All Episodes
CyberCode Academy — 226 episodes
Course 32 - Checkpoint CCSA R80 | Episode 3: From System Safeguards to Advanced Security Orchestration
Course 32 - Checkpoint CCSA R80 | Episode 2: SmartConsole Deployment, Gateway Integration, and Connectivity Management
Course 32 - Checkpoint CCSA R80 | Episode 1: Initial Deployment of Security Managers and Gateways
Course 31 - Dive Into Docker | Episode 11: Framework Starters and Design Best Practices
Course 31 - Dive Into Docker | Episode 10: Management, Versions, and Complex Microservices
Course 31 - Dive Into Docker | Episode 9: Orchestrating Multi-Container Web Applications with Docker Compose
Course 31 - Dive Into Docker | Episode 8: Networking, Persistence, and System Optimization
Course 31 - Dive Into Docker | Episode 7: Building, Running, and Syncing Flask Applications
Course 31 - Dive Into Docker | Episode 6: A Hands-On Guide to Dockerizing Web Applications
Course 31 - Dive Into Docker | Episode 5: From First Run to Building Images
Course 31 - Dive Into Docker | Episode 4: Editions, Versioning, and Installation Guide
Course 31 - Dive Into Docker | Episode 3: From Virtual Machines to Core Architecture
Course 31 - Dive Into Docker | Episode 2: Setup, Resources, and the Troubleshooting Mindset
Course 31 - Dive Into Docker | Episode 1: Efficiency, Portability, and Your Path to Modern Development
Course 30 - Practical Malware Development - Beginner Level | Episode 6: Developing a Command and Control (C2) System with PHP and MySQL
Course 30 - Practical Malware Development - Beginner Level | Episode 5: Building and Securing the Control Panel Dashboard
Course 30 - Practical Malware Development - Beginner Level | Episode 4: Building a Secure Web Control Panel: Database Infrastructure
Course 30 - Practical Malware Development - Beginner Level | Episode 3: Enhancing Agent Resilience and Establishing Remote Server
Course 30 - Practical Malware Development - Beginner Level | Episode 2: Mastering C# System Control: Navigating, Enumerating, and Executing
Course 30 - Practical Malware Development - Beginner Level | Episode 1: C# Offensive Operations: Recon, Persistence, and File Acquisition
Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 14: Securing Data and Applications in Microsoft Azure
Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 13: Storage, SQL Databases, and HDInsight
Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 12: Mastering Data Protection and SQL Security
Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 11: Security, Encryption, and Compliance
Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 10: Azure Security Monitoring and Threat Response
Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 9: Mastering Azure Security Operations
Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 8: Governance and Container Security
Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 7: A Comprehensive Guide to Virtual Machine and Container Security
Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 6: Azure Network Security
Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 5: Azure Network Infrastructure and Security
Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 4: Protecting Azure Virtual Networks
Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 3: Mastering Azure Identity and Access Management
Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 2: Managing Security and Hybrid Identity Integration
Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 1: Essential Identity Management and Security Protection
Course 28 - Denial of Service and Elevation of Privilege | Episode 6: Multi-Layered Defenses Against Elevation of Privilege
Course 28 - Denial of Service and Elevation of Privilege | Episode 5: Input Manipulation and the Path to Elevation of Privilege
Course 28 - Denial of Service and Elevation of Privilege | Episode 4: Designing for System Resilience and Capacity Defense
Course 28 - Denial of Service and Elevation of Privilege | Episode 3: From Mobile Networks to the Cloud
Course 28 - Denial of Service and Elevation of Privilege | Episode 2: Persistence, Cleverness, and Amplification
Course 28 - Denial of Service and Elevation of Privilege | Episode 1: The Evolution of Denial of Service Attacks
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 19: Mastering Burp Suite
