Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Social Engineering
#Vishing
Showing:
373
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Irfan Shakeel
The Complete Open Source Intelligence Training Course
7
rewiews
Comprehensive OSINT training covering key concepts, tools, and techniques for gathering intelligence from open sources, including darknet, aircraft, people, documents, and images.
Add to list
11
Lesons
2 hours 26 minutes
On-Demand
Free-Video
CEC
Women Studies
2
rewiews
Learn about the Nature of State & Women Empowerment in India, Violence against Women and Harassment of Women at Work place and other Women Issues in India in this course on Women Studies
Add to list
15
Lesons
14 hours
On-Demand
Free-Video
Introduction to Cyber Security Literacy - Video Lectures
1
rewiews
Comprehensive video lectures covering essential cybersecurity topics, from basic computer concepts to advanced online safety practices, empowering learners with practical knowledge for digital protection.
Add to list
30
Lesons
5 hours
On-Demand
Free-Video
Paul Browning
CompTIA PenTest+ Full Course - PT0-002
1
rewiews
Comprehensive penetration testing training covering planning, reconnaissance, vulnerability analysis, exploitation techniques, and reporting, with hands-on labs using industry-standard tools and frameworks.
Add to list
26
Lesons
11 hours 32 minutes
On-Demand
Free-Video
Santa Fe Institute
Social and Economic Engineering - InterPlanetary Festival 2018
0
rewiews
Explore social and economic engineering with experts discussing future challenges and opportunities in technology, society, and economics.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
Santa Fe Institute
Intelligent Systems, Music, and Social Engineering - InterPlanetary Festival Day 2
0
rewiews
Explore intelligent systems, social engineering, and visualization with expert panels, plus a unique theremin concert. Dive into cutting-edge topics with leading thinkers and innovators.
Add to list
1
Lesons
3 hours 25 minutes
On-Demand
Free-Video
Cloud Security Alliance
Mastering Cloud Risk Management: A Guide to Best Practices
0
rewiews
Gain comprehensive insights into cloud risk management strategies. Learn to assess, mitigate, and adapt to evolving challenges in cloud computing for enhanced organizational security.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Black Hat
Living off Microsoft Copilot - Exploiting AI for Red Team Operations
0
rewiews
Explore how Microsoft Copilot can be exploited for covert data theft, exfiltration, and AI-based social engineering. Learn about LOLCopilot tool and recommended protective measures against Copilot abuse.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Conf42
AI in Detecting Fraudulent Payments from Social Engineering
0
rewiews
Explore AI's role in combating fraudulent payments from social engineering in fintech, covering phishing detection, identity theft prevention, and emerging threats like deepfakes.
Add to list
13
Lesons
14 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Ekoparty Summer Workshops 2021 - Técnicas OSINT para la Generación de Inteligencia
0
rewiews
Técnicas de OSINT y SOCMINT para obtener datos valiosos en investigaciones. Incluye teoría, práctica y ejercicios en vivo de análisis de redes sociales para extraer información procesable.
Add to list
1
Lesons
2 hours 58 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Ekoparty Summer Workshops 2023 - Comunicación No Verbal, Ejemplos Reales
0
rewiews
Taller interactivo sobre Comunicación No Verbal: definición, análisis y ejemplos prácticos. Aprende a identificar aspectos clave del comportamiento no verbal con el experto Matías Choren Ruiz.
