PodParley PodParley
CyberCode Academy cover art

All Episodes

CyberCode Academy — 226 episodes

#
Title
1

Course 32 - Checkpoint CCSA R80 | Episode 3: From System Safeguards to Advanced Security Orchestration

2

Course 32 - Checkpoint CCSA R80 | Episode 2: SmartConsole Deployment, Gateway Integration, and Connectivity Management

3

Course 32 - Checkpoint CCSA R80 | Episode 1: Initial Deployment of Security Managers and Gateways

4

Course 31 - Dive Into Docker | Episode 11: Framework Starters and Design Best Practices

5

Course 31 - Dive Into Docker | Episode 10: Management, Versions, and Complex Microservices

6

Course 31 - Dive Into Docker | Episode 9: Orchestrating Multi-Container Web Applications with Docker Compose

7

Course 31 - Dive Into Docker | Episode 8: Networking, Persistence, and System Optimization

8

Course 31 - Dive Into Docker | Episode 7: Building, Running, and Syncing Flask Applications

9

Course 31 - Dive Into Docker | Episode 6: A Hands-On Guide to Dockerizing Web Applications

10

Course 31 - Dive Into Docker | Episode 5: From First Run to Building Images

11

Course 31 - Dive Into Docker | Episode 4: Editions, Versioning, and Installation Guide

12

Course 31 - Dive Into Docker | Episode 3: From Virtual Machines to Core Architecture

13

Course 31 - Dive Into Docker | Episode 2: Setup, Resources, and the Troubleshooting Mindset

14

Course 31 - Dive Into Docker | Episode 1: Efficiency, Portability, and Your Path to Modern Development

15

Course 30 - Practical Malware Development - Beginner Level | Episode 6: Developing a Command and Control (C2) System with PHP and MySQL

16

Course 30 - Practical Malware Development - Beginner Level | Episode 5: Building and Securing the Control Panel Dashboard

17

Course 30 - Practical Malware Development - Beginner Level | Episode 4: Building a Secure Web Control Panel: Database Infrastructure

18

Course 30 - Practical Malware Development - Beginner Level | Episode 3: Enhancing Agent Resilience and Establishing Remote Server

19

Course 30 - Practical Malware Development - Beginner Level | Episode 2: Mastering C# System Control: Navigating, Enumerating, and Executing

20

Course 30 - Practical Malware Development - Beginner Level | Episode 1: C# Offensive Operations: Recon, Persistence, and File Acquisition

21

Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 14: Securing Data and Applications in Microsoft Azure

22

Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 13: Storage, SQL Databases, and HDInsight

23

Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 12: Mastering Data Protection and SQL Security

24

Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 11: Security, Encryption, and Compliance

25

Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 10: Azure Security Monitoring and Threat Response

26

Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 9: Mastering Azure Security Operations

27

Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 8: Governance and Container Security

28

Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 7: A Comprehensive Guide to Virtual Machine and Container Security

29

Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 6: Azure Network Security

30

Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 5: Azure Network Infrastructure and Security

31

Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 4: Protecting Azure Virtual Networks

32

Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 3: Mastering Azure Identity and Access Management

33

Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 2: Managing Security and Hybrid Identity Integration

34

Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 1: Essential Identity Management and Security Protection

35

Course 28 - Denial of Service and Elevation of Privilege | Episode 6: Multi-Layered Defenses Against Elevation of Privilege

36

Course 28 - Denial of Service and Elevation of Privilege | Episode 5: Input Manipulation and the Path to Elevation of Privilege

37

Course 28 - Denial of Service and Elevation of Privilege | Episode 4: Designing for System Resilience and Capacity Defense

38

Course 28 - Denial of Service and Elevation of Privilege | Episode 3: From Mobile Networks to the Cloud

39

Course 28 - Denial of Service and Elevation of Privilege | Episode 2: Persistence, Cleverness, and Amplification

40

Course 28 - Denial of Service and Elevation of Privilege | Episode 1: The Evolution of Denial of Service Attacks