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 18: Essential Firefox Extensions for Browser Customization
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 17: Common Network and Web Application Vulnerabilities
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 16: Web Technology Foundations: Protocols, Structure, and Scripting
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 15: Mastering Metasploitable 2: A Comprehensive Pentesting Guide
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 14: Web Essentials: Files, Extensions, and Enumeration
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 13: Essential Web Application Penetration Testing and Scanning Tool
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 12: Introduction to Banner Grabbing and Service Fingerprinting
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 11: OSINT, Reconnaissance, and Scanning: Foundations and Tools
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 10: OWASP Fundamentals: Top 10 Vulnerabilities and Web Security
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 9: Tools and Techniques for Concealing Information
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 8: Cryptography Fundamentals: Encoding and Ciphers
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 7: Tradecraft: The Methods and Tools of Modern Espionage
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 6: Penetration Testing Lifecycle: From Scoping to Reporting
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 5: Penetration Testing Terminology and Core Security Concepts
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 4: Penetration Testing and Hacker Profiles
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 3: Metasploit Database Setup and Initialization
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 2: Linux Fundamentals and Command Injection Basics
Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 1: Kali Linux Essentials
Course 26 - Assessing and Mitigating Security Risks | Episode 5: Essential Tools for Incident Response
Course 26 - Assessing and Mitigating Security Risks | Episode 4: A Guide to Mitigation and Security Controls
Course 26 - Assessing and Mitigating Security Risks | Episode 3: Foundations of Successful Incident Identification and Response Management
Course 26 - Assessing and Mitigating Security Risks | Episode 2: The Fundamentals of Organizational Risk Management
Course 26 - Assessing and Mitigating Security Risks | Episode 1: Threats, Mindsets, and Vulnerabilities
Course 25 - API Python Hacking | Episode 7: Building Windows Executables from Python Scripts with PyInstaller
Course 25 - API Python Hacking | Episode 6: Privilege Modification and User Impersonation
Course 25 - API Python Hacking | Episode 5: Managing and Verifying Process Privileges
Course 25 - API Python Hacking | Episode 4: Structures, Process Spawning, and Undocumented Calls
Course 25 - API Python Hacking | Episode 3: From ctypes Basics to Building a Process Killer
Course 25 - API Python Hacking | Episode 2: Foundations of Windows Internals and API Mechanisms
Course 25 - API Python Hacking | Episode 1: GitHub Portfolio Building and Environment Setup
Course 24 - Machine Learning for Red Team Hackers | Episode 6: Security Vulnerabilities in Machine Learning
Course 24 - Machine Learning for Red Team Hackers | Episode 5: The Complete Guide to Deepfake Creation
Course 24 - Machine Learning for Red Team Hackers | Episode 4: Mastering White-Box and Black-Box Attacks
Course 24 - Machine Learning for Red Team Hackers | Episode 3: Evading Machine Learning Malware Classifiers
Course 24 - Machine Learning for Red Team Hackers | Episode 2: Building and Implementing Evolutionary Testing Tools
Course 24 - Machine Learning for Red Team Hackers | Episode 1: Building an Automated CAPTCHA-Breaking Bot
Course 23 - WiFi Hacking with Raspberry Pi | Episode 7: Building a Digital Ghost on Raspberry Pi
Course 23 - WiFi Hacking with Raspberry Pi | Episode 6: Fix These 5 Router Security Loopholes
Course 23 - WiFi Hacking with Raspberry Pi | Episode 5: Cracking Wi-Fi Passwords With Raspberry Pi
Course 23 - WiFi Hacking with Raspberry Pi | Episode 4: WiFi Jamming Techniques Using Raspberry
Course 23 - WiFi Hacking with Raspberry Pi | Episode 3: Build a Portable Raspberry Pi Cyberdeck
Course 23 - WiFi Hacking with Raspberry Pi | Episode 2: Building The Perfect Raspberry Pi Hacking Kit
