K_Cyber Security Web Application Defender (CWAD)

1 – Information Gathering_01 Welcome to Information Gathering. 1 – Information Gathering_02 Scoping. 1 – Information Gathering_03 Fingerprinting. 1 – Information Gathering_04 Crawling with Burp Suite. 2 – Injection _01 SQL Injection. 2 – Injection _02 Error-based Injection. 2 – Injection _03 Union-based Injection. 2 – Injection _04 Blind-based Injection. 2 – Injection _05 SQLMap. […]

K_‪Cyber Security Source Code Defender (CSCD)

Security Code Review Overview_Lesson1. Security Code Review Overview_Lesson2. Security Code Review Overview_Lesson3. Threat Modeling_Lesson1. Threat Modeling_Lesson2. Threat Modeling_Lesson3. Threat Modeling_Lesson4. Buffer Overflow_Lesson1. Buffer Overflow_Lesson2. Buffer Overflow_Lesson3. Buffer Overflow_Lesson4. Buffer Overflow_Lesson5. Buffer Overflow_Lesson6. Buffer Overflow_Lesson7. Buffer Overflow_Lesson8. Buffer Overflow_Lesson9. Buffer Overflow_Lesson10. Buffer Overflow_Lesson11. Buffer Overflow_Lesson12. Buffer Overflow_Lesson13. Web-Based Vulnerabilities_Lesson1. Web-Based Vulnerabilities_Lesson2. Web-Based Vulnerabilities_Lesson3. Web-Based Vulnerabilities_Lesson4. Web-Based […]

K_Cyber Security Malicious Software Defender (CSMD)

1 – 01 Building Executables. 1 – 02 Executable Formats. 1 – 03 Windows Loader. 1 – 04 Lab. Executable Format. 1 – 05 Lab. Altering the Entry Point. 1 – 06 Lab. DLL Export Table. 1 – 07 Lab. TLS Callback. 2 – 01 Intro and PE Editors. 2 – 02 Lab. PE Editors. […]

K_Cyber Security Advanced Persistent Threat Defender (CAPTD)

1 – Understanding APTs _01 CAPTD_APT_Overview. 1 – Understanding APTs _02 CAPTD_APT_Lifecycle_Part1. 1 – Understanding APTs _03 CAPTD_APT_Lifecycle_Part2. 1 – Understanding APTs _04 CAPTD_APT1_Overview. 1 – Understanding APTs _05 CAPTD_Stuxnet_Overview. 1 – Understanding APTs _06 CAPTD_Cyberwar_World_1. 1 – Understanding APTs _07 CAPTD_Infection_Mechanism. 2 – Equation Group _01 CAPTD_Equation_Group_Components. 2 – Equation Group _02 CAPTD_Double_Fantasy_and_Equation_Drug. 2 […]

Z_CyberTraining365-CSAT-Certified Security Analyst Training

001 Security. 002 Need for Security Analysis Part One. 003 Need for Security Analysis Part Two. 004 Greatest Challenges. 005 Threat Agents. 006 Risk. 007 Information Security Awareness Part One. 008 Information Security Awareness Part Two. 009 Information Security Awareness Part Three. 010 FACTA & ISO. 011 US Legislation Part One. 012 US Legislation Part […]

‪K_CyberTraining365 Computer Hacker and Forensic Investigator (CHFI)

1 _01-Intro to Computer Forensics-Part 01. 1 _02-Intro to Computer Forensics-Part 02. 1 _03-Intro to Computer Forensics-Part 03. 1 _04-Intro to Computer Forensics-Part 04. 1 _05-Intro to Computer Forensics-Part 05. 1 _06-LAB-Intro to Computer Forensics. 2 _01-Computer Forensics Investigation Process-Part 01. 2 _02-LAB 1-Computer Forensics Investigation Process. 2 _03-LAB 2-Computer Forensics Investigation Process. 3 _01-Searching […]