Cyber Technical knowledge
Cyber Technical knowledge
  • 337
  • 194 635
The Complete Qualys Vulnerability Management Training #cybersecurity #vulnerability
The Complete Qualys Vulnerability Management Training #cybersecurity #vulnerability
The Complete Qualys Vulnerability Management Training
Hello everyone! In this video, I will teach you how to use Qualys Community Edition!!! You will be able to scan your home network or virtual machines for vulnerabilities and learn how to remediate them. Qualys is a powerful tool that organizations use to scan their networks for vulnerabilities or misconfigurations in order to strengthen their network security. Learning this tool can vastly improve your chances of landing an information security role. You can also add this to your resume in the projects section.
Quick disclaimer. PLEASE do NOT scan a network you do not have explicit permission to scan. Unauthorized activity like this can result in serious legal consequences. So ONLY scan your home network. Thank you :)
🔴 Disclaimer 🔴
This video is made available for educational and informational purposes only. We believe that everyone must be aware of ethical hacking and cybersecurity to avoid different types of cyberattacks on computers, websites, apps, etc. Please regard the word hacking as ethical hacking every time we use it.
All our videos have been made using our own systems, servers, routers, and websites. It does not contain any illegal activities. Our sole purpose is to raise awareness related to cybersecurity and help our viewers learn ways to defend themselves from any hacking activities. Cyber technical Knowledge is not responsible for any misuse of the provided information.
Copyright Disclaimer: - Under section 107 of the copyright Act 1976, allowance is mad for FAIR USE for purpose such a as criticism, comment, news reporting, teaching, scholarship and research. Fair use is a use permitted by copyright statues that might otherwise be infringing. Non- Profit, educational or personal use tips the balance in favor of FAIR USE.
มุมมอง: 111