Add to list
1
Lesons
1 hour 49 minutes
On-Demand
Free-Video
TEDx
Hacklenmemek İçin Hacklemeyi Bilmek - Understanding Hacking to Prevent Being Hacked
0
rewiews
Siber güvenlik uzmanı Dr. Erdal Özkaya, internet tuzakları, gizli veri paylaşımı ve siber güvenlik önlemleri hakkında bilgi veriyor. Güncel örnekler ve mizahi anlatımla siber tehditlere karşı farkındalık yaratıyor.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
TEDx
Cybersecurity: How to Avoid Online Scams
0
rewiews
资深网络安全专家剖析常见诈骗手法,分享实用防范措施。学习识别风险、掌握资讯,培养警惕性,有效降低成为网络诈骗受害者的风险。
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Introduction to Lie Detection with Nonverbal Communication - Workshop
0
rewiews
Introducción práctica a la detección de mentiras mediante Comunicación No Verbal. Combina teoría y ejemplos interactivos para desarrollar habilidades de análisis en situaciones reales.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Counter Offensive Social Engineering - Digital Brand Protection and Customer Behavior Analysis
0
rewiews
Estrategia integrada de protección de marca digital y análisis de comportamiento del cliente para mitigar riesgos de ingeniería social y detectar comportamientos anómalos en operaciones financieras.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
Ekoparty Security Conference
RedTeaming from Basics - Employee Information Leaks for the Win
0
rewiews
Metodología de reconocimiento en RedTeam: desde el dominio hasta la red interna. Enfoque ofensivo para identificar vectores de ataque y obtener información pública de empleados y empresas.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Social Engineering - Beyond Laughter: The Reality of Our Digital Vulnerability
0
rewiews
Explora los límites de la ingeniería social mediante un análisis de datos de participantes en concursos, revelando cómo las personas comparten información sensible sin considerar las consecuencias en redes sociales y sorteos.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
media.ccc.de
Social Engineering: History, Impact, and Countermeasures
0
rewiews
Umfassender Einblick in Social Engineering: Geschichte, psychologische Grundlagen, moderne Herausforderungen und effektive Schutzmaßnahmen. Entmystifizierung gängiger Mythen und Präsentation aktueller Forschungsergebnisse.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Masterclass: Ingeniería Social y Seguridad Móvil
0
rewiews
Explora los fundamentos de la ingeniería social y su conexión con la seguridad móvil. Aprende tácticas de manipulación psicológica y amenazas en dispositivos móviles para proteger datos sensibles.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
TEDx
Siber Güvenlik ve İnsan Hackleme Sanatı
0
rewiews
Siber güvenlik uzmanı Okan Algün, sosyal mühendislik ve insan hackleme sanatı hakkında bilgi veriyor. Güvenli sandığımız dijital platformların riskleri ve siber suçlardan korunma yöntemleri ele alınıyor.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
media.ccc.de
Manipulating Chatbots Through Creative Language - Our Words Are Our Weapons
0
rewiews
Entdecken Sie kreative Methoden zur Manipulation von Chatbots durch geschickte Wortwahl. Lernen Sie, wie Social Engineering bei KI funktioniert und wie Sie Sprachmodelle für Ihre Zwecke nutzen können.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
DefCamp
Complex Bank Card Smishing Attack Exploiting Posta Romana's Image - DefCamp Cluj-Napoca 2024
0
rewiews
Análisis detallado de un sofisticado ataque de smishing bancario que aprovecha la imagen de Posta Romana, revelando técnicas y contramedidas para mejorar la seguridad cibernética.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
DefCamp
Deepfake - Threats and Potential Actions
0
rewiews
Explore deepfake technology's threats and potential countermeasures in this cybersecurity presentation, highlighting risks and strategies for detection and mitigation.
Add to list
1
Lesons
1 hour 12 minutes
On-Demand
Free-Video
IEEE
Analyzing Ground-Truth Data of Mobile Gambling Scam
0
rewiews
Explore mobile gambling scam tactics, data analysis, and infrastructure, uncovering social engineering tricks, app delivery methods, and payment channels used by cybercriminals.
Add to list
19
Lesons
18 minutes
On-Demand
Free-Video
Bugcrowd
Social Engineering 101 by Matteo Cagnazzo
0
rewiews
Discover techniques for gathering company information through OSINT and social engineering. Learn how non-technical methods can complement technical security assessments in bug hunting.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
HackerOne
Security and Hacking - Lessons from the MySpace Worm
0
rewiews
Explore hacking insights from Samy Kamkar, renowned for the MySpace worm, as he shares his expertise and experiences in cybersecurity at the Security@ Conference.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Bugcrowd
Critical Security Issues and Trends for 2017
0
rewiews
Explore critical security trends with industry experts, covering IoT vulnerabilities, crowdsourced testing, AI impacts, and evolving threats to prepare for the cybersecurity landscape of 2017.