Course 23 - WiFi Hacking with Raspberry Pi | Episode 1: Raspberry Pi Desktop And Hacking Machine
Course 22 - Digital Forensics: RAM Extraction Fundamentals | Episode 5: Forensic Access and RAM Extraction with Inception
Course 22 - Digital Forensics: RAM Extraction Fundamentals | Episode 4: RAM Capture via Magnet and FTK Imager
Course 22 - Digital Forensics: RAM Extraction Fundamentals | Episode 3: Comparing Belkasoft and Magnet Tools
Course 22 - Digital Forensics: RAM Extraction Fundamentals | Episode 2: Benchmarking Tools and Using MoonSols DumpIt
Course 22 - Digital Forensics: RAM Extraction Fundamentals | Episode 1: Value, Strategy, and Technical Preparation
Course 21 - Digital Forensics: Windows Shellbags | Episode 5: Shellbags Forensics: Validating Network Drive Activity
Course 21 - Digital Forensics: Windows Shellbags | Episode 4: Shellbag Forensics: Tracking USB Device History and Artifact Validation
Course 21 - Digital Forensics: Windows Shellbags | Episode 3: ShellBag Forensics: Practical Validation and Timestamp Analysis
Course 21 - Digital Forensics: Windows Shellbags | Episode 2: Forensic System Setup and Local Drive Integration
Course 21 - Digital Forensics: Windows Shellbags | Episode 1: Windows Shellbags: Forensic Fundamentals and Deep Dive Analysis
Course 20 - Malware Analysis: Identifying and Defeating Code Obfuscation | Episode 5: Identifying and Analyzing Cryptography in Malware
Course 20 - Malware Analysis: Identifying and Defeating Code Obfuscation | Episode 4: Dynamic API Resolution: Walking the PEB and Parsing
Course 20 - Malware Analysis: Identifying and Defeating Code Obfuscation | Episode 3: Analyzing and Defeating String Obfuscation in Native
Course 20 - Malware Analysis: Identifying and Defeating Code Obfuscation | Episode 2: Analyzing and Defeating Obfuscation in VBA
Course 20 - Malware Analysis: Identifying and Defeating Code Obfuscation | Episode 1: Defeating Malware Obfuscation: Fundamentals, Impact
Course 19 - Ultimate Rust Crash Course | Episode 5: Rust Concurrency Fundamentals: Closures, Threads, and Channel Communication
Course 19 - Ultimate Rust Crash Course | Episode 4: Rust Foundations: Structs, Traits, Collections
Course 19 - Ultimate Rust Crash Course | Episode 3: Rust Fundamentals: Mastering Ownership, References, and Borrowing
Course 19 - Ultimate Rust Crash Course | Episode 2: Rust Core Foundations: Data Types, Control Flow, and String Handling
Course 19 - Ultimate Rust Crash Course | Episode 1: Rust Programming Foundations: From Cargo Tooling to Core Syntax and Modules
Course 18 - Evading IDS Firewalls and Honeypots | Episode 6: Mastering Malware Evasion: Stealth, Obfuscation, and Anti-Analysis
Course 18 - Evading IDS Firewalls and Honeypots | Episode 5: Intrusion Detection and Prevention: Strategies, Tools, and Intelligence
Course 18 - Evading IDS Firewalls and Honeypots | Episode 4: Advanced Application Security: WAFs, API Gateways, and Honeypot Traps
Course 18 - Evading IDS Firewalls and Honeypots | Episode 3: Network Emulation and Security Defense: Deploying Cisco ASA and Kali Linux
Course 18 - Evading IDS Firewalls and Honeypots | Episode 2: Configuring a Cisco PIX Firewall to Establish a Secure Enclave
Course 18 - Evading IDS Firewalls and Honeypots | Episode 1: Firewall Management and Security Testing: From Windows and Linux Configurations
Course 17 - Computer Network Security Protocols And Techniques | Episode 9: Foundations of VPN Security: The IPsec Protocol Suite
Course 17 - Computer Network Security Protocols And Techniques | Episode 8: TLS/SSL Foundations: From Conceptual "Toy" Models to Actual
Course 17 - Computer Network Security Protocols And Techniques | Episode 7: Understanding Pretty Good Privacy (PGP) for Secure Email
Course 17 - Computer Network Security Protocols And Techniques | Episode 6: The Evolution of End Point Authentication: Securing Identities
Course 17 - Computer Network Security Protocols And Techniques | Episode 5: Digital Trust and Integrity: Hash Functions and Certification
Course 17 - Computer Network Security Protocols And Techniques | Episode 4: Asymmetric Cryptography: RSA, Diffie-Hellman
Course 17 - Computer Network Security Protocols And Techniques | Episode 3: Modern Ciphers: Structure, Standards (DES/AES)
Course 17 - Computer Network Security Protocols And Techniques | Episode 2: Traditional Ciphers: Substitution and Transposition Methods
