Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Information Gathering
Showing:
85
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
HackerSploit
Penetration Testing Bootcamp
24
rewiews
Learn the basics of Penetration Testing and get introduced to Web Application penetration testing with this course that is a part of the open source cybersecurity training initiative.
Add to list
49
Lesons
10 hours
On-Demand
Free-Video
HackerSploit
OSINT
1
rewiews
Explore DNS enumeration, automated information gathering with Maltego, and leveraging Shodan for accessing routers, servers, and webcams in this comprehensive OSINT tutorial.
Add to list
4
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Basic to Advance Kali Linux
1
rewiews
Comprehensive introduction to ethical hacking using Kali Linux, covering installation, tools, information gathering, vulnerability assessment, exploitation, privilege escalation, and social engineering techniques.
Add to list
12
Lesons
2 hours 30 minutes
On-Demand
Free-Video
Cyber Mentor
Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack
1
rewiews
Comprehensive ethical hacking training covering advanced techniques like subdomain hunting, vulnerability scanning, exploitation, and buffer overflows. Includes hands-on practice with multiple virtual machines.
Add to list
43
Lesons
7 hours 17 minutes
On-Demand
Free-Video
Cyber Mentor
Open-Source Intelligence - Full Course - Learn OSINT
1
rewiews
Aprende OSINT en 4.5 horas con técnicas de búsqueda avanzada, creación de sock puppets, análisis de datos EXIF, y OSINT en redes sociales como Twitter, Facebook e Instagram.
Add to list
34
Lesons
4 hours 30 minutes
On-Demand
Free-Video
Paul Browning
CompTIA PenTest+ Full Course - PT0-002
1
rewiews
Comprehensive penetration testing training covering planning, reconnaissance, vulnerability analysis, exploitation techniques, and reporting, with hands-on labs using industry-standard tools and frameworks.
Add to list
26
Lesons
11 hours 32 minutes
On-Demand
Free-Video
BlackArch Linux for Hacking and Penetration Testing
0
rewiews
Comprehensive guide to ethical hacking using BlackArch Linux, covering installation, configuration, information gathering, and various attack techniques for different platforms and networks.
Add to list
19
Lesons
6 hours 58 minutes
On-Demand
Free-Video
Metasploit
0
rewiews
Learn Metasploit for ethical hacking: modules, exploits, payloads, information gathering, web server hacking, privilege escalation, and more. Hands-on tutorials for beginners to advanced users.
Add to list
12
Lesons
2 hours 30 minutes
On-Demand
Free-Video
Metasploit
0
rewiews
Learn Metasploit fundamentals, including installation, database management, payloads, encoders, and Meterpreter. Gain hands-on experience with information gathering and scanning techniques.
Add to list
13
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Linode
Red Team Recon Techniques - Red Team Series
0
rewiews
Comprehensive guide on red team reconnaissance techniques, covering passive and active methods for gathering intelligence on target systems, networks, and organizations.
Add to list
34
Lesons
1 hour 25 minutes
On-Demand
Free-Video
Bug Hunting Course
0
rewiews
Comprehensive guide to bug hunting techniques, covering information gathering, vulnerability types, and practical methods for finding and reporting security flaws in web applications.
Add to list
54
Lesons
18 hours
On-Demand
Free-Video
Kali Linux From A to Z Arabic
0
rewiews
تعلم أدوات وتقنيات الاختراق الأخلاقي باستخدام كالي لينكس، من التثبيت إلى جمع المعلومات والمسح والاختراق وتحليل الثغرات الأمنية
Add to list
24
Lesons
6 hours
On-Demand
Free-Video
Kali Linux
0
rewiews
Comprehensive Kali Linux training covering installation, tools, and ethical hacking techniques. Learn network scanning, information gathering, and penetration testing using popular tools like Metasploit and Burp Suite.
Add to list
22
Lesons
9 hours
On-Demand
Free-Video
Metasploit Framework
0
rewiews
Комплексное обучение этичному хакингу с использованием Metasploit Framework. Изучение методов сканирования, эксплуатации уязвимостей и повышения привилегий в различных системах.