Add to list
8
Lesons
1 hour 4 minutes
On-Demand
Free-Video
Cyber Mentor
Pentest Story Time - My Favorite Hacks
0
rewiews
Engaging talk sharing real-world pentesting experiences and favorite hacking techniques. Offers valuable insights for cybersecurity professionals and aspiring ethical hackers.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
Cyber Mentor
Much Ado About Credential Stuffing - CarolinaCon 2019 Preview
0
rewiews
Explore credential stuffing attacks, their impact on cybersecurity, and effective prevention strategies. Learn from real-world examples and expert insights to enhance your digital defense skills.
Add to list
8
Lesons
25 minutes
On-Demand
Free-Video
Cyber Mentor
I Know Where You Live Thanks to Your Cooking Tutorial
0
rewiews
Explore how seemingly innocent online content can reveal personal information, highlighting the importance of digital privacy and security awareness.
Add to list
1
Lesons
14 minutes
On-Demand
Free-Video
Infosecurity Europe
Mitigating the Human Risk in Information Security
0
rewiews
Explore social engineering tactics, vulnerabilities, and psychological hacks with expert Jenny Radcliffe in this eye-opening keynote on mitigating human risk in cybersecurity.
Add to list
11
Lesons
32 minutes
On-Demand
Free-Video
Infosecurity Europe
Evolving Cyber Threat Landscape: From Mobile Apps to Social Engineering
0
rewiews
Comprehensive overview of evolving cyber threats, from app-based risks to social engineering, emphasizing the importance of human education in strengthening organizational cybersecurity defenses.
Add to list
8
Lesons
28 minutes
On-Demand
Free-Video
LASCON
Social Engineering Metrics: Using Data Science for Valuable Reporting
0
rewiews
Innovative approach to social engineering metrics using data science, focusing on meaningful measurements that reflect an organization's security posture and culture beyond traditional click rates.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
LASCON
Leveraging Social Engineering in Physical Security Assessment - 2017
0
rewiews
Explore techniques for leveraging social engineering in physical security assessments, enhancing your ability to identify vulnerabilities and strengthen organizational defenses.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
LASCON
Phishing: It's Not Just for Pentesters - 2017
0
rewiews
Explore effective social engineering awareness programs and learn to create internal phishing simulations to measure and improve organizational security against human-targeted attacks.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Exposing Influence in Cyber Social Engineering - Thinking Slow
0
rewiews
Explores machine learning methods to expose influence tactics in online deceptive content, aiming to improve human detection of phishing, disinformation, and deceptive ads.
Add to list
7
Lesons
18 minutes
On-Demand
Free-Video
CAE in Cybersecurity Community
Social Engineer Your Students Before They Social Engineer You
0
rewiews
Learn techniques to teach social engineering in cybersecurity, covering human factors, psychology, and defense against human vulnerabilities. Gain insights on incorporating this crucial topic into curriculum effectively.
Add to list
11
Lesons
28 minutes
On-Demand
Free-Video
Paul Browning
What Is a Social Engineering Attack?
0
rewiews
Learn about social engineering attacks, their techniques, and how to protect against them in this informative cybersecurity lesson.
Add to list
9
Lesons
28 minutes
On-Demand
Free-Video
White Hat Cal Poly
Security Fundamentals - White Hat Officers
0
rewiews
Learn ethical hacking essentials: security concepts, historical ciphers, social engineering, steganography, and crypto vulnerabilities from White Hat experts.
Add to list
6
Lesons
48 minutes
On-Demand
Free-Video
media.ccc.de
Our Time in a Product Review Cabal - Uncovering Malware and Vulnerabilities in Free Products
0
rewiews
Explore the journey of a product review group, uncovering vulnerabilities in free tech products and learning to detect and mitigate security issues in various smart devices.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
No InfoSec Staff? No Problem - Addressing Security Challenges Without Dedicated Personnel
0
rewiews
Learn to assess and mitigate cybersecurity risks without dedicated staff. Covers threat landscape, vulnerabilities, risk assessment, employee awareness, and compliance strategies for organizations.
