K_Cyber Security Web Application Defender (CWAD)

1 – Information Gathering_01 Welcome to Information Gathering. 1 – Information Gathering_02 Scoping. 1 – Information Gathering_03 Fingerprinting. 1 – Information Gathering_04 Crawling with Burp Suite. 2 – Injection _01 SQL Injection. 2 – Injection _02 Error-based Injection. 2 – Injection _03 Union-based Injection. 2 – Injection _04 Blind-based Injection. 2 – Injection _05 SQLMap. […]

K_‪Cyber Security Source Code Defender (CSCD)

Security Code Review Overview_Lesson1. Security Code Review Overview_Lesson2. Security Code Review Overview_Lesson3. Threat Modeling_Lesson1. Threat Modeling_Lesson2. Threat Modeling_Lesson3. Threat Modeling_Lesson4. Buffer Overflow_Lesson1. Buffer Overflow_Lesson2. Buffer Overflow_Lesson3. Buffer Overflow_Lesson4. Buffer Overflow_Lesson5. Buffer Overflow_Lesson6. Buffer Overflow_Lesson7. Buffer Overflow_Lesson8. Buffer Overflow_Lesson9. Buffer Overflow_Lesson10. Buffer Overflow_Lesson11. Buffer Overflow_Lesson12. Buffer Overflow_Lesson13. Web-Based Vulnerabilities_Lesson1. Web-Based Vulnerabilities_Lesson2. Web-Based Vulnerabilities_Lesson3. Web-Based Vulnerabilities_Lesson4. Web-Based […]

K_Cyber Security Malicious Software Defender (CSMD)

1 – 01 Building Executables. 1 – 02 Executable Formats. 1 – 03 Windows Loader. 1 – 04 Lab. Executable Format. 1 – 05 Lab. Altering the Entry Point. 1 – 06 Lab. DLL Export Table. 1 – 07 Lab. TLS Callback. 2 – 01 Intro and PE Editors. 2 – 02 Lab. PE Editors. […]

K_Cyber Security Advanced Persistent Threat Defender (CAPTD)

1 – Understanding APTs _01 CAPTD_APT_Overview. 1 – Understanding APTs _02 CAPTD_APT_Lifecycle_Part1. 1 – Understanding APTs _03 CAPTD_APT_Lifecycle_Part2. 1 – Understanding APTs _04 CAPTD_APT1_Overview. 1 – Understanding APTs _05 CAPTD_Stuxnet_Overview. 1 – Understanding APTs _06 CAPTD_Cyberwar_World_1. 1 – Understanding APTs _07 CAPTD_Infection_Mechanism. 2 – Equation Group _01 CAPTD_Equation_Group_Components. 2 – Equation Group _02 CAPTD_Double_Fantasy_and_Equation_Drug. 2 […]

Z_CyberTraining365-CSAT-Certified Security Analyst Training

001 Security. 002 Need for Security Analysis Part One. 003 Need for Security Analysis Part Two. 004 Greatest Challenges. 005 Threat Agents. 006 Risk. 007 Information Security Awareness Part One. 008 Information Security Awareness Part Two. 009 Information Security Awareness Part Three. 010 FACTA & ISO. 011 US Legislation Part One. 012 US Legislation Part […]

‪K_CyberTraining365 Computer Hacker and Forensic Investigator (CHFI)

1 _01-Intro to Computer Forensics-Part 01. 1 _02-Intro to Computer Forensics-Part 02. 1 _03-Intro to Computer Forensics-Part 03. 1 _04-Intro to Computer Forensics-Part 04. 1 _05-Intro to Computer Forensics-Part 05. 1 _06-LAB-Intro to Computer Forensics. 2 _01-Computer Forensics Investigation Process-Part 01. 2 _02-LAB 1-Computer Forensics Investigation Process. 2 _03-LAB 2-Computer Forensics Investigation Process. 3 _01-Searching […]