Course 17 - Computer Network Security Protocols And Techniques | Episode 1: Computer Network Security: Foundations, Core Aspects
Course 16 - Red Team Ethical Hacking Beginner Course | Episode 7: The Art of Evasion: Detecting and Bypassing Security with Sysmon
Course 16 - Red Team Ethical Hacking Beginner Course | Episode 6: Windows Persistence Strategies: Registry, Scheduled Tasks, Services, WMI
Course 16 - Red Team Ethical Hacking Beginner Course | Episode 5: Windows Lateral Movement: Manual Execution via WMIC, Scheduled Tasks
Course 16 - Red Team Ethical Hacking Beginner Course | Episode 4: Windows Post-Exploitation: Remote File Management and System Control
Course 16 - Red Team Ethical Hacking Beginner Course | Episode 3: Essential Windows Domain and Host Enumeration
Course 16 - Red Team Ethical Hacking Beginner Course | Episode 2: Essential Command Line Administration: Linux, Windows, Account Management
Course 16 - Red Team Ethical Hacking Beginner Course | Episode 1: Introduction to Red Teaming: Concepts, Tools, and Tactics
Course 15 - Write an Android Trojan from scratch | Episode 4: Implementing an Android Reverse Shell using Java Native APIs (without Netcat)
Course 15 - Write an Android Trojan from scratch | Episode 3: Building a Reverse Connection Trojan: Programmatic Netcat Execution
Course 15 - Write an Android Trojan from scratch | Episode 2: Building the Trojan "Party App": UI Design and Netcat Preparation
Course 15 - Write an Android Trojan from scratch | Episode 1: Android Trojan Horse Basics, Reverse Shells, and Development Environment Setup
Course 14 - Wi-Fi Pentesting | Episode 11: Securing Wireless Networks: Countermeasures and Configuration
Course 14 - Wi-Fi Pentesting | Episode 10: WPA Enterprise: Authentication, Evil Twins, and Credential Cracking
Course 14 - Wi-Fi Pentesting | Episode 9: WPA/WPA2 Cracking Efficiency: Optimizing Storage, Resumption, and Speed
Course 14 - Wi-Fi Pentesting | Episode 8: WPA/WPA2 Hacking: Handshake Capture, Wordlist Attack, and Progress Management
Course 14 - Wi-Fi Pentesting | Episode 7: WPA/WPA2 Cracking via WPS: Reaver Exploitation, Error Bypassing, and WPS Unlocking
Course 14 - Wi-Fi Pentesting | Episode 6: WPA/WPA2 Cracking Introduction: Exploiting the WPS Vulnerability
Course 14 - Wi-Fi Pentesting | Episode 5: WEP Cracking: Packet Injection and Replay Attacks (ARP, Chopchop, Fragmentation, and SKA)
Course 14 - Wi-Fi Pentesting | Episode 4: Cracking WEP Encryption: Gaining Network Access
Course 14 - Wi-Fi Pentesting | Episode 3: Targeted Wireless Network Discovery and Pre-Connection Bypasses
Course 14 - Wi-Fi Pentesting | Episode 2: Network Fundamentals, Wireless Adapter Setup, and Packet Sniffing Basics
Course 14 - Wi-Fi Pentesting | Episode 1: Setting Up the Virtual Hacking Lab: VirtualBox and Kali Linux
Course 13 - Network Forensics | Episode 8: Email Analysis and Forensic Investigation
Course 13 - Network Forensics | Episode 7: Web Traffic Analysis and Browser Forensics: Handshakes, DNSSEC, and Cookies
Course 13 - Network Forensics | Episode 6: Wireless Network Analysis, Standards, and Security Forensics
Course 13 - Network Forensics | Episode 5: TCP/IP Layers, Data Flow, and Network Tools
Course 13 - Network Forensics | Episode 4: Log Analysis, SIM Correlation, and Network Attack Signature Detection
Course 13 - Network Forensics | Episode 3: Network Forensics, Security Tools, and Defensive Architecture
Course 13 - Network Forensics | Episode 2: Architecture, Protocols (TCP/UDP), and Evidentiary Value
Course 13 - Network Forensics | Episode 1: Fundamentals, Attack Vectors, and Digital Tracing
Course 12 - Maltego Advanced Course | Episode 4: Custom Entity Design and Implementation in Maltego
Course 12 - Maltego Advanced Course | Episode 3: The Maltego Transform Hub: Finding, Installing, and Utilizing Data Integrations
Course 12 - Maltego Advanced Course | Episode 2: Maltego Infrastructure Entities, Transforms, and Footprinting Techniques
Course 12 - Maltego Advanced Course | Episode 1: Maltiggo Transforms, Sets, and Essential Menu Actions
Course 11 - Mobile Forensics Fundamentals | Episode 3: iOS and iPhone Forensics: Security, Acquisition Techniques, and Artifact Analysis
Course 11 - Mobile Forensics Fundamentals | Episode 2: Data Acquisition, Diverse Operating Systems, and Forensic Challenges
