Skip main navigation

Physical Attacks: Specific USB Attacks

In this video, you will learn about USB devices that can be used in physical attacks against your network. Hackers can use different devices that mimic common USB devices to …

Social Engineering: Examples Continued

This video continues the focus on fear or greed as tools for hackers using social engineering. Hackers may try to use extortion to get you to respond to their messages. …

Social Engineering: Examples Continued

This video gives a detailed illustration of typical phishing attempts using social engineering that manipulate you through using fear to get you to respond. Fear is a powerful emotion, and …

Trace Labs OSINT

This video will explain the Trace Labs OSINT virtual machine. In the last video, you learned about Open-Source Intelligence (OSINT). In this video, you will learn how to use Trace …

What Is OSINT?

In this video, you will learn more about Open-Source Intelligence (OSINT). Open-Source Intelligence (OSINT) is a diverse tool that can be used by anyone, from hackers with malicious intent, to …

In-house or Contracted

In this video, you will go through the considerations a user needs to take into account when deciding to set up a Red Team and/or a Blue Team for their …

What Is a Blue Team?

There is a counterpart to the Red Ream called the Blue Team. The Blue Team’s role is to protect the network from the Red Team’s simulated attacks. In the last …

What Is a Red Team?

Red Teams are teams of ethical hackers who test a network’s security. An organization can have an in-house team or contract a team to test their network’s security. This team …

Social Engineering: Examples

This video gives a detailed illustration of typical phishing attempts using social engineering and playing on greed by posing as Microsoft or Amazon representatives. Many of us will have received …

Running Your Own Phishing Campaign

This video gives practical explanations on how to run a phishing campaign to test your network security. Once you had been through the necessary considerations we discussed in the previous …

Scanning Tools and Methodology

In this video, you will learn about the use of scanning tools to protect your network from attacks. We will start by looking at the use of Nmap/Zenmap, and in …

What Can We Learn from Malicious Hackers?

In this video, you will learn more about the importance of understanding a hacker’s methodology to develop methods to protect your network. We will again base this on the five …

A Malicious Hacker’s Methodology

In this video, you will learn more details around a hacker’s methodology and approaches to breaching your network. You were previously given an overview of how hackers typically try to …