Cyber Security Entertainment
Cyber Security Entertainment
  • 235
  • 446 184

วีดีโอ

STIX and TAXII - Cyber Threat Intelligence
มุมมอง 11028 วันที่ผ่านมา
In this video, we delve into STIX (Structured Threat Information Expression) and TAXII (Trusted Automated Exchange of Indicator Info), essential frameworks for Cyber Threat Intelligence (CTI). Learn how these standards help organizations understand and mitigate cybersecurity risks by defining, structuring, and securely sharing threat data. Key Topics Covered: STIX (Structured Threat Information...
Dynamic Web Application Security Testing (DAST)
มุมมอง 682 หลายเดือนก่อน
In this video, we explore Dynamic Application Security Testing (DAST), a crucial process for identifying security weaknesses and vulnerabilities in web applications. What is DAST? DAST is a web scanner used for non-functional testing to pinpoint security flaws. It communicates with web applications through the front-end to identify potential vulnerabilities and architectural weaknesses. DAST ca...
Firewall Deployment - Security Zone, Security Policy, Address Book, RVI, VLAN, Subnet, App Traffic
มุมมอง 1393 หลายเดือนก่อน
In this video, I will discuss Enterprise Security Architecture and various concepts related to network and network security within that architecture. For example, VLANs, access ports, routed VLAN interfaces, firewall security zones, security policies, and address books. So, let's begin. These are two laptops and two printers. We want to send a print job from these laptops to these printers. How...
MITRE ATT&CK
มุมมอง 863 หลายเดือนก่อน
The ATT&CK framework stands for Adversarial Tactics, Techniques, and Common Knowledge. This framework was developed by MITRE Corporation and is a knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary's attack life cycle and the platforms they are known to target. It serves as a guideline for classifying and describing cyberattacks and intrusions, a...
Zoombombing Attack on Video conferencing platforms
มุมมอง 434 หลายเดือนก่อน
During the COVID-19 pandemic, people were forced to work from their homes, so organizations and schools depended on video conferencing platforms for their workforce. This also got the attention of hackers, who hacked into these meetings and inserted inappropriate content, forcing these meetings to shut down. This attack is known as a Zoom bombing attack because the famous software for video con...
Evolution of WLAN Security
มุมมอง 1496 หลายเดือนก่อน
"In this video, I will discuss the evolution of wireless LAN security starting from WEP. It was part of the 802.11 VLAN initial standard and was introduced with VLANs in 1997. Then its next version was WEP2, which was an early draft of the 802.11i wireless LAN security protocol. However, this was a non-standard fix for vulnerabilities in WEP. Then came Wi-Fi Protected Access (WPA), which was al...
Cyber Risk Management Terminologies
มุมมอง 606 หลายเดือนก่อน
"In this video, I will discuss certain terminologies relating to managing cybersecurity risks. The first one is confidentiality, which is also a cornerstone of cybersecurity. It aims to prevent unauthorized disclosure of your data or information. The second cornerstone is integrity, which seeks to prevent unauthorized modification to your data and ensures that the data is complete and accurate....
DHCP Snooping
มุมมอง 23310 หลายเดือนก่อน
"DHCP stands for Dynamic Host Configuration Protocol and operates at layer seven, which is the application layer of the OSI model. It assigns IP addresses to network endpoints, operating at layer three of the OSI model, known as the Network layer. Here we have a network switch. One of its ports is connected to an authorized DHCP server, while another port is connected to a client seeking an IP ...
Enticement vs Entrapment
มุมมอง 229ปีที่แล้ว
"In this video, I will discuss two investigative and prosecution methods used by law enforcement agencies or their agents, which could also include IT companies. The first method is entrapment, and the second is enticement. The purpose of both investigative methods is to prosecute criminals. However, entrapment is illegal, whereas enticement is legal. In entrapment, law enforcement agencies or ...
Services of SIEM
มุมมอง 197ปีที่แล้ว
"In this video, I will discuss the security services offered by Security Information and Event Management (SIEM) solutions. These services include log centralization, log normalization, and alerts. All endpoints, servers, workstations, network devices, applications, cloud services, and security tools generate local logs. This log data is overwhelming to manually search or analyze. Therefore, we...
Cryptographic Key Management Practices
มุมมอง 342ปีที่แล้ว
"Cryptographic keys are used to encrypt data, and it is crucial to protect these cryptographic keys to ensure the confidentiality and integrity of the encrypted data. In this video, I will discuss cryptographic key management practices, starting from secure key generation, secure key storage and usage, and certain administrative controls related to key management practices like separation of du...
Process for Attack Simulation & Threat Analysis (PASTA)
มุมมอง 596ปีที่แล้ว
"The Process for Attack Simulation and Threat Analysis (PASTA) is a methodology developed to address cybersecurity risks comprehensively. It focuses on understanding and mitigating threats through a structured approach. PASTA involves seven key stages. Firstly, define business objectives aligned with technical requirements, security needs, and compliance considerations. Conduct preliminary busi...
Functions & Types of Cloud Access Security Broker (CASB)
มุมมอง 130ปีที่แล้ว
"Cloud Access Security Broker or CASB fits between a cloud customer and a cloud application, providing Identity and Access Management (IAM) services. It is a defense-in-depth strategy for using cloud services; however, organizations still need traditional firewalls and intrusion prevention systems. CASB augments firewalls rather than replacing them. Now, I will discuss certain functions provide...
Phases of Data Loss/ Leakage Prevention (DLP)
มุมมอง 214ปีที่แล้ว
"Every organization has a Data Protection Program, and Data Loss Prevention (DLP) is a crucial part of that program. A DLP strategy is essential for monitoring egress in your organization. These are different technologies and practices that must align with your organization's existing architecture. The objective here is to prevent data loss or unauthorized access to data. Now, there are three p...
Protection for Intellectual Property
มุมมอง 51ปีที่แล้ว
Protection for Intellectual Property
NIST CyberSecurity Framework (CSF)
มุมมอง 271ปีที่แล้ว
NIST CyberSecurity Framework (CSF)
Supply Chain Security Guidance - UK National Cyber Security Center
มุมมอง 56ปีที่แล้ว
Supply Chain Security Guidance - UK National Cyber Security Center
Privacy by Design (PbD)
มุมมอง 2.8Kปีที่แล้ว
Privacy by Design (PbD)
Limitations of CIA Triad
มุมมอง 182ปีที่แล้ว
Limitations of CIA Triad
Just in Time (JIT) Access
มุมมอง 269ปีที่แล้ว
Just in Time (JIT) Access
SOC Functions by SANS
มุมมอง 229ปีที่แล้ว
SOC Functions by SANS
6 x Access Control Models (RBAC, RuBAC, MAC, DAC, ABAC, Risk BAC)
มุมมอง 1.2Kปีที่แล้ว
6 x Access Control Models (RBAC, RuBAC, MAC, DAC, ABAC, Risk BAC)
NIST Security Recommendations for Server-based Hypervisor Platforms (NIST SP 800-125A )
มุมมอง 193ปีที่แล้ว
NIST Security Recommendations for Server-based Hypervisor Platforms (NIST SP 800-125A )
Lockheed Martin's Cyber Kill Chain
มุมมอง 627ปีที่แล้ว
Lockheed Martin's Cyber Kill Chain
Virtual Patching (External Patching, Just-in-Time Patching)
มุมมอง 732ปีที่แล้ว
Virtual Patching (External Patching, Just-in-Time Patching)
Breach Attack Simulation (BAS)
มุมมอง 2.7Kปีที่แล้ว
Breach Attack Simulation (BAS)
Same-Origin Policy (SOP)
มุมมอง 1.4Kปีที่แล้ว
Same-Origin Policy (SOP)
Broken Object Level Authorization (BOLA)
มุมมอง 262ปีที่แล้ว
Broken Object Level Authorization (BOLA)
Software Assurance Maturity Model (SAMM)
มุมมอง 1.7Kปีที่แล้ว
Software Assurance Maturity Model (SAMM)