41

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 19: Mastering Burp Suite

42

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 18: Essential Firefox Extensions for Browser Customization

43

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 17: Common Network and Web Application Vulnerabilities

44

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 16: Web Technology Foundations: Protocols, Structure, and Scripting

45

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 15: Mastering Metasploitable 2: A Comprehensive Pentesting Guide

46

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 14: Web Essentials: Files, Extensions, and Enumeration

47

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 13: Essential Web Application Penetration Testing and Scanning Tool

48

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 12: Introduction to Banner Grabbing and Service Fingerprinting

49

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 11: OSINT, Reconnaissance, and Scanning: Foundations and Tools

50

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 10: OWASP Fundamentals: Top 10 Vulnerabilities and Web Security

51

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 9: Tools and Techniques for Concealing Information

52

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 8: Cryptography Fundamentals: Encoding and Ciphers

53

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 7: Tradecraft: The Methods and Tools of Modern Espionage

54

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 6: Penetration Testing Lifecycle: From Scoping to Reporting

55

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 5: Penetration Testing Terminology and Core Security Concepts

56

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 4: Penetration Testing and Hacker Profiles

57

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 3: Metasploit Database Setup and Initialization

58

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 2: Linux Fundamentals and Command Injection Basics

59

Course 27 - Hacking Web Applications, Penetration Testing, CTF | Episode 1: Kali Linux Essentials

60

Course 26 - Assessing and Mitigating Security Risks | Episode 5: Essential Tools for Incident Response

61

Course 26 - Assessing and Mitigating Security Risks | Episode 4: A Guide to Mitigation and Security Controls

62

Course 26 - Assessing and Mitigating Security Risks | Episode 3: Foundations of Successful Incident Identification and Response Management

63

Course 26 - Assessing and Mitigating Security Risks | Episode 2: The Fundamentals of Organizational Risk Management

64

Course 26 - Assessing and Mitigating Security Risks | Episode 1: Threats, Mindsets, and Vulnerabilities

65

Course 25 - API Python Hacking | Episode 7: Building Windows Executables from Python Scripts with PyInstaller

66

Course 25 - API Python Hacking | Episode 6: Privilege Modification and User Impersonation

67

Course 25 - API Python Hacking | Episode 5: Managing and Verifying Process Privileges

68

Course 25 - API Python Hacking | Episode 4: Structures, Process Spawning, and Undocumented Calls

69

Course 25 - API Python Hacking | Episode 3: From ctypes Basics to Building a Process Killer

70

Course 25 - API Python Hacking | Episode 2: Foundations of Windows Internals and API Mechanisms

71

Course 25 - API Python Hacking | Episode 1: GitHub Portfolio Building and Environment Setup

72

Course 24 - Machine Learning for Red Team Hackers | Episode 6: Security Vulnerabilities in Machine Learning

73

Course 24 - Machine Learning for Red Team Hackers | Episode 5: The Complete Guide to Deepfake Creation

74

Course 24 - Machine Learning for Red Team Hackers | Episode 4: Mastering White-Box and Black-Box Attacks

75

Course 24 - Machine Learning for Red Team Hackers | Episode 3: Evading Machine Learning Malware Classifiers

76

Course 24 - Machine Learning for Red Team Hackers | Episode 2: Building and Implementing Evolutionary Testing Tools

77

Course 24 - Machine Learning for Red Team Hackers | Episode 1: Building an Automated CAPTCHA-Breaking Bot

78

Course 23 - WiFi Hacking with Raspberry Pi | Episode 7: Building a Digital Ghost on Raspberry Pi

79

Course 23 - WiFi Hacking with Raspberry Pi | Episode 6: Fix These 5 Router Security Loopholes

80

Course 23 - WiFi Hacking with Raspberry Pi | Episode 5: Cracking Wi-Fi Passwords With Raspberry Pi