Add to list
63
Lesons
11 hours
On-Demand
Free-Video
Ekoparty Security Conference
RedTeaming from Basics - Employee Information Leaks for the Win
0
rewiews
Metodología de reconocimiento en RedTeam: desde el dominio hasta la red interna. Enfoque ofensivo para identificar vectores de ataque y obtener información pública de empleados y empresas.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Windows Privilege Escalation Techniques - Ekoparty Summer Workshop 2024
0
rewiews
Taller práctico de post-explotación en Windows, enfocado en técnicas de escalada de privilegios y ataques "Living off the land". Cubre recopilación de información, servicios inseguros, UAC bypass y automatización.
Add to list
1
Lesons
1 hour 54 minutes
On-Demand
Free-Video
DefCamp
Hunting and Scraping with Favicons - DefCamp 2023
0
rewiews
Explore favicon hunting techniques for cybersecurity reconnaissance. Learn innovative methods to gather valuable information from website icons, enhancing your digital investigation skills.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Bug Bounty Recon Techniques - Ekoparty Summer Workshop 2024
0
rewiews
Aprende técnicas avanzadas de reconocimiento para Bug Bounty con expertos en seguridad. Descubre estrategias efectivas para identificar vulnerabilidades y maximizar tus recompensas.
Add to list
1
Lesons
2 hours 7 minutes
On-Demand
Free-Video
Bugcrowd
OWASP Amass - Discovering Internet Exposure and Network Mapping - LevelUp 0x04
0
rewiews
Discover internet-facing assets and enhance network visibility using OWASP Amass. Learn subdomain enumeration techniques and tools for improved cybersecurity and asset management.
Add to list
23
Lesons
58 minutes
On-Demand
Free-Video
Bugcrowd
Practical Recon Techniques for Bug Hunters & Pen Testers
0
rewiews
Discover effective reconnaissance strategies for identifying vulnerabilities and enhancing security assessments in this informative session led by expert Bharath.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
Bugcrowd
Doing Recon Like a Boss - Ben Sadeghipour, Bugcrowd's LevelUp 2017
0
rewiews
Learn efficient hacking reconnaissance techniques, including methodologies for Amazon AWS, GitHub, asset identification, and QA, to enhance your cybersecurity skills and target assessment capabilities.
Add to list
6
Lesons
20 minutes
On-Demand
Free-Video
NahamSec
Recon Methodology for Consistent High-Value Bug Bounties - Interview with Th3G3nt3lman
0
rewiews
Discover effective recon methodologies for high-value bug bounties. Learn from @Th3G3nt3lman's experience in GitHub reconnaissance, tool usage, and collaboration strategies for successful hacking.
Add to list
17
Lesons
2 hours 19 minutes
On-Demand
Free-Video
NahamSec
Live Bug Bounty Recon Session - Creating a Recon Database for Yahoo
0
rewiews
Live session on bug bounty reconnaissance techniques and building a recon database for Yahoo, featuring guest @Daeken. Learn effective strategies for subdomain enumeration using multiple tools to enhance your bug hunting skills.
Add to list
1
Lesons
1 hour 29 minutes
On-Demand
Free-Video
NahamSec
Live Bug Bounty Recon Session on Yahoo - Using Meg, Assetfinder, and Other Tools
0
rewiews
Live bug bounty recon session demonstrating tools and techniques for reconnaissance on Yahoo, featuring guest @Tomnomnom. Covers creating wordlists, using meg and assetfinder, directory brute forcing, and crt.sh.
Add to list
1
Lesons
1 hour 47 minutes
On-Demand
Free-Video
NahamSec
Live Bug Bounty Recon Session on Yahoo - Amass, crt.sh, and Dirsearch
0
rewiews
Live bug bounty recon session demonstrating advanced techniques for discovering vulnerabilities on Yahoo, featuring tools like Amass, crt.sh, and dirsearch, with guest expert @TheDawgyg.