Course 11 - Mobile Forensics Fundamentals | Episode 1: Legal Authority, Acquisition Procedures, and Examiner Responsibilities
Course 10 - Network Security Fundamentals | Episode 7: Implementing Defense in Depth, Data Integrity, and Zero Trust
Course 10 - Network Security Fundamentals | Episode 6: Attack Mitigation, Vulnerability Assessment, and Penetration Testing
Course 10 - Network Security Fundamentals | Episode 5: Protecting and Hardening Network Endpoints: Concepts, Strategies, and Management
Course 10 - Network Security Fundamentals | Episode 4: VPNs, Tunneling, and Secure Remote Access Technologies
Course 10 - Network Security Fundamentals | Episode 3: Firewalls and Intrusion Detection/Prevention Systems (IDS/IPS)
Course 10 - Network Security Fundamentals | Episode 2: Securing Wireless and Mobile Networks: Standards, Threats, and Best Practices
Course 10 - Network Security Fundamentals | Episode 1: Models, Security, Protocols, and IP Addressing
Course 9 - Internet of Things Security | Episode 3: IOT Security: Challenges, Vulnerabilities, and Real-World Cyber-Physical Attacks
Course 9 - Internet of Things Security | Episode 2: UK Legislation, Data Privacy (GDPR), and Liability for Drones and Autonomous Vehicles
Course 9 - Internet of Things Security | Episode 1: Introduction to the IOT: Components, Architectures, Use Cases, and Security
Course 8 - Penetration Testing OSINT Gathering with Recon-ng | Episode 4: Recon-ng Results: Comprehensive Reporting Formats and Strategic
Course 8 - Penetration Testing OSINT Gathering with Recon-ng | Episode 3: Harvesting Data, Optimizing Contacts, Geolocation
Course 8 - Penetration Testing OSINT Gathering with Recon-ng | Episode 2: Modules, Data Flow, Naming Structure, API Keys
Course 8 - Penetration Testing OSINT Gathering with Recon-ng | Episode 1: Recon-ng Installation, Shell Exploration and Data Management
Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 8: Phase 8: Collaboration, Maturity Models, and Strategic Planning
Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 7: Incident Management, Operational Defense, and Continuous Security
Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 6: Secure Validation: A Comprehensive Look at Security Testing Methodolog
Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 5: Hardening, DevSecOps Integration, Container Security and WAF
Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 4: Integrating Secure Coding, Code Review, and Application Security Testi
Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 3: Defining, Implementing 20 Controls, and Mitigating OWASP Top 10 in SDL
Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 2: Malware, Social Engineering, GRC, and Secure Development Practices
Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 1: Approaches, Eight Phases, and Risk Management
Course 6 - Network Traffic Analysis for Incident Response | Episode 7: Network Data Analysis Toolkit: Tools, Techniques and Threat Signature
Course 6 - Network Traffic Analysis for Incident Response | Episode 6: Investigating RATs, Worms, Fileless, and Multi-Stage Malware Variants
Course 6 - Network Traffic Analysis for Incident Response | Episode 5: Scanning, Covert Data Exfiltration, DDoS Attacks and IoT Exploitation
Course 6 - Network Traffic Analysis for Incident Response | Episode 4: Mapping, Decoding, and Decrypting Network Traffic Intelligence
Course 6 - Network Traffic Analysis for Incident Response | Episode 3: Wireshark Alternatives: Network Miner, Terminal Shark, and CloudShark
Course 6 - Network Traffic Analysis for Incident Response | Episode 2: Wireshark Features and Comprehensive Protocol Dissection
Course 6 - Network Traffic Analysis for Incident Response | Episode 1: Fundamentals of Networking: The OSI Model and Essential Protocols
Course 5 - Full Mobile Hacking | Episode 8: Technical Check for Mobile Indicators of Compromise using ADB and Command Line
Course 5 - Full Mobile Hacking | Episode 7: Remote Windows Management and Android Geolocation Security Tutorials
Course 5 - Full Mobile Hacking | Episode 6: Ghost Framework: Exploiting Android Devices via Debug Bridge (ADB) and Shodan Reconnaissance
Course 5 - Full Mobile Hacking | Episode 5: Exploiting Insecure Storage and Access Controls via Reverse Engineering and ADB