81

Course 23 - WiFi Hacking with Raspberry Pi | Episode 4: WiFi Jamming Techniques Using Raspberry

82

Course 23 - WiFi Hacking with Raspberry Pi | Episode 3: Build a Portable Raspberry Pi Cyberdeck

83

Course 23 - WiFi Hacking with Raspberry Pi | Episode 2: Building The Perfect Raspberry Pi Hacking Kit

84

Course 23 - WiFi Hacking with Raspberry Pi | Episode 1: Raspberry Pi Desktop And Hacking Machine

85

Course 22 - Digital Forensics: RAM Extraction Fundamentals | Episode 5: Forensic Access and RAM Extraction with Inception

86

Course 22 - Digital Forensics: RAM Extraction Fundamentals | Episode 4: RAM Capture via Magnet and FTK Imager

87

Course 22 - Digital Forensics: RAM Extraction Fundamentals | Episode 3: Comparing Belkasoft and Magnet Tools

88

Course 22 - Digital Forensics: RAM Extraction Fundamentals | Episode 2: Benchmarking Tools and Using MoonSols DumpIt

89

Course 22 - Digital Forensics: RAM Extraction Fundamentals | Episode 1: Value, Strategy, and Technical Preparation

90

Course 21 - Digital Forensics: Windows Shellbags | Episode 5: Shellbags Forensics: Validating Network Drive Activity

91

Course 21 - Digital Forensics: Windows Shellbags | Episode 4: Shellbag Forensics: Tracking USB Device History and Artifact Validation

92

Course 21 - Digital Forensics: Windows Shellbags | Episode 3: ShellBag Forensics: Practical Validation and Timestamp Analysis

93

Course 21 - Digital Forensics: Windows Shellbags | Episode 2: Forensic System Setup and Local Drive Integration

94

Course 21 - Digital Forensics: Windows Shellbags | Episode 1: Windows Shellbags: Forensic Fundamentals and Deep Dive Analysis

95

Course 20 - Malware Analysis: Identifying and Defeating Code Obfuscation | Episode 5: Identifying and Analyzing Cryptography in Malware

96

Course 20 - Malware Analysis: Identifying and Defeating Code Obfuscation | Episode 4: Dynamic API Resolution: Walking the PEB and Parsing

97

Course 20 - Malware Analysis: Identifying and Defeating Code Obfuscation | Episode 3: Analyzing and Defeating String Obfuscation in Native

98

Course 20 - Malware Analysis: Identifying and Defeating Code Obfuscation | Episode 2: Analyzing and Defeating Obfuscation in VBA

99

Course 20 - Malware Analysis: Identifying and Defeating Code Obfuscation | Episode 1: Defeating Malware Obfuscation: Fundamentals, Impact

100

Course 19 - Ultimate Rust Crash Course | Episode 5: Rust Concurrency Fundamentals: Closures, Threads, and Channel Communication

101

Course 19 - Ultimate Rust Crash Course | Episode 4: Rust Foundations: Structs, Traits, Collections

102

Course 19 - Ultimate Rust Crash Course | Episode 3: Rust Fundamentals: Mastering Ownership, References, and Borrowing

103

Course 19 - Ultimate Rust Crash Course | Episode 2: Rust Core Foundations: Data Types, Control Flow, and String Handling

104

Course 19 - Ultimate Rust Crash Course | Episode 1: Rust Programming Foundations: From Cargo Tooling to Core Syntax and Modules

105

Course 18 - Evading IDS Firewalls and Honeypots | Episode 6: Mastering Malware Evasion: Stealth, Obfuscation, and Anti-Analysis

106

Course 18 - Evading IDS Firewalls and Honeypots | Episode 5: Intrusion Detection and Prevention: Strategies, Tools, and Intelligence

107

Course 18 - Evading IDS Firewalls and Honeypots | Episode 4: Advanced Application Security: WAFs, API Gateways, and Honeypot Traps