วีดีโอ

STOP Making These 5 Critical Postman API Testing Mistakes
มุมมอง 892 หลายเดือนก่อน
Complete Tutorial for Beginners to advanced Postman API Testing #postmanapitesting #postman Postman is a popular tool for API testing, allowing developers to send and receive HTTP requests to test APIs. API testing involves sending requests to an API endpoint to verify its functionality, performance, and security. Postman offers a user-friendly interface for writing and sending HTTP requests, t...
Web Application Security Misconfiguration Penetration testing #penetrationtesting #hackingcourses
มุมมอง 5003 หลายเดือนก่อน
Web Application Security Misconfiguration Penetration testing #penetrationtesting #hackingcourses Ethical Hacking 101: Web App Penetration Testing - a full course for beginners Learn web application penetration testing from beginner to advanced. This course is perfect for people who are interested in cybersecurity or ethical hacking.
Postman Beginner Tutorial 14 _ How to Add Authorization in Postman
มุมมอง 523 หลายเดือนก่อน
Postman Beginner Tutorial 14 _ How to Add Authorization in Postman Notes: How to add API Request Run and check Response #Postman #APITesting Every LIKE & SUBSCRIPTION gives me great motivation to keep working for you You can support my mission for education by sharing this knowledge and helping as many people as you can If my work has helped you, consider helping any one near you, in any way yo...
Postman Beginner Tutorial 13 Data Driven Testing How to get data from CSV and JSON files
มุมมอง 383 หลายเดือนก่อน
Postman Beginner Tutorial 13 Data Driven Testing How to get data from CSV and JSON files Notes: How to add API Request Run and check Response #Postman #APITesting Every LIKE & SUBSCRIPTION gives me great motivation to keep working for you You can support my mission for education by sharing this knowledge and helping as many people as you can If my work has helped you, consider helping any one n...
Postman Beginner Tutorial 12 _ How to Debug
มุมมอง 233 หลายเดือนก่อน
Postman Beginner Tutorial 12 _ How to Debug Notes: How to add API Request Run and check Response #Postman #APITesting Every LIKE & SUBSCRIPTION gives me great motivation to keep working for you You can support my mission for education by sharing this knowledge and helping as many people as you can If my work has helped you, consider helping any one near you, in any way you can.
Postman Beginner Tutorial 11 How to create First Test
มุมมอง 313 หลายเดือนก่อน
Postman Beginner Tutorial 11 How to create First Test Notes: How to add API Request Run and check Response #Postman #APITesting Every LIKE & SUBSCRIPTION gives me great motivation to keep working for you You can support my mission for education by sharing this knowledge and helping as many people as you can If my work has helped you, consider helping any one near you, in any way you can.
Postman Beginner Tutorial 10 Scripts in Postman
มุมมอง 293 หลายเดือนก่อน
Postman Beginner Tutorial 10 Scripts in Postman Notes: How to add API Request Run and check Response #Postman #APITesting Every LIKE & SUBSCRIPTION gives me great motivation to keep working for you You can support my mission for education by sharing this knowledge and helping as many people as you can If my work has helped you, consider helping any one near you, in any way you can.
Postman Beginner Tutorial 9 Environments
มุมมอง 343 หลายเดือนก่อน
Postman Beginner Tutorial 9 Environments Notes: How to add API Request Run and check Response #Postman #APITesting Every LIKE & SUBSCRIPTION gives me great motivation to keep working for you You can support my mission for education by sharing this knowledge and helping as many people as you can If my work has helped you, consider helping any one near you, in any way you can.
Postman Beginner Tutorial 8 Get and Set Variables with Scripts
มุมมอง 213 หลายเดือนก่อน
Postman Beginner Tutorial 8 Get and Set Variables with Scripts Notes: How to add API Request Run and check Response #Postman #APITesting Every LIKE & SUBSCRIPTION gives me great motivation to keep working for you You can support my mission for education by sharing this knowledge and helping as many people as you can If my work has helped you, consider helping any one near you, in any way you can.
Postman Beginner Tutorial 7 _ How to add and refer Variables
มุมมอง 183 หลายเดือนก่อน
Postman Beginner Tutorial 7 _ How to add and refer Variables Notes: How to add API Request Run and check Response #Postman #APITesting Every LIKE & SUBSCRIPTION gives me great motivation to keep working for you You can support my mission for education by sharing this knowledge and helping as many people as you can If my work has helped you, consider helping any one near you, in any way you can.