Course 5 - Full Mobile Hacking | Episode 4: Comprehensive Android Debugging and Control: ADB, SCRCPY, and Security Manipulation
Course 5 - Full Mobile Hacking | Episode 3: Android Hacking and Remote Management: Payloads, App Hiding, Geolocation, and Data Extraction
Course 5 - Full Mobile Hacking | Episode 2: Setting Up the iPhone Simulator on Mac OS using Xcode for Mobile Penetration Testing
Course 5 - Full Mobile Hacking | Episode 1: Android Studio: Running AVDs and Installing Apps on Windows
Course 4 - Learning Linux Shell Scripting | Episode 9: Process Management, Scheduling, User Control, and Scripting Utilities
Course 4 - Learning Linux Shell Scripting | Episode 8: System Monitoring, Performance Measurement, and Log Management
Course 4 - Learning Linux Shell Scripting | Episode 7: Comprehensive Network Diagnostics and Remote Host Management
Course 4 - Learning Linux Shell Scripting | Episode 6: The Backup Plan
Course 4 - Learning Linux Shell Scripting | Episode 5: Shell Scripting for Web Automation, Data Retrieval, and Parsing
Course 4 - Learning Linux Shell Scripting | Episode 4: Shell Text Processing: Mastering Utilities and Regular Expressions
Course 4 - Learning Linux Shell Scripting | Episode 3: Comprehensive Unix File and Directory Management Utilities
Course 4 - Learning Linux Shell Scripting | Episode 2: Essential Unix/Linux Command Line Utilities and Advanced Techniques
Course 4 - Learning Linux Shell Scripting | Episode 1: Essential: Utilities, Variables, I/O, and Program Flow
Course 3 - Mastering Nuclei for Bug Bounty | Episode 8: Nuclei File-Based Templates: Implementing Content Matching and Secret Extraction
Course 3 - Mastering Nuclei for Bug Bounty | Episode 7: Exploiting Business Logic Flaws and Achieving Multiple Redemptions
Course 3 - Mastering Nuclei for Bug Bounty | Episode 6: Nuclei Fuzzing Techniques: Cluster Bomb, Pitchfork, and Battering Ram
Course 3 - Mastering Nuclei for Bug Bounty | Episode 5: Matching Conditions in the Body and Header
Course 3 - Mastering Nuclei for Bug Bounty | Episode 4: Headers, Body, Raw Requests, and Response Matching
Course 3 - Mastering Nuclei for Bug Bounty | Episode 3: Scanning Lists, Metrics, Template Writing, and Proxying
Course 3 - Mastering Nuclei for Bug Bounty | Episode 2: Controlling Scans, Traffic Tuning, and Custom Template Development
Course 3 - Mastering Nuclei for Bug Bounty | Episode 1: Nuclei: Installation, Template Setup, and First Scan
Course 2 - API Security Offence and Defense | Episode 4: Aggressive Attacks, Traditional Vulnerabilities and Exploitation of Staging APIs
Course 2 - API Security Offence and Defense | Episode 3: OAuth Protocol: Standards, Authorization Flows, Attacks, and Real-World Case Study
Course 2 - API Security Offence and Defense | Episode 2: Authentication Methods and Security: Basic, Digest, and JSON Web Tokens (JWT)
Course 2 - API Security Offence and Defense | Episode 1: API Fundamentals: Standards, Versioning, and Investigative Techniques
Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 12: Cookies, Sessions, and Session Management Manipulation Vulnerability
Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 11: Injection and Directory Path Traversal Attacks.
Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 10: XSS: Overview, Security Level Testing, and Real-World Attacks
Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 9: Understanding and Finding SQL Injection Vulnerabilities
Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 8: Exploiting Hidden Administrative Pages and Directory Listing
Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 7: Insecure Direct Object Reference (IDOR): Understanding, Testing
Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 6: Broken Authentication and Session Management: Exploits and Defenses
Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 5: Utilizing Burp Suite Decoder, Comparer, Sequencer, and Engagement Tool
Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 4: Burp Suite Proxy: Configuration, Request Interception, and Repeater
Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 3: Burp Suite: Web Security Testing and Target Scope Configuration
Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 2: Program Types, Methodologies, and the Path to Becoming a Hunter
Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 1: Installing Burp Suite, OWASP BWA, and Bee-Box (Bwapp)