K_Penetration Testing Essential Training

00_01 Introduction. 00_02 What_you_should_know. 00_03 Disclaimer. 01_01 What_is_pen_testing. 01_02 The_cyber_kill_chain. 02_01_XR15_An_nmap_refresher. 02_02_XR15_A_netcat_refresher. 02_03_XR15_Capturing_packets_with_tcpdump. 02_04_XR15_Working_with_netstat_and_arp. 02_05_XR15_Scripting_with_Powershell. 02_06_XR15_Extending_Powershell_with_Nishang_Take_2. 03_01_XR15_Refreshing_your_bash_skills. 03_02_XR15_Controlling_the_flow_in_a_script. 03_03_XR15_Using_functions_in_bash. 04_01_XR15_Refreshing_your_python_skills. 04_02_XR15_Using_the_system_functions. 04_03_XR15_Using_networking_functions. 04_04_XR15_Working_with_web_sites. 04_05_XR15_Driving_metasploit_through_python. 04_06_XR15_Accessing_SQLite_databases. 04_07_XR15_Using_scapy_to_work_with_packets. 05_01_XR15_A_Kali_framework_refresher. 05_02_XR15_Fuzzing_with_Spike. 05_03_XR15_Information_gathering_with_Sparta. 05_04_XR15_Adding_the_Trity_tool_to_Kali. 05_05_XR15_A_refresher_on_Metasploit. 05_06_XR15_Exploiting_with_Armitage. 05_07_XR15_Scanning_targets_with_openvas. 06_01 Approaching_web_testing. 06_02_XR15_Testing_Websites_with_BurpSuite. 06_03_XR15_Identifying_web_server_vulnerabilities_with_Nikto. 06_04_XR15_Fingerprinting_web_servers. 07_01 Exploiting_a_target. 07_02 Understanding_code_injection. 07_03_XR15_Understanding_buffer_overflows. 07_04 Finding_exploit_code. 08_01 What_s_next.

Ransomware_ Practical Reverse Engineering

00_01_ Introduction. 00_02 What_you_need_to_know. 00_03 Disclaimer. 01_01 Reverse_engineering_to_understand_malware. 01_02 Malware_and_family_ties. 01_03 Automated_analysis_of_malware_with_IRMA. 01_04 Automated_analysis_of_malware_with_VxStream. 01_05 Advancedsandboxingfirewalls. 02_01 Using_the_autoruns_tool. 02_02 Analysing_network_connections. 02_03 Looking_at_processes. 02_04 Examining_PE_files. 02_05 Hiding_code__a_case_study. 02_06 Disassembling_with_IDA. 02_07 Filepackingtechniques. 03_01 A_first_look_at_WannaCry. 03_02 Peeking_into_WannaCry. 04_01 Whats_Next.

K_Securing Android Apps

00_01_ Introduction. 00_02_ What_you_should_know. 00_03_ Disclaimer. 01_01_ Introducing_the_Android_OS. 01_02_ Securing_Android. 01_03_ Securing_Android_Apps. 01_04_ Understanding_hardware_security. 01_05_ Trusty_TEE. 01_06_ Samsung_Knox. 02_01_ Creating_Android_apps_using_PhoneGap. 02_02_ Taking_a_first_glimpse_at_Android_Studio. 02_03_ Rapid_Android_development_with_RAD_Studio. 03_01_ Recovering_the_Java_code. 03_02_ Getting_command_line_access. 03_03_ Using_Drozer_to_analyse_applications. 03_04_ Analysing_apps_on_an_Android_phone. 03_05_ Capturing_packets_on_your_mobile_phone. 04_01_ Extending_the_framework_for_mobile_security. 04_02_ Understanding_Android_vulnerabilities. 04_03_ Basic_Android_app_hygiene. 04_04_ Storing_data_in_the_app_sandbox. 04_05_ Using_cryptography. 04_06_ Securing_keys_and_credentials. 04_07_ Adding_tamper_detection. 04_08_ Using_JNI_to_defeat_Java_decompilation. 05_01_ Developing_Android_apps_for_work. 05_02_ Whats_new_in_Android_O. 06_01_ […]

K_Securing the IoT_ Designing and Testing_MalcolmShore

00_01_ Introduction. 00_02_ What_you_need_to_know. 00_03_ Course_Disclaimer. 01_01_ Looking_back_at_the_WeMo_security_issues. 01_02_ Dissecting_the_Dyn_Mirai_attack. 01_03_ Hacking_cars_and_drones. 01_04_ Testing_and_Breaking_ZWave_security. 01_05_ Safety_and_the_insecurity_of_robots. 02_01_ Introducing_IoT_security. 02_02_ Security_compliance_for_IoT. 02_03_ Securing_low_rate_wireless_personal_area_networks. 02_04_ LoRa_security. 02_05_ Building_security_into_IoT_devices. 02_06_ Moving_on_to_a_trusted_execution_environment. 03_01_ A_first_look_at_Marvin_Ta. 03_02_ Adding_sensors_to_Marvin. 03_03_ Adding_encryption_to_Marvin. 03_04_ Running_on_the_Internet_of_Things. 04_01_ Generating_Packets_with_Packeteer. 04_02_ Install_the_cURL_tool. 04_03_ Understanding_the_real_time_messaging_protocol. 05_01_ Testing_the_raw_WiFi_interface. 05_02_ Testing_home_IoT_switches_Orvibo. 05_03_ Understanding_the_home_network_automation_protocol. 05_04_ Testing_home_IoT_switches_WeMo. 05_05_ Testing_the_Netcat_surveillance_camera. 05_06_ Testing_the_Broadlink_Air_Quality_Monitor. 05_07_ […]