Add to list
1
Lesons
3 hours 10 minutes
On-Demand
Free-Video
NahamSec
Live Bug Bounty Recon Session - August 18, 2019
0
rewiews
Live bug bounty recon session covering techniques like JSParser, directory brute forcing, crt.sh, and API fuzzing. Expert guests share insights on effective reconnaissance strategies for ethical hacking.
Add to list
1
Lesons
2 hours 43 minutes
On-Demand
Free-Video
NahamSec
Recon Methodology Using SecurityTrails, FDNS, Whoxy, and More
0
rewiews
Explore codingo_'s unique recon methodology for ethical hacking, featuring tools like SecurityTrails, FDNS, and Whoxy to enhance your cybersecurity skills and bug bounty hunting techniques.
Add to list
1
Lesons
1 hour 33 minutes
On-Demand
Free-Video
NahamSec
Live Recon and Google Dorking on the Department of Defense Vulnerability Disclosure Program
0
rewiews
Explore live reconnaissance and Google dorking techniques on the Department of Defense's Vulnerability Disclosure Program, featuring insights from @thedawgyg.
Add to list
1
Lesons
1 hour 9 minutes
On-Demand
Free-Video
NahamSec
Live Recon on Snapchat - Demonstration of Amass, FFUF, and SecurityTrails
0
rewiews
Explore live reconnaissance techniques on Snapchat using tools like amass, FFUF, and SecurityTrails in this hands-on demonstration with @ITSecurityGuard.
Add to list
1
Lesons
1 hour 42 minutes
On-Demand
Free-Video
Paul Browning
What Is a Social Engineering Attack?
0
rewiews
Learn about social engineering attacks, their techniques, and how to protect against them in this informative cybersecurity lesson.
Add to list
9
Lesons
28 minutes
On-Demand
Free-Video
CAE in Cybersecurity Community
Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation
0
rewiews
Comprehensive overview of Armitage and Metasploit for penetration testing, covering information gathering, exploitation, and post-exploitation techniques through live demonstrations and practical examples.
Add to list
20
Lesons
54 minutes
On-Demand
Free-Video
Bill Buchanan OBE
CeH Unit 3: Footprinting and Scanning - Information Gathering and Network Mapping
0
rewiews
Explore footprinting and scanning techniques for ethical hacking, including passive information gathering, DNS analysis, port scanning, and network mapping tools.
Add to list
16
Lesons
29 minutes
On-Demand
Free-Video
Leveraging Mobile Devices on Pentests - OISF 2013
0
rewiews
Learn to leverage mobile devices in penetration testing with expert Georgia Weidman. Discover techniques and strategies for enhancing security assessments using smartphones and tablets.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
The Cyber Academy
Offensive OSINT
0
rewiews
Explore offensive open-source intelligence techniques with Dr. Kandias, gaining insights into gathering and leveraging publicly available information for cybersecurity purposes.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Collecting Underpants to Win Your Network
0
rewiews
Discover effective network penetration techniques and strategies to enhance your cybersecurity skills in this insightful presentation on ethical hacking and network defense.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
DNS Reconnaissance Techniques - Derbycon 2012
0
rewiews
Explore DNS reconnaissance techniques, including zone transfers, reverse lookups, and cache snooping. Learn to enumerate domains, parse data, and integrate findings with Metasploit for enhanced security assessments.
Add to list
18
Lesons
40 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP Nettacker Project Presentation
0
rewiews
Explore OWASP Nettacker, an automated penetration testing framework for information gathering and vulnerability scanning in web applications and network infrastructure.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
OWASP Foundation
OSINT to Compromise - Techniques for Information Gathering
0
rewiews
Explore OSINT techniques for ethical hacking and cybersecurity, learning how to gather and analyze open-source intelligence to identify vulnerabilities and enhance digital defense strategies.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
OWASP Foundation
OWASP Amass Project: DNS Enumeration and Network Mapping
0
rewiews
Explore DNS enumeration and network mapping with OWASP Amass, a powerful tool for uncovering organizational internet presence and exposure using multiple data sources.