Postman Beginner Tutorial 6 Collections
มุมมอง 223 หลายเดือนก่อน
Postman Beginner Tutorial 6 _ Collections Notes: How to add API Request Run and check Response #Postman #APITesting Every LIKE & SUBSCRIPTION gives me great motivation to keep working for you You can support my mission for education by sharing this knowledge and helping as many people as you can If my work has helped you, consider helping any one near you, in any way you can.
Postman Beginner Tutorial 5 DELETE API Request
มุมมอง 893 หลายเดือนก่อน
Postman Beginner Tutorial 5 DELETE API Request Notes: How to add API Request Run and check Response #Postman #APITesting Every LIKE & SUBSCRIPTION gives me great motivation to keep working for you You can support my mission for education by sharing this knowledge and helping as many people as you can If my work has helped you, consider helping any one near you, in any way you can.
Postman Beginner Tutorial 4 _ PUT PATCH API Request
มุมมอง 1043 หลายเดือนก่อน
Postman Beginner Tutorial 4 _ PUT PATCH API Request Notes: How to add API Request Run and check Response #Postman #APITesting Every LIKE & SUBSCRIPTION gives me great motivation to keep working for you You can support my mission for education by sharing this knowledge and helping as many people as you can If my work has helped you, consider helping any one near you, in any way you can.
Postman Beginner Tutorial 3 POST API Request
มุมมอง 383 หลายเดือนก่อน
Postman Beginner Tutorial 3 POST API Request Notes: How to add API Request Run and check Response #Postman #APITesting Every LIKE & SUBSCRIPTION gives me great motivation to keep working for you You can support my mission for education by sharing this knowledge and helping as many people as you can If my work has helped you, consider helping any one near you, in any way you can.
Postman Beginner Tutorial 2 First API Request
มุมมอง 753 หลายเดือนก่อน
Postman Beginner Tutorial 2 First API Request
POSTMAN BEGINNER TUTORIAL 1 - Introduction | What is POSTMAN
มุมมอง 1423 หลายเดือนก่อน
POSTMAN BEGINNER TUTORIAL 1 - Introduction | What is POSTMAN
Types of honeypot|| Canary tokens|| Detecting honeypots
มุมมอง 1485 หลายเดือนก่อน
Types of honeypot|| Canary tokens|| Detecting honeypots
Burp Suite Complete Course Penetration Testing Burp Suite Complete Tutorials #cybersecurity
มุมมอง 6846 หลายเดือนก่อน
Burp Suite Complete Course Penetration Testing Burp Suite Complete Tutorials #cybersecurity
NMAP in Depth NMAP Complete Tutorial Beginner to Advance Cyber Security Learning
มุมมอง 4676 หลายเดือนก่อน
NMAP in Depth NMAP Complete Tutorial Beginner to Advance Cyber Security Learning
Wazuh Tutorial Wazuh Complete Guide For Beginners, Intro , Installation and configuration
มุมมอง 7546 หลายเดือนก่อน
Wazuh Tutorial Wazuh Complete Guide For Beginners, Intro , Installation and configuration
Complete Tutorial of Generative AI APIs for Practical Application #generativeai #ai #generativeai
มุมมอง 2987 หลายเดือนก่อน
Complete Tutorial of Generative AI APIs for Practical Application #generativeai #ai #generativeai
Complete Tutorial of SSCP; Risk Identification, Monitoring, and Analysis Cyber Security course
มุมมอง 5817 หลายเดือนก่อน
Complete Tutorial of SSCP; Risk Identification, Monitoring, and Analysis Cyber Security course
Session Hijacking Attack Complete Tutorial Session ID and Cookie Stealing Side Jacking
มุมมอง 2.1K7 หลายเดือนก่อน
Session Hijacking Attack Complete Tutorial Session ID and Cookie Stealing Side Jacking
Web Application Penetration Testing Tutorial Penetration Testing Tools #cybersecuritytraining
มุมมอง 13K7 หลายเดือนก่อน
Web Application Penetration Testing Tutorial Penetration Testing Tools #cybersecuritytraining
CyberArk Identity Admin Tutorial || Privileged Access Manager | CyberArk #cyberark #identity
มุมมอง 2757 หลายเดือนก่อน
CyberArk Identity Admin Tutorial || Privileged Access Manager | CyberArk #cyberark #identity
Tenable IO Complete Tutorial Of Vulnerability Management With AWS Azure and Web Application Scanning
มุมมอง 1.2K7 หลายเดือนก่อน
Tenable IO Complete Tutorial Of Vulnerability Management With AWS Azure and Web Application Scanning
Complete Tutorial Tenable SC Vulnerability Management Enabling with Web Application Scanning
มุมมอง 1.2K7 หลายเดือนก่อน
Complete Tutorial Tenable SC Vulnerability Management Enabling with Web Application Scanning
Complete Tutorial Tenable SC Vulnerability Management || Complete Course of Tenable Security Center
มุมมอง 2.9K7 หลายเดือนก่อน
Complete Tutorial Tenable SC Vulnerability Management || Complete Course of Tenable Security Center
MySQL Complete Tutorial || SQL - Complete Course in 3 Hours | SQL One Shot using MySQL
มุมมอง 2018 หลายเดือนก่อน
MySQL Complete Tutorial || SQL - Complete Course in 3 Hours | SQL One Shot using MySQL