Add to list
5
Lesons
24 minutes
On-Demand
Free-Video
Teach a Man to Phish - Cybersecurity Awareness Training
0
rewiews
Learn effective phishing techniques and strategies to enhance cybersecurity awareness and defense capabilities in this informative BSidesLV 2014 presentation by Vinny Lariza.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Kippo Honeypot: Capturing and Analyzing Hacker Behavior - BSides Tampa 2015
0
rewiews
Explore honeypot technology, its evolution, and real-world applications in cybersecurity through a demo showcasing network traffic analysis and hacker interactions.
Add to list
32
Lesons
44 minutes
On-Demand
Free-Video
Using Propaganda Techniques to Instill a Culture of Security
0
rewiews
Learn effective security awareness techniques using propaganda methods, from historical examples to practical implementation strategies for cultural change in organizations.
Add to list
27
Lesons
48 minutes
On-Demand
Free-Video
Social Aftermath: Responding to Social Pwnage - BSidesLV 2013
0
rewiews
Explore strategies for responding to social engineering attacks and mitigating their impact on organizations. Learn effective techniques to handle the aftermath of social "pwnage".
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Booting the Booters, Stressing the Stressors - BSidesRI 2013
0
rewiews
Explore social engineering, DDoS attacks, and cybercrime economics in this talk on "booters" and "stressors," examining their methods, impacts, and potential countermeasures.
Add to list
18
Lesons
46 minutes
On-Demand
Free-Video
The Cyber Academy
Phishing - The Threat That Keeps on Going
0
rewiews
Explore the persistent threat of phishing with Professor Steve Furnell, examining its evolution, impact, and strategies for protection in the digital age.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
Introducing the Smartphone Penetration Testing Framework
0
rewiews
Explore smartphone penetration testing with Georgia Weidman's framework, covering vulnerabilities, jailbreaking, and mobile security challenges in the workplace.
Add to list
24
Lesons
44 minutes
On-Demand
Free-Video
Social Engineering Defense Contractors on LinkedIn and Facebook
0
rewiews
Discover techniques for social engineering defense contractors on LinkedIn and Facebook, exploring vulnerabilities and protective measures in online professional networking.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
The Blooming Social Media Economics Built on Fake Identities - Lecture 2.2.3
0
rewiews
Explore the economic impact of fake identities on social media platforms and their role in shaping online interactions and marketing strategies.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
The Devil's in the Details: A Look at Bad Social Engineering and How to Do Better
0
rewiews
Explore social engineering tactics, common pitfalls, and strategies for improvement in this insightful talk on human manipulation and cybersecurity.
Add to list
28
Lesons
35 minutes
On-Demand
Free-Video
Social Zombies: Rise of the Mobile Dead
0
rewiews
Explore the rise of mobile vulnerabilities and social engineering threats in this insightful presentation on cybersecurity challenges in the mobile era.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Forensic 365
Cybersecurity Ignorance: Risks and Consequences - Keynote Talk
0
rewiews
Explore the critical importance of cybersecurity, its core principles, and real-world consequences of negligence. Learn about evolving threats, data protection, and essential practices to safeguard digital assets.
Add to list
18
Lesons
57 minutes
On-Demand
Free-Video
BruCON Security Conference
Red Team Tales: 7 Years of Physical Penetration Testing
0
rewiews
Explore real-world physical penetration testing experiences across diverse facilities, from banks to cheese factories. Gain insights into security vulnerabilities and unconventional tactics used in red team operations.
Add to list
1
Lesons
1 hour 7 minutes
On-Demand
Free-Video
Web Summit
Privacy - The New Fame? Exploring Online Data Security and Personal Privacy
0
rewiews
Explore the future of online privacy with experts discussing its importance, potential dangers, legislation, and innovative solutions for protecting personal data in the digital age.