Add to list
12
Lesons
45 minutes
On-Demand
Free-Video
The Aspen Institute
Seeing Around Corners - The Intelligence Professional's Challenge
0
rewiews
Intelligence experts discuss strategies for anticipating and addressing unforeseen threats and challenges in national security, offering insights on navigating uncertainty in a complex global landscape.
Add to list
1
Lesons
1 hour 4 minutes
On-Demand
Free-Video
Linux Foundation
reNgine - An Automated Reconnaissance Framework
0
rewiews
Explore an automated reconnaissance framework for efficient cybersecurity assessments, enhancing vulnerability detection and streamlining security workflows.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
BSidesLV
OH-SINT: Merging OSINT Into Reverse Engineering Workflows to Simplify Analysis
0
rewiews
Leveraging OSINT in reverse engineering to overcome anti-analysis techniques, track down information from developers, and speed up malware analysis workflows for quicker insights.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
Passive Reconnaissance Techniques for Ethical Hacking - Webinar 3
0
rewiews
Explore passive reconnaissance techniques for ethical hacking and cybersecurity, focusing on gathering information without direct interaction with target systems.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
HackerSploit
Google Dorks for Penetration Testing
0
rewiews
Aprenda a usar Google Dorks para encontrar vulnerabilidades, configuraciones incorrectas y exposición de datos en sitios web durante pruebas de penetración y recopilación de información.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
HackerSploit
Information Gathering With Shodan
0
rewiews
Demonstración práctica del uso de Shodan para recopilación de información y reconocimiento en pruebas de penetración, explorando sus filtros y capacidades de búsqueda de dispositivos conectados a Internet.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
HackerSploit
Maltego - Automated Information Gathering
0
rewiews
Explore automated information gathering with Maltego in this tutorial. Learn to efficiently collect and analyze data for cybersecurity and intelligence purposes.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
HackerSploit
Red Team Reconnaissance Techniques
0
rewiews
Explore active and passive reconnaissance techniques for Red Team operations, including information gathering on organizations, infrastructure, and personnel to support targeting and adversary lifecycle phases.
Add to list
1
Lesons
1 hour 27 minutes
On-Demand
Free-Video
Bugcrowd
New Methods of Recon - Enhancing Reconnaissance Techniques
0
rewiews
Refine and expand your reconnaissance toolkit with top hacker OrwaGodfather's precise tactics, enhancing your bug hunting capabilities.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Venelin Valkov
AI Agents with GPT-4 Turbo and CrewAI - Creating Cryptocurrency Market Reports
0
rewiews
Learn to build AI agent teams using CrewAI for cryptocurrency market analysis. Covers agent creation, task definition, and team execution to generate newsletter reports from latest news.
Add to list
10
Lesons
24 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Piscitelli, Levy, Loyo y Vila - OSINT e Ing. Social aplicada a las investigaciones - Ekoparty 2019
0
rewiews
Técnicas de OSINT e Ingeniería Social para obtener información de fuentes abiertas en investigaciones, presentadas por expertos en la conferencia de seguridad Ekoparty 2019.
Add to list
1
Lesons
1 hour 47 minutes
On-Demand
Free-Video
Hack in Paris
Introduction to IoT Reverse Engineering
0
rewiews
Introduction to firmware reverse engineering for IoT devices, focusing on information gathering, emulation environment setup, and analysis techniques. Includes a practical example using a home router.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
NorthSec
Damn GraphQL - Attacking and Defending APIs
0
rewiews
Explore GraphQL security: attack vectors, defense strategies, and hands-on learning with the Damn Vulnerable GraphQL Application. Gain insights into protecting this emerging API technology.
Add to list
15
Lesons
27 minutes
On-Demand
Free-Video
BruCON Security Conference
Introducing the Smartphone Penetration Testing Framework
0
rewiews
Comprehensive framework for assessing smartphone security in organizations, covering various attack vectors and providing tools for penetration testing across multiple platforms.
Add to list
22
Lesons
56 minutes
On-Demand
Free-Video
LASCON
Reversing Web Applications
0
rewiews
Explore web application reverse engineering techniques, from information gathering to active testing, to understand behavior, analyze code, and improve security assessments.