ความคิดเห็น

  • @hydradragonantivirus
    @hydradragonantivirus 3 วันที่ผ่านมา

    MBR is dead

  • @IndiiHero
    @IndiiHero 20 วันที่ผ่านมา

    Blue balling 💀💀💀

  • @fcortesjp
    @fcortesjp 28 วันที่ผ่านมา

    exactly what I was looking for, detailed. comprehensive and to the point.. thank you sir

  • @Unknown97909
    @Unknown97909 หลายเดือนก่อน

    really great explanation

  • @muralin3460
    @muralin3460 2 หลายเดือนก่อน

    Great explaination sir

  • @singkongkukus4122
    @singkongkukus4122 2 หลายเดือนก่อน

    My android cell phone being hacked by my ex husband, and he is cybersecurity expert. He gave me brand new android phone Xiaomi POCO from the distributor and it was wrapped.. But he idk he sent me debug or virus like he did to my 1st Xiomi Redmi, or he did action on this content.??.. How i erase his hacking?? Maybe anyone can explain to me or gimme simple tutorials. I live in Indonesia. Thanks 🙏😊

  • @EliteKoala
    @EliteKoala 2 หลายเดือนก่อน

    awesome video! thank you for the info

  • @atharavhedage3607
    @atharavhedage3607 3 หลายเดือนก่อน

    The content is extremely hard to find and rich. Nice contexts!