ความคิดเห็น

  • @ajpresents5317
    @ajpresents5317 วันที่ผ่านมา

    Awesome course and if you add timestamps then it will be more beneficial and get more views❤

  • @ferd.6237
    @ferd.6237 10 วันที่ผ่านมา

    nice explain!

  • @yan_0028
    @yan_0028 12 วันที่ผ่านมา

    I agree with the previous reviewer, the images are quite difficult to see, even at "1080p". Good presentation, good voice. Wish you best success!

  • @mohammedramees333
    @mohammedramees333 19 วันที่ผ่านมา

    Is this Zero Day Vulnerability?

  • @TreadOnThis
    @TreadOnThis 25 วันที่ผ่านมา

    Keep getting handler failed to bind.. address already in use... Followed all steps.

  • @Druvakumararige
    @Druvakumararige 25 วันที่ผ่านมา

    WE can get material

  • @davidlu1003
    @davidlu1003 26 วันที่ผ่านมา

    I am here, too.😁😁😁💗💗💗

  • @carbonx11
    @carbonx11 หลายเดือนก่อน

    pretty sure this is not your video and rather you uploaded someone else's

  • @carbonx11
    @carbonx11 หลายเดือนก่อน

    where is the SQLi course I cant find it !!

  • @sumeshkp7180
    @sumeshkp7180 หลายเดือนก่อน

    Bro you are great. This means a lot. That's a lot of information for me . Thankyou

  • @MaxamuudAxmed-rr4fp
    @MaxamuudAxmed-rr4fp หลายเดือนก่อน

    where can find tools that u using in this course

    • @CyberTechnicalknowledge
      @CyberTechnicalknowledge หลายเดือนก่อน

      You can download from office website of trial version.

    • @CyberTechnicalknowledge
      @CyberTechnicalknowledge หลายเดือนก่อน

      You can download the software from their official website of trial version

  • @tharunthunagar5002
    @tharunthunagar5002 หลายเดือนก่อน

    can you please provide sql injection link, i can't find it

  • @leonmarienga3293
    @leonmarienga3293 หลายเดือนก่อน

    NEO was a hacker

  • @8anime_to723
    @8anime_to723 หลายเดือนก่อน

    This video is great

  • @adrienaraujo5918
    @adrienaraujo5918 หลายเดือนก่อน

    hey man! you're really good just case d you have a course on Udemy? Let me know so you can buy your staff !! Super Great Video!!!!! Best

  • @HimalayanGypsy
    @HimalayanGypsy หลายเดือนก่อน

    Please refrain from using the background music. Thanks!

  • @cat...i_think
    @cat...i_think หลายเดือนก่อน

    Thank you

  • @ChrisSargent-f5j
    @ChrisSargent-f5j หลายเดือนก่อน

    Walker Edward Harris Linda Taylor Donna

  • @АлександрРусаков-в4с
    @АлександрРусаков-в4с หลายเดือนก่อน

    Lewis Ronald Thomas Larry Martin Betty

  • @ChrisSargent-f5j
    @ChrisSargent-f5j หลายเดือนก่อน

    Johnson Larry Thomas Amy Robinson Christopher

  • @Mary-le5db
    @Mary-le5db หลายเดือนก่อน

    Thank you for this excellent course but maybe change the background dark.

  • @javyhalt
    @javyhalt 2 หลายเดือนก่อน

    why in windows? 2:43 - 2:52 is repiting

    • @CyberTechnicalknowledge
      @CyberTechnicalknowledge 2 หลายเดือนก่อน

      I will check and fix this issue thank you for notifying

  • @redadea1483
    @redadea1483 2 หลายเดือนก่อน

    keyturion is good keylogger

  • @MISTYEYED.
    @MISTYEYED. 2 หลายเดือนก่อน

    Thank you

  • @novianindy887
    @novianindy887 2 หลายเดือนก่อน

    javascript in browsers cant execute powershell, fix your videos.

