Critical Vulnerabilities and Bug Bounty Programs
0
rewiews
Explore critical vulnerabilities uncovered through bug bounty programs, their impact, and strategies for effective vulnerability management and disclosure in cybersecurity.
Add to list
20
Lesons
1 hour
On-Demand
Free-Video
Bugcrowd
How the Crowd Outperforms Traditional Security Testing
0
rewiews
Explore how crowdsourced security testing outperforms traditional methods, with insights on implementation, benefits, and real-world examples from successful bug bounty programs.
Add to list
17
Lesons
32 minutes
On-Demand
Free-Video
Bugcrowd
Key Takeaways from Instructure's Bug Bounty Program
0
rewiews
Discover insights from Instructure's Bug Bounty program, including their innovative approach to security audits, crowdsourced penetration testing, and key lessons learned for enhancing cybersecurity practices.
Add to list
12
Lesons
35 minutes
On-Demand
Free-Video
Bugcrowd
MarkDoom- How I Hacked Every Major IDE in 2 Weeks - Matt Austin, LevelUp 2017
0
rewiews
Explore web hacking techniques used to exploit major IDEs and desktop applications, revealing high-severity vulnerabilities in popular development tools.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
HackerOne
Pentesting vs Bug Bounty - Approaches and Methodologies
0
rewiews
Explore the differences between bug bounty hunting and penetration testing methodologies, comparing approaches, impacts, and scoping techniques.
Add to list
7
Lesons
26 minutes
On-Demand
Free-Video
Bugcrowd
How I Hacked 55 Banks and Cryptocurrency Exchanges - LevelUpX Series 3
0
rewiews
Alissa Knight reveals tactics used to breach 55 financial institutions, offering insights into vulnerabilities in FinTech apps and APIs. Learn from a veteran hacker's experience in cybersecurity.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Bugcrowd
It's Not a Vulnerability, It's a Feature - Exploiting Built-in Functionality
0
rewiews
Explore how offensive security has evolved from CVEs to TTPs, and learn to leverage built-in features for security testing and potential monetization through creating and sharing TTPs.
Add to list
16
Lesons
53 minutes
On-Demand
Free-Video
Bugcrowd
Car Hacking Explained for Bug Hunters - Automotive Security Vulnerabilities and Methodologies
0
rewiews
Explore automotive security vulnerabilities, from IoT to CAN bus hacking. Learn methodologies, attack surfaces, and bug prioritization for car hacking, covering infotainment systems, APIs, and mobile apps.
Add to list
20
Lesons
37 minutes
On-Demand
Free-Video
Bugcrowd
Recognition Primed Bug Bounty Hunting - Maximizing Impact and Success
0
rewiews
Enhance bug bounty hunting skills through decision-making techniques from emergency services. Learn to maximize impact, escalate findings, and make critical choices for bigger scopes and larger rewards.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
NahamSec
Managing a Bug Bounty Program From a Hacker's Perspective - NahamCon 2022 EU
0
rewiews
Insights on managing bug bounty programs from an ethical hacker's perspective, covering strategies, challenges, and best practices for effective vulnerability disclosure and collaboration.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
NahamSec
Bug Bounty Methodology and Hacking the US Government - Interview with Jack Cable
0
rewiews
Insights from a top bug bounty hunter on hacking methodology, government cybersecurity, and career advice for aspiring ethical hackers.
Add to list
30
Lesons
1 hour 1 minute
On-Demand
Free-Video
Bugcrowd
Your Guide to Burp Suite - Setup and Usage in 30 Minutes
0
rewiews
Learn to set up and effectively use Burp Suite for web security testing in under 30 minutes, covering essential features and functionalities.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Bugcrowd
SPI Flash Extraction for Bug Bounty Hunters - LevelUpX Series 13
0
rewiews
Hands-on guide to extracting SPI flash contents from hardware devices, focusing on techniques and tools for bug bounty hunters to uncover valuable data and impactful vulnerabilities.