  • @carlche647
    @carlche647 3 หลายเดือนก่อน

    Good explanation for VXLAN, thanks.

  • @MF-le7fp
    @MF-le7fp 3 หลายเดือนก่อน

    Great explanation... thank you! This is EXACTLY wtf is goin on with all my PCs. So once it’s infected by this crap, no matter how many times you “slash&burn” Windows, and reinstall a “clean copy” of the OS it does no good. You simply have a brand new Windows install that gets freshly infected. I was already fairly certain this was the case when I arrived here, and I am now looking for a way to kill it. So the question is, if one were to update the system bios via a non infected USB flash drive by changing the boot sequence in bios, and running the bios update straight off the flash drive without booting into Windows, would this method serve to also update (ie...overwrite) the currently infected MBR with a brand new, non infected MBR? Thanks for any reply from anybody! I was hoping you would touch on the possible solutions for the problem in this video, but still appreciate the succinct manner in which you explained it. It is spot on! 👍

  • @klnskljafdskl
    @klnskljafdskl 3 หลายเดือนก่อน

    the fucking music is terrible, ruins the video, can't watch this shit

  • @RazzleJazzle420
    @RazzleJazzle420 3 หลายเดือนก่อน

    it's so weird how there are so few good explanations of this on youtube...thank you sir!!

  • @f0rhacksd
    @f0rhacksd 3 หลายเดือนก่อน

    worth video

  • @Karwan-Saed
    @Karwan-Saed 4 หลายเดือนก่อน

    Many Thanks, It was so useful form me

  • @goyalsachin22
    @goyalsachin22 4 หลายเดือนก่อน

    Interested in last date of connection. any way to find that out.

  • @user-er4tg9ve1m
    @user-er4tg9ve1m 4 หลายเดือนก่อน

    The most dangerous attack, just read an article related to this, hope it could help the users: ask.wiki/2024/01/10/zero-day-attacks-a-potential-threat-stay-protected-with-this-guide/

  • @rmcgraw7943
    @rmcgraw7943 4 หลายเดือนก่อน

    I know all these, and more. 😅

  • @kengencitytv8787
    @kengencitytv8787 5 หลายเดือนก่อน

    Thank you more

  • @bonalaramamanikanta9580
    @bonalaramamanikanta9580 5 หลายเดือนก่อน

    This is best explanation for us 🎉congratulations 🎊 keep it up and please make more vedioes like this thank you

  • @lilyinua422
    @lilyinua422 5 หลายเดือนก่อน

    Дуже дякую за відео. Thank you for the lecture. That was really helpful.

  • @UCUPKU234
    @UCUPKU234 5 หลายเดือนก่อน

    so where is the implementation ?

  • @karthikeyanv3400
    @karthikeyanv3400 5 หลายเดือนก่อน

    Good walk through. Well explained

  • @bathulasaikrishna6299
    @bathulasaikrishna6299 6 หลายเดือนก่อน

    Sir how can we know mobile USB logging history

  • @edwinmacias8731
    @edwinmacias8731 7 หลายเดือนก่อน

    Thank you my friend, great explanation.

  • @surfmaster9612
    @surfmaster9612 8 หลายเดือนก่อน

    Explanation could highlight that If I wanted to connect to a specific device behind NAT, there is no way of knowing the private ip of that device before hand. Hence we have to use NAT-T.

    • @cybersecurityentertainment
      @cybersecurityentertainment 8 หลายเดือนก่อน

      NAT traversal enables IPsec traffic to pass through a NAT device without being discarded or corrupted, by adding UDP header for address & port translation. It is used in P2P (e.g VoIP or file sharing), as you mentioned.