108

Course 18 - Evading IDS Firewalls and Honeypots | Episode 3: Network Emulation and Security Defense: Deploying Cisco ASA and Kali Linux

109

Course 18 - Evading IDS Firewalls and Honeypots | Episode 2: Configuring a Cisco PIX Firewall to Establish a Secure Enclave

110

Course 18 - Evading IDS Firewalls and Honeypots | Episode 1: Firewall Management and Security Testing: From Windows and Linux Configurations

111

Course 17 - Computer Network Security Protocols And Techniques | Episode 9: Foundations of VPN Security: The IPsec Protocol Suite

112

Course 17 - Computer Network Security Protocols And Techniques | Episode 8: TLS/SSL Foundations: From Conceptual "Toy" Models to Actual

113

Course 17 - Computer Network Security Protocols And Techniques | Episode 7: Understanding Pretty Good Privacy (PGP) for Secure Email

114

Course 17 - Computer Network Security Protocols And Techniques | Episode 6: The Evolution of End Point Authentication: Securing Identities

115

Course 17 - Computer Network Security Protocols And Techniques | Episode 5: Digital Trust and Integrity: Hash Functions and Certification

116

Course 17 - Computer Network Security Protocols And Techniques | Episode 4: Asymmetric Cryptography: RSA, Diffie-Hellman

117

Course 17 - Computer Network Security Protocols And Techniques | Episode 3: Modern Ciphers: Structure, Standards (DES/AES)

118

Course 17 - Computer Network Security Protocols And Techniques | Episode 2: Traditional Ciphers: Substitution and Transposition Methods

119

Course 17 - Computer Network Security Protocols And Techniques | Episode 1: Computer Network Security: Foundations, Core Aspects

120

Course 16 - Red Team Ethical Hacking Beginner Course | Episode 7: The Art of Evasion: Detecting and Bypassing Security with Sysmon

121

Course 16 - Red Team Ethical Hacking Beginner Course | Episode 6: Windows Persistence Strategies: Registry, Scheduled Tasks, Services, WMI

122

Course 16 - Red Team Ethical Hacking Beginner Course | Episode 5: Windows Lateral Movement: Manual Execution via WMIC, Scheduled Tasks

123

Course 16 - Red Team Ethical Hacking Beginner Course | Episode 4: Windows Post-Exploitation: Remote File Management and System Control

124

Course 16 - Red Team Ethical Hacking Beginner Course | Episode 3: Essential Windows Domain and Host Enumeration

125

Course 16 - Red Team Ethical Hacking Beginner Course | Episode 2: Essential Command Line Administration: Linux, Windows, Account Management

126

Course 16 - Red Team Ethical Hacking Beginner Course | Episode 1: Introduction to Red Teaming: Concepts, Tools, and Tactics

127

Course 15 - Write an Android Trojan from scratch | Episode 4: Implementing an Android Reverse Shell using Java Native APIs (without Netcat)

128

Course 15 - Write an Android Trojan from scratch | Episode 3: Building a Reverse Connection Trojan: Programmatic Netcat Execution

129

Course 15 - Write an Android Trojan from scratch | Episode 2: Building the Trojan "Party App": UI Design and Netcat Preparation

130

Course 15 - Write an Android Trojan from scratch | Episode 1: Android Trojan Horse Basics, Reverse Shells, and Development Environment Setup

131

Course 14 - Wi-Fi Pentesting | Episode 11: Securing Wireless Networks: Countermeasures and Configuration

132

Course 14 - Wi-Fi Pentesting | Episode 10: WPA Enterprise: Authentication, Evil Twins, and Credential Cracking

133

Course 14 - Wi-Fi Pentesting | Episode 9: WPA/WPA2 Cracking Efficiency: Optimizing Storage, Resumption, and Speed

134

Course 14 - Wi-Fi Pentesting | Episode 8: WPA/WPA2 Hacking: Handshake Capture, Wordlist Attack, and Progress Management

