Cyber Defense

Learn about hacker culture, social engineering, and the different types of attacks and exploitations there are

Learn about cyber security from a blue team perspective.

Self Defense

What is Malware?

This video is a broad overview of malware and other threats.

How Might I Get Infected?

This video explores some of the ways that a personal computer can get infected by a virus.

How Do I Prevent Infection?

This video examines some ways prevent a personal computer from getting infected by a virus.

How Do I Identify an Infection?

This video walks through a process for examining an infection.

How Do I Remove an Infection?

This video shows how to remove a virus from a personal computer.

Physical Security

Physical Security

These videos discuss the relationship between cyber security and physical security.

Physical Security

These videos discuss the relationship between cyber security and physical security.

Physical Security

These videos discuss the relationship between cyber security and physical security.

System Security and Access Controls

System Level Security

These videos look at how operating systems implement security, how they can be secured, and how they can be scanned for vulnerabilities.

System Level Security

These videos look at how operating systems implement security, how they can be secured, and how they can be scanned for vulnerabilities.

System Level Security

These videos look at how operating systems implement security, how they can be secured, and how they can be scanned for vulnerabilities.

Stolen Identity Case Study: How Apple and Amazon Security Flaws Led to My Epic Hacking

Here is a link to an article on how security flaws and a little bit of social networking research were utilized by a hacker to gain access and control over Mat Honan's entire digital life.

User Authenticaion using Passwords and Biometrics

Passwords

These videos look at authentication via passwords, including how they are stored and how they can be cracked.

Passwords

These videos look at authentication via passwords, including how they are stored and how they can be cracked.

Biometrics

These videos teach the basic of biometrics and their application to security.

Biometrics

These videos teach the basic of biometrics and their application to security.

Denial of Service

Denial of Service (DoS) Defense

These videos provide information on DoS defense approaches, including preventing spoofing and flood attacks.

Denial of Service (DoS) Defense

These videos provide information on DoS defense approaches, including preventing spoofing and flood attacks.

Forensics

Computer Forensics

This video presents a basic overview of computer forensics.

Computer Forensics Lab

This lab walks through an online challenge that involves computer forensics.

Data Recovery and File Carving

This video images a drive and recovers files using various tools.

Network Forensics

This video shows how to scan a network using various network tools.