Add to list
10
Lesons
40 minutes
On-Demand
Free-Video
NahamSec
Live Hacking Events - What They Are and How They Work
0
rewiews
Explore Live Hacking Events with HackerOne's Community Team. Learn about these unique cybersecurity gatherings, their benefits, and how to participate in this exciting hacking format.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
NahamSec
Recon Sunday with Top HackerOne Paid Hackers - Dawgyg, Mayonaise, and cdl
0
rewiews
Live hacking event featuring top-paid hackers Dawgyg, Mayonaise, and cdl discussing reconnaissance techniques and strategies for bug bounty hunting on HackerOne's platform.
Add to list
1
Lesons
1 hour 9 minutes
On-Demand
Free-Video
NahamSec
Pentesting, Bug Escalation, and Career Insights - Interview with Codingo
0
rewiews
Insightful discussion on pentesting, bug escalation, OSCP certification, and industry experiences, offering valuable insights for aspiring and seasoned cybersecurity professionals.
Add to list
1
Lesons
1 hour 12 minutes
On-Demand
Free-Video
NahamSec
Introduction to Web Hacking - OWASP Juice Shop
0
rewiews
Comprehensive introduction to web hacking using OWASP Juice Shop, covering essential techniques and vulnerabilities for aspiring ethical hackers and security enthusiasts.
Add to list
1
Lesons
2 hours 49 minutes
On-Demand
Free-Video
NahamSec
Hacking Uber, Working at Synack, and the 120 Reports in 120 Days Challenge
0
rewiews
Insightful discussion on ethical hacking experiences, including Uber vulnerabilities, Synack employment, and a unique 120-day bug bounty challenge. Valuable insights for aspiring cybersecurity professionals.
Add to list
1
Lesons
2 hours 57 minutes
On-Demand
Free-Video
NahamSec
Monitoring Endpoints, Binary Exploitation, and Continuous Recon - Security Discussion
0
rewiews
Explore endpoint monitoring, binary exploitation, and continuous reconnaissance with insights from @Mrtuxracer. Gain valuable knowledge on advanced cybersecurity techniques and strategies.
Add to list
1
Lesons
1 hour 10 minutes
On-Demand
Free-Video
NahamSec
Recon Methodology for Consistent High-Value Bug Bounties - Interview with Th3G3nt3lman
0
rewiews
Discover effective recon methodologies for high-value bug bounties. Learn from @Th3G3nt3lman's experience in GitHub reconnaissance, tool usage, and collaboration strategies for successful hacking.
Add to list
17
Lesons
2 hours 19 minutes
On-Demand
Free-Video
NahamSec
SQL Injection Techniques - SQLMap and Hacker101's Photo Gallery CTF
0
rewiews
Explore SQL injection techniques using SQLMap and tackle Hacker101's "Photo Gallery" CTF challenge to enhance your ethical hacking skills and web security knowledge.
Add to list
1
Lesons
1 hour 57 minutes
On-Demand
Free-Video
NahamSec
Live Bug Bounty Recon Session - Creating a Recon Database for Yahoo
0
rewiews
Live session on bug bounty reconnaissance techniques and building a recon database for Yahoo, featuring guest @Daeken. Learn effective strategies for subdomain enumeration using multiple tools to enhance your bug hunting skills.
Add to list
1
Lesons
1 hour 29 minutes
On-Demand
Free-Video
NahamSec
Live Bug Bounty Recon Session on Yahoo - Using Meg, Assetfinder, and Other Tools
0
rewiews
Live bug bounty recon session demonstrating tools and techniques for reconnaissance on Yahoo, featuring guest @Tomnomnom. Covers creating wordlists, using meg and assetfinder, directory brute forcing, and crt.sh.
Add to list
1
Lesons
1 hour 47 minutes
On-Demand
Free-Video
NahamSec
Live Bug Bounty Recon Session on Yahoo - Amass, crt.sh, and Dirsearch
0
rewiews
Live bug bounty recon session demonstrating advanced techniques for discovering vulnerabilities on Yahoo, featuring tools like Amass, crt.sh, and dirsearch, with guest expert @TheDawgyg.
Add to list
1
Lesons
3 hours 10 minutes
On-Demand
Free-Video
NahamSec
Live Recon on Rockstar Games - Vulnerability Testing Methodology
0
rewiews
zseano demonstrates vulnerability testing methodologies on Rockstar Games, showcasing tools like Burp Suite and techniques for identifying XSS and open redirects in this live recon session.
