Training material that covers the basics of cyber security
Learn about cyber security from a red-team perspective
These videos examines how hackers think and break boundaries.
Source: Tim Summers PhD via
TEDx Talks
This video takes a look at hacker culture and its history
Source:
Nelson Zhang via
TEDx Talks
These videos discusses the different types of hackers and how they
impact society.
Source:
Boston 25 News
This video discusses the different types of hackers (hats) and
what they do.
Source: Techquickie
These videos overview social engineering, provide examples of
social engineering attacks, and give techniques for prevention.
Source: MalwareFox
This video takes a look at how social engineering is used to acess
personal information and methods of prevention
Source: CBC News
These videos explore the basic concepts involved in a DoS attack,
the types of DoS attacks, and how to cover DoS tracks.
Source:
PowerCert Animated Videos
These videos explore the basic concepts involved in a DoS attack,
the types of DoS attacks, and how to cover DoS tracks.
Source:
Tom Scott via
Computerphile
These videos explore the basic concepts involved in a DoS attack,
the types of DoS attacks, and how to cover DoS tracks.
Source:
IBM Technology
A rootkit is hard-to-detect software that is put onto a machine in
order to gain administrative (root) privileges that are used to
prevent the detection of other malicious software and processes.
Source:
WatchGuard Technologies
A rootkit is hard-to-detect software that is put onto a machine in
order to gain administrative (root) privileges that are used to
prevent the detection of other malicious software and processes.
Source:
WatchGuard Technologies
Static code analysis tools help developers to find bugs in their
code. FindBugs is an open source static code analysis for Java.
Source:
NetBeansVideos
These videos discuss how to exploit binary files in depth.
Source:
LiveOverflow
These videos discuss how to exploit binary files in depth along
with the tools used.
Source: CryptoCat
This video discusses binary exploitation in a walkthough to learn
the basics and how it is performed.
Source:
PinkDraconian
This video shows looks at a binary overflow and how to perform it
with pwn.
Source:
John Hammond
This video explains how to setup your computer to do the various
types of web exploitation explained in the follow-on videos. They
allow you to practice on your local machine, not on a public
website, which would probably be illegal.
Source:
NetworkChuck
This video looks as the basics of cross site scripting (XSS), a
couple types of XSS attacks, and how to defend against it.
Source: PwnFunction
This talks about the basic of Structured Query Language (SQL) and
three types of SQL injection.
Source: Tom Scott via
Computerphile
This video gives an example of a Structured Query Language (SQL)
injection attack.
Source:
Computerphile
Cross Site Request Forgery (CSRF) is a web-based attack that
forces a user to unintentionally send an HTTP request to a URL in
order to perform some action. The user typically executes
undesirable actions in a web application in which they are already
authenticated.
Source: Tom Scott via
Computerphile
Cross Site Request Forgery (CSRF) is a web-based attack that
forces a user to unintentionally send an HTTP request to a URL in
order to perform some action. The user typically executes
undesirable actions in a web application in which they are already
authenticated.
Source:
Sam Bowne
Any exploit that maliciously uses cookies is a cookie exploit. One
type of cookie exploit is cookie stealing, where a malicious user
steals someone else’s cookie.
Source:
Computerphile
This video takes a look at an example of cookie stealing and how
it can be combated and used.
Source:
HackerSploit
Cross Site Request Forgery (CSRF) is a web-based attack that forces a user to unintentionally send an HTTP request to a URL in order to perform some action. The user typically executes undesirable actions in a web application in which they are already authenticated. Read More.