135

Course 14 - Wi-Fi Pentesting | Episode 7: WPA/WPA2 Cracking via WPS: Reaver Exploitation, Error Bypassing, and WPS Unlocking

136

Course 14 - Wi-Fi Pentesting | Episode 6: WPA/WPA2 Cracking Introduction: Exploiting the WPS Vulnerability

137

Course 14 - Wi-Fi Pentesting | Episode 5: WEP Cracking: Packet Injection and Replay Attacks (ARP, Chopchop, Fragmentation, and SKA)

138

Course 14 - Wi-Fi Pentesting | Episode 4: Cracking WEP Encryption: Gaining Network Access

139

Course 14 - Wi-Fi Pentesting | Episode 3: Targeted Wireless Network Discovery and Pre-Connection Bypasses

140

Course 14 - Wi-Fi Pentesting | Episode 2: Network Fundamentals, Wireless Adapter Setup, and Packet Sniffing Basics

141

Course 14 - Wi-Fi Pentesting | Episode 1: Setting Up the Virtual Hacking Lab: VirtualBox and Kali Linux

142

Course 13 - Network Forensics | Episode 8: Email Analysis and Forensic Investigation

143

Course 13 - Network Forensics | Episode 7: Web Traffic Analysis and Browser Forensics: Handshakes, DNSSEC, and Cookies

144

Course 13 - Network Forensics | Episode 6: Wireless Network Analysis, Standards, and Security Forensics

145

Course 13 - Network Forensics | Episode 5: TCP/IP Layers, Data Flow, and Network Tools

146

Course 13 - Network Forensics | Episode 4: Log Analysis, SIM Correlation, and Network Attack Signature Detection

147

Course 13 - Network Forensics | Episode 3: Network Forensics, Security Tools, and Defensive Architecture

148

Course 13 - Network Forensics | Episode 2: Architecture, Protocols (TCP/UDP), and Evidentiary Value

149

Course 13 - Network Forensics | Episode 1: Fundamentals, Attack Vectors, and Digital Tracing

150

Course 12 - Maltego Advanced Course | Episode 4: Custom Entity Design and Implementation in Maltego

151

Course 12 - Maltego Advanced Course | Episode 3: The Maltego Transform Hub: Finding, Installing, and Utilizing Data Integrations

152

Course 12 - Maltego Advanced Course | Episode 2: Maltego Infrastructure Entities, Transforms, and Footprinting Techniques

153

Course 12 - Maltego Advanced Course | Episode 1: Maltiggo Transforms, Sets, and Essential Menu Actions

154

Course 11 - Mobile Forensics Fundamentals | Episode 3: iOS and iPhone Forensics: Security, Acquisition Techniques, and Artifact Analysis

155

Course 11 - Mobile Forensics Fundamentals | Episode 2: Data Acquisition, Diverse Operating Systems, and Forensic Challenges

156

Course 11 - Mobile Forensics Fundamentals | Episode 1: Legal Authority, Acquisition Procedures, and Examiner Responsibilities

157

Course 10 - Network Security Fundamentals | Episode 7: Implementing Defense in Depth, Data Integrity, and Zero Trust

158

Course 10 - Network Security Fundamentals | Episode 6: Attack Mitigation, Vulnerability Assessment, and Penetration Testing

159

Course 10 - Network Security Fundamentals | Episode 5: Protecting and Hardening Network Endpoints: Concepts, Strategies, and Management

160

Course 10 - Network Security Fundamentals | Episode 4: VPNs, Tunneling, and Secure Remote Access Technologies

161

Course 10 - Network Security Fundamentals | Episode 3: Firewalls and Intrusion Detection/Prevention Systems (IDS/IPS)

162

Course 10 - Network Security Fundamentals | Episode 2: Securing Wireless and Mobile Networks: Standards, Threats, and Best Practices

163

Course 10 - Network Security Fundamentals | Episode 1: Models, Security, Protocols, and IP Addressing