Add to list
11
Lesons
18 minutes
On-Demand
Free-Video
Hook, Line and Syncer - The Liar for Hire's Ultimate Tacklebox
0
rewiews
Explore advanced social engineering techniques and strategies for deception in cybersecurity, featuring expert insights on manipulating human behavior for penetration testing.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
Adaptive Penetration Testing - Techniques and Strategies
0
rewiews
Explore adaptive penetration testing techniques with Kevin Mitnick and Dave Kennedy, covering profiling, bypassing security measures, and innovative attack methods using specialized hardware.
Add to list
21
Lesons
59 minutes
On-Demand
Free-Video
OWASP Foundation
OSINT to Compromise - Techniques for Information Gathering
0
rewiews
Explore OSINT techniques for ethical hacking and cybersecurity, learning how to gather and analyze open-source intelligence to identify vulnerabilities and enhance digital defense strategies.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
OWASP Foundation
Blinded by the Weakest Link - A New Perspective on Human Risk in Cybersecurity
0
rewiews
Explore a new perspective on human risk in cybersecurity, challenging the "weakest link" mindset and offering innovative strategies to enhance security decision-making and behavior.
Add to list
19
Lesons
1 hour 7 minutes
On-Demand
Free-Video
OWASP Foundation
Security Begins with Secure Development Environments
0
rewiews
Explore supply chain security threats in development environments, focusing on vulnerabilities in Visual Studio Code extensions and their potential for remote code execution.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
The Aspen Institute
Aspen Cyber Summit 2020 - Day 3: Cybersecurity Challenges and Strategies
0
rewiews
Global leaders discuss pressing cybersecurity threats, policy questions, and resilience strategies. Summit features release of national cybersecurity agenda for next term, focusing on five key policy areas to build a more resilient digital society.
Add to list
24
Lesons
2 hours 55 minutes
On-Demand
Free-Video
OWASP Foundation
Dark Fairytales From A Phisherman - Application Security
0
rewiews
Explore phishing techniques and strategies through dark fairytales, offering insights into cybersecurity threats and prevention methods for application security professionals.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
OWASP Foundation
Accidental Abyss: Data Leakage on the Internet
0
rewiews
Explore techniques for uncovering personal information scattered across the internet, learn about low-tech reconnaissance methods, and discover tools for effective social engineering and improved security awareness.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
Cooper
The Science Behind Social Engineering and Effective Security Culture
0
rewiews
Explore the psychological principles behind social engineering and learn strategies for building a robust security culture within organizations.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
More Than Just a Pretty Penny - Why You Need Cybersecurity in Your Culture
0
rewiews
Discover strategies to integrate cybersecurity into workplace culture, empowering employees to identify and address potential risks, fostering a safer digital environment for your organization.
Add to list
9
Lesons
29 minutes
On-Demand
Free-Video
BSidesLV
Cognitive Security and Social Engineering: A Systems-Based Approach
0
rewiews
Explore cognitive security's unique approach to protecting systems, considering interconnectedness and multiple scales. Learn about the Cognitive Security Attack Cycle and strategies for disrupting attacks.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
BSidesLV
Social Engineering: Training the Human Firewall Against Phishing Attacks
0
rewiews
Explore research on psychological factors behind phishing susceptibility and learn strategies to improve security education and measure risk in your organization.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Systems Alchemy: The Transmutation of Hacking
0
rewiews
Exploring systems thinking in hacking, this keynote reveals how understanding complex systems creates new opportunities to manipulate critical infrastructure and the fabric of cyberspace.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
media.ccc.de
Identifying Social Engineering - Five Key Indicators
0
rewiews
Explore five key indicators to identify social engineering in real-world scenarios, literature, and experimental design, enhancing your ability to recognize and mitigate manipulation tactics.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Forensic 365
Cyber Unsafe - How Not to Be the Target of Cyber Criminals
0
rewiews
Learn essential cybersecurity measures to protect yourself from online criminals. Dr. Gaurav Gupta explains how to prevent data leaks and avoid falling victim to cyber manipulation and deception.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
Security BSides San Francisco
Hook, Line, and Tinker: A Dive into Phishing Campaign Sites
0
rewiews
Explore phishing cases, learn active reconnaissance techniques, and discover how to disrupt attackers and identify security gaps with an AppSec engineer's insights and triage process.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Security BSides San Francisco