Add to list
33
Lesons
50 minutes
On-Demand
Free-Video
Black Hat
Researching Secrets, Part 1
0
rewiews
Explore techniques for uncovering hidden information and investigating confidential data in Windows systems with expert James Bamford.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Black Hat
You Got That With Google?
0
rewiews
Explore advanced Google search techniques for information gathering and security testing, led by expert Johnny Long at Black Hat USA 2004.
Add to list
1
Lesons
1 hour 39 minutes
On-Demand
Free-Video
HackerOne
How I Got from 0 to MVH - Without Knowing How to Write a Single Line of Python
0
rewiews
Discover one hacker's journey from novice to Most Valuable Hacker, exploring tools, resources, challenges, and strategies for success in bug bounty hunting without coding skills.
Add to list
8
Lesons
20 minutes
On-Demand
Free-Video
AntiFreeze Hamburger12 - How I Got Network Creds Without Even Asking - A Social Engineering Case Study
0
rewiews
Explore a real-world social engineering case study revealing how network credentials were obtained without direct requests, highlighting vulnerabilities and tactics used in cybersecurity breaches.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
NahamSec
How to Use Amass Efficiently
0
rewiews
Comprehensive guide on maximizing Amass tool for efficient information gathering and reconnaissance in cybersecurity, presented by expert Jeff Foley at NahamCon2020.
Add to list
1
Lesons
1 hour 56 minutes
On-Demand
Free-Video
NahamSec
Recon Fundamentals by Example
0
rewiews
Explore recon fundamentals through practical examples in this offensive security talk. Learn essential techniques for effective reconnaissance in bug bounty and penetration testing.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
Security BSides San Francisco
Getting Started - Help Me Help You
0
rewiews
Practical guidance on initial steps to take during a cybersecurity incident, including data collection, communication strategies, and common pitfalls to avoid when responding to a breach.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
OSINT Beyond the Basics
0
rewiews
Advanced techniques for gathering and analyzing open-source intelligence, exploring innovative methods to enhance investigative capabilities and uncover hidden information.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Information Gathering and Social Media Attacks to Gain Access
0
rewiews
Explore social engineering tactics, evil twin attacks, and information gathering techniques using LinkedIn and other social media platforms for cybersecurity purposes.
Add to list
24
Lesons
35 minutes
On-Demand
Free-Video
Using Social Networks to Profile, Find and Own Your Victims
0
rewiews
Learn techniques for profiling and exploiting targets using social networks, exploring vulnerabilities in online information sharing.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Trash Talkin IT Audit Guide to Dumpster Diving
0
rewiews
Explore the unconventional IT audit technique of dumpster diving, uncovering valuable information and potential security risks hidden in discarded materials.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Recon ng and Beyond - Tim Tomes
0
rewiews
Explore advanced reconnaissance techniques using Recon-ng, covering modules like Meta Crawler, Profiler, and vulnerability scanning. Learn to leverage search engines and GitHub for effective information gathering.
Add to list
25
Lesons
58 minutes
On-Demand
Free-Video
The Art of Espionage - Stop Trying to Be Tom Cruise
0
rewiews
Discover real-world espionage techniques beyond Hollywood portrayals. Learn practical skills and insights into the art of intelligence gathering and covert operations.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
So You've Inherited a Security Department - Now What
0
rewiews
Practical strategies for new security department leaders: asset management, information gathering, vulnerability assessment, and team building for effective cybersecurity operations.
Add to list
20
Lesons
38 minutes
On-Demand
Free-Video
A POS Breach Investigation
0
rewiews
Explore POS breach investigation techniques, covering malware analysis, network examination, and forensic methods to detect and respond to retail cybersecurity incidents.
Add to list
19
Lesons
50 minutes
On-Demand
Free-Video
Hillbilly Storytime - Pentest Fails
0
rewiews
Humorous and insightful talk on penetration testing failures, offering valuable lessons and takeaways for security professionals through real-world examples and stories.