164

Course 9 - Internet of Things Security | Episode 3: IOT Security: Challenges, Vulnerabilities, and Real-World Cyber-Physical Attacks

165

Course 9 - Internet of Things Security | Episode 2: UK Legislation, Data Privacy (GDPR), and Liability for Drones and Autonomous Vehicles

166

Course 9 - Internet of Things Security | Episode 1: Introduction to the IOT: Components, Architectures, Use Cases, and Security

167

Course 8 - Penetration Testing OSINT Gathering with Recon-ng | Episode 4: Recon-ng Results: Comprehensive Reporting Formats and Strategic

168

Course 8 - Penetration Testing OSINT Gathering with Recon-ng | Episode 3: Harvesting Data, Optimizing Contacts, Geolocation

169

Course 8 - Penetration Testing OSINT Gathering with Recon-ng | Episode 2: Modules, Data Flow, Naming Structure, API Keys

170

Course 8 - Penetration Testing OSINT Gathering with Recon-ng | Episode 1: Recon-ng Installation, Shell Exploration and Data Management

171

Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 8: Phase 8: Collaboration, Maturity Models, and Strategic Planning

172

Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 7: Incident Management, Operational Defense, and Continuous Security

173

Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 6: Secure Validation: A Comprehensive Look at Security Testing Methodolog

174

Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 5: Hardening, DevSecOps Integration, Container Security and WAF

175

Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 4: Integrating Secure Coding, Code Review, and Application Security Testi

176

Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 3: Defining, Implementing 20 Controls, and Mitigating OWASP Top 10 in SDL

177

Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 2: Malware, Social Engineering, GRC, and Secure Development Practices

178

Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 1: Approaches, Eight Phases, and Risk Management

179

Course 6 - Network Traffic Analysis for Incident Response | Episode 7: Network Data Analysis Toolkit: Tools, Techniques and Threat Signature

180

Course 6 - Network Traffic Analysis for Incident Response | Episode 6: Investigating RATs, Worms, Fileless, and Multi-Stage Malware Variants

181

Course 6 - Network Traffic Analysis for Incident Response | Episode 5: Scanning, Covert Data Exfiltration, DDoS Attacks and IoT Exploitation

182

Course 6 - Network Traffic Analysis for Incident Response | Episode 4: Mapping, Decoding, and Decrypting Network Traffic Intelligence

183

Course 6 - Network Traffic Analysis for Incident Response | Episode 3: Wireshark Alternatives: Network Miner, Terminal Shark, and CloudShark

184

Course 6 - Network Traffic Analysis for Incident Response | Episode 2: Wireshark Features and Comprehensive Protocol Dissection

185

Course 6 - Network Traffic Analysis for Incident Response | Episode 1: Fundamentals of Networking: The OSI Model and Essential Protocols

186

Course 5 - Full Mobile Hacking | Episode 8: Technical Check for Mobile Indicators of Compromise using ADB and Command Line

187

Course 5 - Full Mobile Hacking | Episode 7: Remote Windows Management and Android Geolocation Security Tutorials

188

Course 5 - Full Mobile Hacking | Episode 6: Ghost Framework: Exploiting Android Devices via Debug Bridge (ADB) and Shodan Reconnaissance

189

Course 5 - Full Mobile Hacking | Episode 5: Exploiting Insecure Storage and Access Controls via Reverse Engineering and ADB

190

Course 5 - Full Mobile Hacking | Episode 4: Comprehensive Android Debugging and Control: ADB, SCRCPY, and Security Manipulation

191

Course 5 - Full Mobile Hacking | Episode 3: Android Hacking and Remote Management: Payloads, App Hiding, Geolocation, and Data Extraction

192

Course 5 - Full Mobile Hacking | Episode 2: Setting Up the iPhone Simulator on Mac OS using Xcode for Mobile Penetration Testing

193

Course 5 - Full Mobile Hacking | Episode 1: Android Studio: Running AVDs and Installing Apps on Windows

