FREE Short Course | Network Packet Capturing with Tshark
In this short course, we covered the command line version of Wireshark, that is, Tshark. We discussed…
In this short course, we covered the command line version of Wireshark, that is, Tshark. We discussed…
We covered an introduction to Malware analysis by covering various asepcts such as the definition of a…
We covered the solution walkthrough for TryHackMe Attacking Kerberos room where we focused on Kerberos attacks such…
We covered a cyber threat intelligence case study that involved a finance company named SwifSpend financ that…
We covered an overview of malware analysis, starting with basic static analysis and moving through to advanced…
In this short mini Assembly programming language course, we first go over the CPU architecture explaining different…
We covered a corporate espionage scenario where two two previous employees used their non-deactivated accounts to login…
We covered analysing malicious macro’s, PDF’s and Memory forensics of a victim of Jigsaw Ransomware; all done…
We covered the role of Junior security operations center analyst, the responsibilities and the required skills and…
In this video, we covered the incident response lifecycle with all its stages covered and explained. Incident…
We covered a newly-released challenge, named Summit, into the SOC level 1 track in TryHackMe. The challenge…
We covered the second phase of incident response, that is, identification & scoping or detection phase. In…
We covered the basic steps of a penetration testing procedure using a beginner friendly CTF challenge froom…
We covered an introduction to incident response in cyber security including the phases starting with prepraration, identification…
We covered practical purple teaming by conducting threat emulation using Atomic red team and examining the impact…
We covered an introduction to NoSQL, the difference between NoSQL & SQL and NoSQL operators. We discussed…
We covered threat emulation using Caldera which is a popular tool that can be used to emulate…
We covered how to harden and secure Windows workstations from both the identity management and network side.This…
We solved a cryptography CTF challenge where XOR encryption and HEX encoding were used to encrypt and…
We covered conducting security testing and assessment using Atomic Red Team framework. Atomic Red Team is a…