  • @saggle1000
    @saggle1000 8 หลายเดือนก่อน

    thank you

  • @user-dh3tl3cw2s
    @user-dh3tl3cw2s 9 หลายเดือนก่อน

    protocol not protocole :))

  • @nj742
    @nj742 10 หลายเดือนก่อน

    You have to check IEEE

  • @justaferris
    @justaferris 10 หลายเดือนก่อน

    Have there been any results published on these metrics/methods of evaluation in practices?

  • @ssesaazirowlings2530
    @ssesaazirowlings2530 11 หลายเดือนก่อน

    thanks for the clear explanation

  • @funmemes5915
    @funmemes5915 ปีที่แล้ว

    Good informative video

  • @Testacabeza
    @Testacabeza ปีที่แล้ว

    So without a malware this is not possible at all, right? Thanks.

  • @Sabbtuna
    @Sabbtuna ปีที่แล้ว

    Thank you brother!

  • @shivamanand8998
    @shivamanand8998 ปีที่แล้ว

    Thanks, I was able to understand in one go

  • @SantoshSharma
    @SantoshSharma ปีที่แล้ว

    nice video is there part -2?

  • @user-tg3nt6uv9p
    @user-tg3nt6uv9p ปีที่แล้ว

    i have sonicwall firewall and i want conect vpn with azure, the logs of conexion inform next: Peer IPSec Security Gateway behind a NAT/NAPT Device. plese someone help me. tks

  • @DaijonRoberts-o4g
    @DaijonRoberts-o4g ปีที่แล้ว

    zyzz brah

  • @roiceborruso8120
    @roiceborruso8120 ปีที่แล้ว

    *promo sm*

  • @mailargowda2774
    @mailargowda2774 ปีที่แล้ว

    Easy to understand 👌

  • @flearning269
    @flearning269 ปีที่แล้ว

    Good information

  • @patrickdurdenman7221
    @patrickdurdenman7221 ปีที่แล้ว

    Hi, I have actually looked at a whole variety of videos regarding this topic and have to say that yours is *by far* the most informative and intelligent one. I just wonder why you didn't put much effort into the quality of the audio?

  • @harikak5857
    @harikak5857 ปีที่แล้ว

    Can we have your contact. We are looking for training.😊

  • @BasavarajGurupadMokashi
    @BasavarajGurupadMokashi ปีที่แล้ว

    Hi man, thanks much for this video. Practical explanation would really be more impressive and much needed to understand more clearly 🙏

  • @user98826
    @user98826 ปีที่แล้ว

    Great way to present the information, easy and effective!

  • @rajkumar-ne1ge
    @rajkumar-ne1ge ปีที่แล้ว

    Hi I would like to know more about policy I need your support can you please share you gmail or how can I communicate with you eXtensible Access Control Markup Language (XACML)

  • @rajkumar-ne1ge
    @rajkumar-ne1ge ปีที่แล้ว

    Hi I would like to know more about policy I need your support can you please share you gmail or how can I communicate with you

  • @syedibrahimkhalil786
    @syedibrahimkhalil786 ปีที่แล้ว

    Amazing! Thank you for sharing these details. What do you advice for entry level aspirant? What to focus on more to get entry level jobs?

    • @cybersecurityentertainment
      @cybersecurityentertainment ปีที่แล้ว

      Technical Hands-on in any domain, network, software development, server operating system, penetration testing. Start small, & your aim get better with time. Persistent is the key.

  • @skytimtw
    @skytimtw ปีที่แล้ว

    Thank you!

  • @victoroghifobibi4090
    @victoroghifobibi4090 ปีที่แล้ว

    Very clear and explanatory video. What application have you used to create the mind maps in your video?

  • @biohackingalchemy7996
    @biohackingalchemy7996 2 ปีที่แล้ว

    So does anyone seeing this realize that the OSSTMM came up with the "idea" of Zero Trust?? Yes, this is an OSSTMM idea and its 22 years old. Go read the OSSTMM.

    • @cybersecurityentertainment
      @cybersecurityentertainment 2 ปีที่แล้ว

      current version is OSSTMM 3.02 (2010), earlier versions are not available on ISECOM website. I suppose you are talking about 1st version which was published in December 2000.

    • @biohackingalchemy7996
      @biohackingalchemy7996 2 ปีที่แล้ว

      @@cybersecurityentertainment Yes, all of the Trust and controls are in the current issue. My reference was how Trust has always been a part of the OSSTMM and it has matured over time. As I dig more and more into the whole ZT idea, I see how the OSSTMM has already addressed the issue in much the same way but well before ZT was "Born".