Advanced Persistent Teenagers - Understanding the Lapsus$ Playbook
0
rewiews
Explore how teenage hackers breached major tech companies, analyze their techniques, and learn effective defense strategies against similar attacks.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
John Hammond
Fake CAPTCHA Malware Analysis
0
rewiews
Explore the deceptive tactics of malware disguised as CAPTCHA, uncovering its distribution methods and analyzing its impact on cybersecurity.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
TEDx
White Hat Lies - Cybersecurity and Online Privacy
0
rewiews
Cybersecurity expert Mishaal Khan explores online privacy, ethical hacking, and protecting personal information. Through engaging demos, he makes complex security concepts accessible and shares insights on enhancing digital safety.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
BSides SATX
Nation-State Threats in the Open-Source Software Supply Chain
0
rewiews
Explore nation-state threats in open-source software, focusing on North Korean Lazarus Group's npm campaigns. Learn evolving tactics and motivations to better defend against sophisticated cyber threats.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Security BSides San Francisco
Crafting and Executing Successful Vishing Attacks
0
rewiews
Explore practical OSINT techniques for vishing attacks, from target identification to pretext crafting and call execution with spoofed numbers, highlighting the growing threat of malicious phone calls.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Security BSides San Francisco
Phish and Furious - Campaign Builder Vulnerabilities in a Blink and Breach World
0
rewiews
Explore campaign builder vulnerabilities and phishing attack strategies with real-world case analyses. Learn dynamic cybersecurity defense techniques for evolving digital threats.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Black Hat
Voice Phishing Syndicates Unmasked - An In-Depth Investigation and Exposure
0
rewiews
Investigación detallada sobre sindicatos de estafa telefónica en Corea del Sur, analizando sus tácticas, malware y métodos de ataque evolucionados para exponer sus operaciones sofisticadas.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
The Human Element in Cybercrime and Cybersecurity
0
rewiews
Explore the human factor in cybersecurity through encounters with hackers and pentesters. Learn why understanding attacker motivations is crucial for developing effective defenses beyond usable security.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Sundeep Saradhi Kanthety
Ethical Hacking Course - Kali Linux, Phishing Attacks, Veil, Burp Suite, and DVWA
0
rewiews
Comprehensive ethical hacking tutorial covering Kali Linux, phishing attacks, Veil framework, Burp Suite, and DVWA. Learn essential techniques and tools for cybersecurity testing and vulnerability assessment.
Add to list
1
Lesons
7 hours 59 minutes
On-Demand
Free-Video
TEDx
Vulnerable to Vigilant - Social Engineering in the Digital Age
0
rewiews
Explore social engineering threats and learn practical strategies to enhance your online security with insights from a young cybersecurity expert.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Microsoft
The Risk of Trust - Social Engineering Threats and Cyber Defense
0
rewiews
Explore social engineering threats and enhance cyber defenses in the digital trust economy. Gain actionable insights to protect against evolving risks in financial and social interactions.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Security BSides London
Oh My Phish - Cybersecurity Awareness and Phishing Prevention
0
rewiews
Explore advanced phishing techniques and defense strategies with cybersecurity experts Theram and Dhruv Bisani in this insightful Security BSides London presentation.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
NDC Conferences
Banking Cybersecurity - Battling DeepFakes and AI-powered Scammers
0
rewiews
Explore banking cybersecurity challenges, including DeepFakes and AI-powered scams. Learn strategies to protect customer data, witness a live DeepFake demo, and discover proactive measures for safeguarding financial assets.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
John Hammond
The Phishing Website that Hacked Linus Tech Tips
0
rewiews
Análisis detallado del ataque de phishing a Linus Tech Tips, explorando técnicas utilizadas y lecciones de ciberseguridad para prevenir incidentes similares.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
John Hammond
Permission to Hack You - Illicit Consent Grant Attack
0
rewiews
Explore the Illicit Consent Grant Attack, a sophisticated technique exploiting OAuth permissions in Azure AD. Learn how attackers manipulate consent to gain unauthorized access to sensitive resources.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
INFOSEC TRAIN
Penetration Testing Interview Questions and Answers - Master Scenario Based Prep
0
rewiews
Master scenario-based interview prep for penetration testers. Covers vulnerability assessments, exploit development, and real-world scenarios to boost confidence and skills for landing dream jobs in cybersecurity.