Add to list
1
Lesons
1 hour 30 minutes
On-Demand
Free-Video
NahamSec
Live Recon and Distributed Recon Automation Using Axiom
0
rewiews
Explore live recon and distributed recon automation using Axiom with @pry0cc. Learn advanced techniques for efficient and effective bug bounty hunting and cybersecurity research.
Add to list
1
Lesons
1 hour 10 minutes
On-Demand
Free-Video
NahamSec
Live Recon and Automation on Shopify's Bug Bounty Program - TomNomNom
0
rewiews
Explore live recon and automation techniques for Shopify's bug bounty program with expert insights, enhancing your skills in identifying vulnerabilities and maximizing bounty rewards.
Add to list
1
Lesons
1 hour 17 minutes
On-Demand
Free-Video
NahamSec
Live Recon on Snapchat - Demonstration of Amass, FFUF, and SecurityTrails
0
rewiews
Explore live reconnaissance techniques on Snapchat using tools like amass, FFUF, and SecurityTrails in this hands-on demonstration with @ITSecurityGuard.
Add to list
1
Lesons
1 hour 42 minutes
On-Demand
Free-Video
NahamSec
Bug Bounty Seminar with Verizon Media's Paranoids
0
rewiews
Explore bug bounty hunting with Verizon Media's Paranoids team. Learn strategies, techniques, and insights to enhance your cybersecurity skills and potentially earn rewards.
Add to list
1
Lesons
2 hours 3 minutes
On-Demand
Free-Video
Cyber Mentor
Exploiting ChatGPT Code for Web Security Vulnerabilities
0
rewiews
Learn to exploit vulnerabilities in ChatGPT-generated code, including SQL injection and cross-site scripting. Practical demonstrations enhance cybersecurity skills for ethical hacking and penetration testing.
Add to list
9
Lesons
23 minutes
On-Demand
Free-Video
Cyber Mentor
A Day in the Life of an Ethical Hacker - 2022 Edition
0
rewiews
Experience a day as an ethical hacker: explore cybersecurity tasks, tools, and techniques used to identify vulnerabilities and strengthen digital defenses in this insightful video.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Cyber Mentor
Pentest Story Time - My Favorite Hacks
0
rewiews
Engaging talk sharing real-world pentesting experiences and favorite hacking techniques. Offers valuable insights for cybersecurity professionals and aspiring ethical hackers.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
Cyber Mentor
HackPark Walkthrough - TryHackMe
0
rewiews
Step-by-step walkthrough of the HackPark challenge on TryHackMe, demonstrating ethical hacking techniques and Windows privilege escalation methods.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Cyber Mentor
Pentesting for Beginners - Netmon Walkthrough - Episode 10
0
rewiews
Explore Hack the Box's Netmon challenge in this penetration testing tutorial. Learn practical ethical hacking techniques and strategies for identifying and exploiting vulnerabilities in network systems.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
Cyber Mentor
Pentesting for Beginners - Episode 8: Bashed (HackTheBox)
0
rewiews
Learn ethical hacking techniques through a hands-on walkthrough of the "Bashed" challenge on HackTheBox, focusing on penetration testing skills for beginners.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Cyber Mentor
Pentesting for Beginners - Optimum HackTheBox Challenge - Episode 7
0
rewiews
Learn penetration testing techniques on the Optimum machine from HackTheBox, focusing on practical skills for ethical hacking and cybersecurity.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Cyber Mentor
Print Nightmare - Domain Controller Domination
0
rewiews
Explore the Print Nightmare vulnerability and its impact on domain controllers. Learn about this critical security flaw and its potential for system compromise in Windows environments.
Add to list
1
Lesons
12 minutes
On-Demand
Free-Video
Cyber Mentor
API Information Disclosure - Real-World Bug Hunting
0
rewiews
Explore API information disclosure vulnerabilities and learn effective techniques for identifying and exploiting these security weaknesses in web applications.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Infosecurity Europe
Vulnerabilities, Risks and Threats - Actionable Intelligence for Robust Cyber Defence
0
rewiews
Expert panel discusses actionable threat intelligence for robust cyber defense, covering data collection, risk assessment, and strategies for effective implementation and sharing.