Add to list
15
Lesons
56 minutes
On-Demand
Free-Video
Ninja Looting Like a Pirate Infojanitor
0
rewiews
Explore advanced techniques for stealthy information gathering and data extraction in cybersecurity, drawing parallels to ninja and pirate tactics for effective digital reconnaissance.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Invoke GreatBirdOfCommonKnowledge - Gathering What Is Scattered with ATTCK an Atomic Bird
0
rewiews
Explore cybersecurity insights from Derbycon 2019, focusing on gathering scattered information using ATTCK and Atomic Bird methodologies for enhanced threat intelligence and defense strategies.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
ACCU Conference
AI - Actual Intelligence
0
rewiews
Explore the complexities of artificial intelligence, its implications for human identity, and the challenges of machine-driven information gathering and processing in modern society.
Add to list
31
Lesons
54 minutes
On-Demand
Free-Video
NDC Conferences
Hacking Humans - Social Engineering Techniques and How to Protect Against Them
0
rewiews
Explore social engineering tactics, their impact on organizations, and learn effective strategies to protect yourself and your company from manipulation and security breaches.
Add to list
18
Lesons
41 minutes
On-Demand
Free-Video
NDC Conferences
Hacking Humans - Social Engineering Techniques and How to Protect Against Them
0
rewiews
Explore social engineering tactics, their impact on organizations, and learn effective strategies to protect yourself and your company from manipulation and security breaches.
Add to list
21
Lesons
47 minutes
On-Demand
Free-Video
NDC Conferences
Hacking Humans - Social Engineering Techniques and How to Protect Against Them
0
rewiews
Explore social engineering tactics, their impact on organizations, and learn effective strategies to protect yourself and your company from manipulation and security breaches.
Add to list
21
Lesons
50 minutes
On-Demand
Free-Video
CarolinaCon
Protecting Yourself Online: Social Engineering Defense and Privacy Strategies
0
rewiews
Discover essential strategies for protecting your digital footprint from social engineering attacks, learning how pentesters gather public information and implementing effective countermeasures.
Add to list
16
Lesons
20 minutes
On-Demand
Free-Video
BSidesMunich
Let Me Do It For You: Automating OSINT and Recon
0
rewiews
Discover effective strategies for automating OSINT and reconnaissance processes to streamline cybersecurity investigations and threat intelligence gathering.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
Recon Village
Crushing Crumbs of Information: Using OSINT to Build Complete Target Profiles
0
rewiews
Discover how to leverage seemingly insignificant data leaks from public websites to build comprehensive OSINT profiles, with practical examples and tools demonstrated through Brazilian case studies.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Recon Village
OSINT Fundamentals - A Guide to Open Source Intelligence Gathering
0
rewiews
Discover the art of Open Source Intelligence through a Dr. Seuss-inspired exploration of OSINT tools, techniques, and ethical considerations for gathering and analyzing publicly available information.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
DEFCONConference
Social Engineering Techniques for Physical Access Red Team Operations
0
rewiews
Dive into real-world social engineering tactics through a first-person narrative of complex red team operations, exploring methodologies for physical access and critical infrastructure penetration testing.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
SQLBits
Asking Questions to Get Meaningful Answers
0
rewiews
Learn techniques for crafting effective questions to elicit valuable information, leading to faster results and improved communication in professional settings.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
CarolinaCon
Open Source Intelligence Gathering for Security Testing - Recon 101
0
rewiews
Master essential OSINT techniques and reconnaissance tools to efficiently gather critical intelligence about organizational infrastructure and potential security vulnerabilities without active network engagement.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
DEFCONConference
OSINT for Physical Security Intelligence - Rapid Data Collection and Analysis
0
rewiews
Master efficient OSINT techniques for physical security, focusing on rapid intelligence gathering, predictive analysis, and actionable insights for critical situation assessment and risk management.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
ACM SIGPLAN
The Rational Programmer: An Investigative Method for Programming Language Pragmatics
0
rewiews
Explore the Rational Programmer method for evaluating programming language pragmatics through simulations, enhancing developer productivity and informing language design and teaching strategies.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
load more...