194

Course 4 - Learning Linux Shell Scripting | Episode 9: Process Management, Scheduling, User Control, and Scripting Utilities

195

Course 4 - Learning Linux Shell Scripting | Episode 8: System Monitoring, Performance Measurement, and Log Management

196

Course 4 - Learning Linux Shell Scripting | Episode 7: Comprehensive Network Diagnostics and Remote Host Management

197

Course 4 - Learning Linux Shell Scripting | Episode 6: The Backup Plan

198

Course 4 - Learning Linux Shell Scripting | Episode 5: Shell Scripting for Web Automation, Data Retrieval, and Parsing

199

Course 4 - Learning Linux Shell Scripting | Episode 4: Shell Text Processing: Mastering Utilities and Regular Expressions

200

Course 4 - Learning Linux Shell Scripting | Episode 3: Comprehensive Unix File and Directory Management Utilities

201

Course 4 - Learning Linux Shell Scripting | Episode 2: Essential Unix/Linux Command Line Utilities and Advanced Techniques

202

Course 4 - Learning Linux Shell Scripting | Episode 1: Essential: Utilities, Variables, I/O, and Program Flow

203

Course 3 - Mastering Nuclei for Bug Bounty | Episode 8: Nuclei File-Based Templates: Implementing Content Matching and Secret Extraction

204

Course 3 - Mastering Nuclei for Bug Bounty | Episode 7: Exploiting Business Logic Flaws and Achieving Multiple Redemptions

205

Course 3 - Mastering Nuclei for Bug Bounty | Episode 6: Nuclei Fuzzing Techniques: Cluster Bomb, Pitchfork, and Battering Ram

206

Course 3 - Mastering Nuclei for Bug Bounty | Episode 5: Matching Conditions in the Body and Header

207

Course 3 - Mastering Nuclei for Bug Bounty | Episode 4: Headers, Body, Raw Requests, and Response Matching

208

Course 3 - Mastering Nuclei for Bug Bounty | Episode 3: Scanning Lists, Metrics, Template Writing, and Proxying

209

Course 3 - Mastering Nuclei for Bug Bounty | Episode 2: Controlling Scans, Traffic Tuning, and Custom Template Development

210

Course 3 - Mastering Nuclei for Bug Bounty | Episode 1: Nuclei: Installation, Template Setup, and First Scan

211

Course 2 - API Security Offence and Defense | Episode 4: Aggressive Attacks, Traditional Vulnerabilities and Exploitation of Staging APIs

212

Course 2 - API Security Offence and Defense | Episode 3: OAuth Protocol: Standards, Authorization Flows, Attacks, and Real-World Case Study

213

Course 2 - API Security Offence and Defense | Episode 2: Authentication Methods and Security: Basic, Digest, and JSON Web Tokens (JWT)

214

Course 2 - API Security Offence and Defense | Episode 1: API Fundamentals: Standards, Versioning, and Investigative Techniques

215

Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 12: Cookies, Sessions, and Session Management Manipulation Vulnerability

216

Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 11: Injection and Directory Path Traversal Attacks.

217

Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 10: XSS: Overview, Security Level Testing, and Real-World Attacks

218

Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 9: Understanding and Finding SQL Injection Vulnerabilities

219

Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 8: Exploiting Hidden Administrative Pages and Directory Listing

220

Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 7: Insecure Direct Object Reference (IDOR): Understanding, Testing

221

Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 6: Broken Authentication and Session Management: Exploits and Defenses

222

Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 5: Utilizing Burp Suite Decoder, Comparer, Sequencer, and Engagement Tool

223

Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 4: Burp Suite Proxy: Configuration, Request Interception, and Repeater

224

Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 3: Burp Suite: Web Security Testing and Target Scope Configuration

225

Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 2: Program Types, Methodologies, and the Path to Becoming a Hunter

226

Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 1: Installing Burp Suite, OWASP BWA, and Bee-Box (Bwapp)