  • @razdingz
    @razdingz 2 หลายเดือนก่อน

    for you many beer today

  • @Avara_hu
    @Avara_hu 3 หลายเดือนก่อน

    00:03 High prevalence of serious security vulnerabilities in web applications 02:38 Highlighting the significant costs of a security breach 07:26 Attacks against web applications can lead to larger security risks beyond just the web app itself 09:53 Understanding web application conventions and query strings 14:34 Understanding the significance of HTTP verbs in request construction. 17:12 REST-based pattern and HTTP verbs are commonly used for APIs and can lead to vulnerabilities. 21:25 Browsers offer protections for users 23:38 Browsers protect users from invalid certificates by blocking access to the site. 28:04 Browsers are getting better at defending against XSS vulnerabilities. 30:19 Browsers have limitations in defending against certain cyber attacks. 34:44 Web application security incidents can have serious consequences. 36:57 Spidering in web application testing is crucial for reconnaissance and footprinting 41:00 Discovering sensitive information through spidering 43:10 Forced browsing helps in understanding application structure 47:16 Forced browsing involves brute forcing and making many requests to explore application paths 49:21 Forced browsing yields mostly negative results, but HTTP 200 results are interesting. 53:41 Web application vulnerability allows remote file retrieval. 55:53 Directory Traversal identification can provide useful insights on the underlying system 1:00:15 Nmap is conducting detailed scans to discover open ports, initiate OS detection, and run trace routes. 1:02:18 Discovering server fingerprinting and development artifacts 1:06:44 Web services and web applications are similar, but web services are not necessarily intended to be human readable. 1:08:52 Utilize self-documenting APIs for finding hidden features 1:13:24 Showdown tool can be used to find at-risk systems, like those vulnerable to SQL injection in Drupal 7. 1:15:37 Reconnaissance and footprinting are crucial for gathering information in web application penetration testing 1:20:02 Untrusted data sources in web application penetration testing 1:22:14 Attacker manipulation through routing and HTTP verbs 1:26:40 Fiddler is a useful HTTP proxy for testing web application security. 1:28:40 Demonstrating parameter tampering in web application testing. 1:32:56 Changing hidden form field values can lead to serious security vulnerabilities 1:35:04 Mass Assignment Attack 1:39:18 Cookie poisoning involves tampering with untrusted data in the form of cookies. 1:41:33 Cookie poisoning and Insecure Direct Object References 1:45:49 Changed someone else's name due to an insecure direct object reference risk 1:48:07 Verify identity independently and on the server to prevent data manipulation. 1:52:35 Validation of untrusted data is crucial to prevent system tampering. 1:54:49 Untrusted data reflection and potential system vulnerabilities 1:59:05 Explaining XSS attack using cookies 2:01:11 Explaining reflected cross-site scripting attack 2:05:26 Exploring cross-site scripting risk via DNS records 2:08:08 Defending against XSS attacks involves data validation and encoding for the right context. 2:12:33 Exploring XSS attacks and evasion techniques 2:14:40 Evasion techniques in Web Application Penetration Testing 2:18:49 Bypassing client side controls by registering directly to the server with modified data. 2:21:02 Client-side validation is important but can be circumvented easily 2:25:34 Importance of using Transport Layer Security for login forms 2:27:48 Using Fiddler script to intercept and modify HTTP traffic 2:32:03 CSRF attacks exploit authenticated users 2:34:04 Attackers can exploit the browser's automatic sending of valid cookies to make requests on behalf of the user. 2:38:37 Challenges in client-side attack detection 2:40:48 Antiforgery tokens are critical for protecting against CSRF attacks. 2:45:14 Password reset process required only username and birth date for verification. 2:47:21 Poor identity management examples in login process 2:51:43 Identity enumeration vulnerability demonstrated through password reset process 2:53:55 Website enumeration can lead to serious privacy violations. 2:58:14 Understanding login timing can reveal account existence. 3:00:19 Identity management plays a crucial role in cybersecurity 3:04:46 Email enumeration is a crucial risk to defend against 3:07:00 Timing analysis to determine account existence 3:11:09 Vulnerabilities in remember me implementation 3:13:19 Importance of access controls in preventing denial of service attacks 3:17:56 Prevent denial of service attacks by utilizing email-based password reset functionality 3:20:16 Handling multiple failed login attempts to prevent denial of service attacks 3:24:34 Understanding the nature of distributed denial of service attacks 3:26:42 DDOS attacks are volumetric and globally distributed 3:31:14 DDOS attacks using tool L and its impact on websites 3:33:23 DDoS attacks are easily executed using simple tools and can be highly impactful, often involving crowd-sourcing and utilizing botnets or cloud-based services. 3:38:34 DDOS attacks can target specific features of web applications to cause high overhead. 3:40:47 Understanding the impact of DDOS attacks on database queries 3:45:09 Identifying application behavior and information leakage 3:47:21 Improper error handling leading to SQL injection risk 3:51:46 Web application hashes and salts passwords for secure login process 3:53:50 Database leaked salts and shaan hashes can be cracked using software 3:58:21 Hashcat can compute hashes at incredibly high speeds 4:00:32 The importance of making password hashes slow 4:04:59 Unvalidated redirect and forward exploit the trust in a website's domain to serve malicious content. 4:07:09 Unvalidated redirects and forwards can lead to malicious actions. 4:11:38 Conducting a carefully crafted Google search exposes sensitive internal information on live production websites. 4:13:53 Rising importance of web services for connected devices 4:18:15 APIs behind rich client apps have unique security risks 4:20:16 Developers often neglect the ability to tamper with parameters, leading to incorrect assumptions about integrity. 4:24:35 Risks of depending on Internet services