Add to list
19
Lesons
59 minutes
On-Demand
Free-Video
LASCON
Hacking and Defending APIs - Red and Blue Make Purple
0
rewiews
Comprehensive guide to API security: attack techniques, defense strategies, and best practices for both testers and defenders. Covers BOLA, authentication, data exposure, and more.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
LASCON
Design-Level Supply Chain Attacks in the Real World
0
rewiews
Explore design-level supply chain attacks, including environmental constraints, compatibility issues, and malicious influence. Learn to identify and mitigate these often-overlooked vulnerabilities in cybersecurity.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
SyScan360
Practical SMEP Bypass Techniques
0
rewiews
Explore practical techniques for bypassing Supervisor Mode Execution Prevention (SMEP) in system security, enhancing your understanding of kernel exploitation and protection mechanisms.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
SyScan360
Crash and Pay - Owning and Cloning NFC Payment Cards
0
rewiews
Explore vulnerabilities in NFC payment cards, including techniques for cloning and exploiting weaknesses in contactless payment systems.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
LASCON
Securing Legacy Applications: Tips and Tricks for Refactoring
0
rewiews
Discover and fix security issues in legacy applications with practical tips and tricks. Learn to identify common vulnerabilities and refactor code for enhanced security.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
LASCON
Pentesting for Developers - Common Vulnerabilities and Prevention Techniques
0
rewiews
Learn essential pentesting techniques for developers, covering common web vulnerabilities, prevention methods, and tools to secure your applications effectively.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
LASCON
Mobile Security Testing and Penetration Techniques - 2017 Keynote
0
rewiews
Insightful keynote address exploring cutting-edge cybersecurity trends, challenges, and innovations in the rapidly evolving digital landscape.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
RSA Conference
AI for Cybersecurity - Overview of the Field and Promising Future Directions
0
rewiews
Explore AI applications in cybersecurity, including threat intelligence and adversarial machine learning. Learn about data sources, limitations, and future directions in this field.
Add to list
31
Lesons
55 minutes
On-Demand
Free-Video
LASCON
OWASP Top 10 Training - Part 3
0
rewiews
Comprehensive exploration of OWASP Top 10 security vulnerabilities, focusing on prevention strategies and best practices for web application security.
Add to list
1
Lesons
1 hour 25 minutes
On-Demand
Free-Video
LASCON
OWASP Top 10 Training - Part 1
0
rewiews
Comprehensive overview of OWASP Top 10 security vulnerabilities, focusing on identification, prevention, and mitigation strategies for web application developers and security professionals.
Add to list
1
Lesons
1 hour 10 minutes
On-Demand
Free-Video
LASCON
OWASP Top 10 Security Risks - Part 5
0
rewiews
Explore the latest OWASP Top 10 security vulnerabilities, their impact, and effective mitigation strategies to enhance web application security and protect against common threats.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
LASCON
Easy Mobile Hacking: Native and Hybrid Pitfalls - 2016
0
rewiews
Uncover common vulnerabilities in mobile apps, both native and hybrid, using free tools. Learn to identify and exploit configuration weaknesses across Android and iOS platforms.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
CAE in Cybersecurity Community
Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation
0
rewiews
Comprehensive overview of Armitage and Metasploit for penetration testing, covering information gathering, exploitation, and post-exploitation techniques through live demonstrations and practical examples.
Add to list
20
Lesons
54 minutes
On-Demand
Free-Video
Bill Buchanan OBE
CeH Unit 1 - Business Aspects of Penetration Testing
0
rewiews
Explore business aspects of penetration testing, including key terms, threats, data protection, and security procedures. Learn about ethical hacking and its role in cybersecurity.
Add to list
11
Lesons
34 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Introduction to Metasploit - Network Exploitation Lab
0
rewiews
Learn essential Metasploit techniques for network security, including scanning, exploiting vulnerabilities, and establishing reverse shells in this hands-on lab.
Add to list
12
Lesons
28 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Security Scan with Nessus - Comprehensive Guide
0
rewiews
Learn to perform security scans using Nessus, covering policy creation, scanning techniques, and interpreting results for various systems including web servers and Windows.
Add to list
14
Lesons
26 minutes
On-Demand
Free-Video
load more...