Add to list
4
Lesons
38 minutes
On-Demand
Free-Video
The Royal Institution
How Games Secretly Shape Our World
0
rewiews
Explore how games shape society, from military strategy to AI and human behavior. Uncover their impact on learning, decision-making, and predicting the future across various fields.
Add to list
10
Lesons
53 minutes
On-Demand
Free-Video
Black Hat
From BYOVD to 0-Day - Unveiling Advanced Exploits in Cyber Recruiting Scams
0
rewiews
Unveiling sophisticated cyber-attacks disguised as job recruitment, featuring 0-day exploits and advanced rootkit capabilities. Explores novel attack methods targeting Asia, bypassing security measures.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
WeAreDevelopers
Fighting Digital Threats in the Age of AI
0
rewiews
Explore strategies to combat evolving digital threats in the AI era, focusing on cybersecurity challenges and innovative defense mechanisms for the modern technological landscape.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
BSidesLV
Hacking Trust Establishment - Tactics for Social Engineering and Business Relationships
0
rewiews
Explore tactics for quickly building trust in professional relationships, enhancing social operations, sales, management, and executive support.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
BSidesLV
Devising and Detecting Spear Phishing Using Data Scraping, Large Language Models, and Personalized Spam Filters
0
rewiews
Explore AI-powered phishing techniques and countermeasures, including automated email creation, personalized spam filters, and digital footprint optimization for enhanced cybersecurity.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
BSidesLV
Spear-Phishing at Scale Using Generative AI - EHLO World
0
rewiews
Explore how Generative AI enhances email-based attacks, enabling sophisticated phishing campaigns at scale. Learn about real-world examples and future implications for cybersecurity.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
WEareTROOPERS
The Red Teamer's Guide to Deception
0
rewiews
Explore advanced deception techniques for red teamers in IT security, enhancing penetration testing strategies and uncovering vulnerabilities in organizational defenses.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
DefCamp
Echoes of Deception - Fake Content, Ads, and Promises
0
rewiews
Explore deceptive online content, ads, and promises in cybersecurity. Learn to identify and combat fake information for enhanced digital safety and awareness.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
DefCamp
Social Engineering with AI and Defending Against It with Human Intelligence
0
rewiews
Explore AI-powered social engineering tactics and human-centric defense strategies in this cybersecurity talk. Gain insights on protecting against evolving threats in the digital landscape.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
TEDx
You Have Been Hacked - Understanding Digital Vulnerability and Cybercrime
0
rewiews
Explore digital vulnerabilities, hacker tactics, and the psychological impact of cybercrime. Gain insights into real-life cyber breaches and learn how to protect yourself in the digital age.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
John Hammond
Cracking Active Directory Passwords and MFA Fatigue
0
rewiews
Explore techniques for cracking Active Directory passwords and exploiting MFA fatigue vulnerabilities. Learn to strengthen organizational security through robust password policies and MFA implementation.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
BSides SATX
Protecting Small Businesses from Cyber Attacks - Strategies and Real-World Scenarios
0
rewiews
Explore attacker strategies, real-world scenarios, and cost-effective measures to protect small businesses from cyber threats. Learn to engage employees through gamification for enhanced security.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
BSides SATX
Offensive Security Awareness: Understanding Assessment Types and Methodologies
0
rewiews
Demystify offensive security techniques, tools, and assessment types. Gain insights into vulnerability management strategies and learn to choose the right approach for your organization's security needs.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
load more...