Discover Cybersecurity Talents Without Certifications."I believe that HR or hiring managers should not solely rely on certifications during the hiring process, but rather consider the…Feb 11Feb 11
Volatility Commands for Basic Malware Analysis: Descriptions and ExamplesCommand and DescriptionDec 22, 2023Dec 22, 2023
Corporate Cybercrime Policies, Procedures and InvestigationsOverview of CybercrimeOct 2, 2022Oct 2, 2022
How to Analyse a Windows 10 Workstation for Digital ForensicsIn this episode I will show you how to perform a Digital Forensics Analysis of a compromised Windows 10 Workstation.Sep 21, 2022Sep 21, 2022
Ethical Hacking | Exploiting Apache Tomcat Port 8180In this episode, we will exploit the apache tomcat version 5.5 service running on port 8180 to get a meterpreter session of the server…Sep 21, 2022Sep 21, 2022
Ethical Hacking | Exploiting FTPThis course is for individuals interested in learning ethical hacking or penetration testing skills. It also serves as an exam preparation…Aug 28, 2022Aug 28, 2022
Ethical Hacking | Network ScanThis course is for individuals interested in learning ethical hacking or penetration testing skills. It also serves as an exam preparation…Aug 28, 2022Aug 28, 2022
Incident Response using IBM QRadar — WalkthroughIn this episode, we will respond to an incident using IBM QRadar SIEM by investigating a compromised network. Let demonstrates how soc…Aug 28, 2022Aug 28, 2022