Cryptography

Offensive Security

Offensive Security is an American international company working in information security, penetration testing and digital forensics. Operating from around 2007, the company created open source projects, advanced security courses, ExploitDB (vulnerability database) and the Kali Linux distribution. The company was started by Mati Aharoni, and employs security professionals with experience in security penetration testing and system security evaluation. The company has provided security counseling and training to many technology companies. The company also provides training courses and certifications. (Wikipedia).

Video thumbnail

Hacking for Developers

Hacking is a key part of offensive security, which differs from defensive security in a couple of key ways. Defensive security is reactive. It involves preventing attacks, but also finding and responding to breaches when they occur. Offensive security is proactive and uses penetration test

From playlist Security

Video thumbnail

Intrusion Detection: Part 1

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Network Security, Part 1 : Basic Encryption Techniques

Fundamental concepts of network security are discussed. It provides a good overview of secret Key and public key Encryption. Important data encryption standards are presented.

From playlist Network Security

Video thumbnail

Computer Security Terminology

http://www.365computersecuritytraining.com This video is an excerpt from our online training in computer security. It Covers some of the basic terminology used in the information technology security profession. Some of the terms covered are: Vulnerability, Threats, Assets, Risk...and

From playlist awareness

Video thumbnail

Network Security: Classical Encryption Techniques

Fundamental concepts of encryption techniques are discussed. Symmetric Cipher Model Substitution Techniques Transposition Techniques Product Ciphers Steganography

From playlist Network Security

Video thumbnail

Application Security Tutorial | Application Security Basics | Cyber Security Tutorial | Simplilearn

In this application tutorial, we will cover application security basics in this cyber security tutorial. We will cover the basic definitions of application security, along with the different types and categories of application security. Next we cover the common application security vulnera

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

What Is Intrusion Detection System? | Intrusion Detection System (IDS) | Cyber Security |Simplilearn

🔥Advanced Executive Program In Cybersecurity: https://www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security?utm_campaign=WhatIsIntrusionDetectionSystem&utm_medium=Descriptionff&utm_source=youtube 🔥Caltech Cybersecurity Bootcamp(US Only): https://www.simplilearn.com/cybersecu

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

What do we mean by device security? Why should we care about this?

Keep your smart devices safe! Learn what device security is, and how it protects your phones, tablets, and computers from being accessed and exploited by cybercriminals.

From playlist Internet Safety

Video thumbnail

HITB SecConf 2009 Malaysia: The Bad Guys are Winning: So Now What? 3/7

Clip 3/7 Speaker: Ed Skoudis (Co-Founder, InGuardians) With the continual release of zero-day exploits, ever-larger-scale botnets, and rampant spyware, attackers have compromised tens of millions of machines connected to the Internet. With clever attackers mixing social engineering, ph

From playlist Hack In The Box Malaysia 2009

Video thumbnail

Top Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking Training|Simplilearn

🔥CEH v12 - Certified Ethical Hacking Course: https://www.simplilearn.com/cyber-security/ceh-certification?utm_campaign=TopEthicalHackingCertifications-tUeiV4LVRnU&utm_medium=DescriptionFirstFold&utm_source=youtube 🔥Caltech Cybersecurity Bootcamp (US Only): https://www.simplilearn.com/cybe

From playlist Ethical Hacking Playlist [2023 Updated] 🔥

Video thumbnail

The Statue That Started A Cyberwar

This is what a cyberwar looks like. The 2007 cyberattacks on Estonia became largely considered to be the first cyber warfare in Internet history. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1wXkgzWJfV

From playlist Decrypted Lies

Video thumbnail

CGSR Seminar Series | U.S. National Security Space Strategy: The Cold War to the Present

Talk Abstract At the present time, U.S. government officials are faced with the increasingly complex task of protecting critical national security space infrastructure in a rapidly evolving threat environment. When placed in a historical context, we find that anxiety about space security

From playlist Center for Global Security Research

Video thumbnail

Ardennes 1944 - The Forgotten First Battle

Go to https://curiositystream.thld.co/markfelton_1221 and use code MARKFELTON to save 25% off today, that’s only $14.99 a year. Thanks to Curiosity Stream for sponsoring today’s video. On 16 December 1944, the Germans launched the Ardennes Offensive. That same day, a battle ended to secur

From playlist Battle of the Bulge 1944-45

Video thumbnail

Immigration Law Symposium Panel 5

This Immigration Law Symposium was recorded at UC Irvine School of Law on February 17-18, 2011. Our labor markets rely heavily on unauthorized workers, yet the law affords these workers only modest workplace protections. Restrictionists condemn sanctuary cities while praising Arizona's S.

From playlist UC Irvine School of Law: 2012 Lectures & Seminar Series

Video thumbnail

How I Got Started In Cybersecurity

In this episode of the CyberTalk Podcast, I outline my journey to becoming a penetration tester and go over the key milestones in my career and how they eventually paved the way to becoming a cybersecurity professional. //PLATFORMS BLOG ►► https://bit.ly/3qjvSjK FORUM ►► https://bit.ly/

From playlist Cybertalk

Video thumbnail

HITB SecConf 2009 Malaysia: The Bad Guys are Winning: So Now What? 4/7

Clip 4/7 Speaker: Ed Skoudis (Co-Founder, InGuardians) With the continual release of zero-day exploits, ever-larger-scale botnets, and rampant spyware, attackers have compromised tens of millions of machines connected to the Internet. With clever attackers mixing social engineering, ph

From playlist Hack In The Box Malaysia 2009

Video thumbnail

Alex Stamos: How do we preserve free speech in the era of fake news?

Read the full story on the Stanford Engineering website: https://stanford.io/2ADHEho Social media platforms have democratized the spread of information, but questions about tech regulation pose potential challenges to basic human rights. It’s nothing we haven’t already heard – the news y

From playlist The Future of Everything

Video thumbnail

Aachen '44 - die Schlacht um Aachen während des 2. Weltkrieges - lange Fassung -

Eine Dokumentation über die Schlacht um Aachen während des 2. Weltkrieges. Während der Kämpfe lebten dort noch 20.000 von ursprünglich 160.000 Einwohnern (1939). Die Stadt wurde von 5.000 deutschen Soldaten unter der Führung von Oberst Gerhard Wilck verteidigt. Aachen musste während des 2.

From playlist Kriegsende

Related pages

Information security