  • @FemalesrunningParallelSessions
    @FemalesrunningParallelSessions 3 หลายเดือนก่อน

    Blasting music after

  • @augustofilipe5553
    @augustofilipe5553 3 หลายเดือนก่อน

    Thank your lerson today i think lerner very with your lerson .

  • @lucassalomon3144
    @lucassalomon3144 3 หลายเดือนก่อน

    Question in an environment where I would be trying to use the smb psexec exploit as in the 54min mark. How would I know the SMB USER, SMBPass and SMBDOMAIN?

  • @Gaurang-ly4rn
    @Gaurang-ly4rn 3 หลายเดือนก่อน

    can anyone tell who is the creator of this course?

  • @magueritemichima6818
    @magueritemichima6818 3 หลายเดือนก่อน

    good video but the quality of video aren't good , thank very much for the work

  • @saradhakannan
    @saradhakannan 3 หลายเดือนก่อน

    Do you have plan to add more videos in field of security?

  • @timmypatrick7555
    @timmypatrick7555 3 หลายเดือนก่อน

    If i was to pay for your help with hacking an account would that be possible..

  • @RaksmeyKoung-h7j
    @RaksmeyKoung-h7j 3 หลายเดือนก่อน

    Wow, really such a good channel. ❤🎉 Why is this channel not popular?

  • @patrickchan2503
    @patrickchan2503 3 หลายเดือนก่อน

    this is good thanks but it doesn't talk much about evading honeypots...

  • @jeanoliveira9549
    @jeanoliveira9549 3 หลายเดือนก่อน

    Amazing, I was browsing LinkedIn when I came across a vacancy that had tenable prerequisites, on TH-cam I found the video, do you have LinkedIn?

  • @MichaelMarketing101
    @MichaelMarketing101 3 หลายเดือนก่อน

    😊🎉🎉

  • @tejavarma2721
    @tejavarma2721 3 หลายเดือนก่อน

    Still can we create account to perform digital labs..? I have created an account and I can see the courses like cloudagent, container security but I dont see any digital labs. Please help me with that. Thanks

  • @tejavarma2721
    @tejavarma2721 3 หลายเดือนก่อน

    Excellent video

  • @aymanshaikh2481
    @aymanshaikh2481 3 หลายเดือนก่อน

    Can you pls provide the link for sql injection as I cannot find it

  • @gg0dW
    @gg0dW 4 หลายเดือนก่อน

    thanks!!

  • @IfunanyaObienu
    @IfunanyaObienu 4 หลายเดือนก่อน

    I am not able to create an account

  • @thef1233
    @thef1233 4 หลายเดือนก่อน

    Then why are you using generic hacker clips

  • @PenguinEnsured
    @PenguinEnsured 4 หลายเดือนก่อน

    I love the istock watermark 😂