- 123
- 25 903
TheTr3sor
āđāļāđāļēāļĢāđāļ§āļĄāđāļĄāļ·āđāļ 2 āđāļĄ.āļĒ. 2010
Hi and welcome to my TH-cam channel!
This TH-cam channel is focused on information security/Cyber-security.
I've graduated as an Computer Science engineer in 2009 from USTHBðĐðŋ.
I've done a post-grad degree in CS (Magister degree) in 2012.
I've been a full time university teacher since 2013, teaching infosec related courses:
- Pentesting,
- Cyber Security Analysis,
- Risk management.
As I've been uploading my courses to youtube for my students, it made me realize that I should continue on doing that and putting more content (mostly in english and/or french).
Right now, I'm documenting the journey through every path in TryHackMe, 1 video/week/
Follow me on this journey!
If you read til here, I wish you a happy week ï―Ąâ ââ âŋâ ââ ï―Ą
You can also find me on:
Twitter: Tr3s0r
This TH-cam channel is focused on information security/Cyber-security.
I've graduated as an Computer Science engineer in 2009 from USTHBðĐðŋ.
I've done a post-grad degree in CS (Magister degree) in 2012.
I've been a full time university teacher since 2013, teaching infosec related courses:
- Pentesting,
- Cyber Security Analysis,
- Risk management.
As I've been uploading my courses to youtube for my students, it made me realize that I should continue on doing that and putting more content (mostly in english and/or french).
Right now, I'm documenting the journey through every path in TryHackMe, 1 video/week/
Follow me on this journey!
If you read til here, I wish you a happy week ï―Ąâ ââ âŋâ ââ ï―Ą
You can also find me on:
Twitter: Tr3s0r
Architecture de sÃĐcuritÃĐ 1ÃĻre partie
Dans cette vidÃĐo on va voir ce qu'est une architecture de sÃĐcuritÃĐ, ses objectifs, et parler de diffÃĐrentes mÃĐthodes ou framework d'architecture (NIST CSF, OSA, SABSA, TOGAF).
RÃĐfÃĐrence :
- conexiam.com/fr/architecture-de-securite-sabsa-pour-larchitecture-dentreprise/
- conexiam.com/togaf-vs-sabsa/
- destcert.com/resources/domain-3-security-architecture-and-engineering/
- www.isaca.org/resources/isaca-journal/issues/2017/volume-4/enterprise-security-architecturea-top-down-approach
- www.linkedin.com/pulse/security-architecture-conceptual-framework-role-osa-bryan-zarnett-ywdie/
- learn.microsoft.com/en-us/azure/architecture/guide/security/security-start-here
- nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf
- www.opensecurityarchitecture.org/cms/index.php
- www.opensecurityarchitecture.org/cms/definitions/it-security-architecture
- www.theknowledgeacademy.com/blog/togaf-vs-sabsa/
- csf.tools/reference/nist-cybersecurity-framework/v2-0/
- fr.wikipedia.org/wiki/The_Open_Group_Architecture_Framework
RÃĐfÃĐrence :
- conexiam.com/fr/architecture-de-securite-sabsa-pour-larchitecture-dentreprise/
- conexiam.com/togaf-vs-sabsa/
- destcert.com/resources/domain-3-security-architecture-and-engineering/
- www.isaca.org/resources/isaca-journal/issues/2017/volume-4/enterprise-security-architecturea-top-down-approach
- www.linkedin.com/pulse/security-architecture-conceptual-framework-role-osa-bryan-zarnett-ywdie/
- learn.microsoft.com/en-us/azure/architecture/guide/security/security-start-here
- nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf
- www.opensecurityarchitecture.org/cms/index.php
- www.opensecurityarchitecture.org/cms/definitions/it-security-architecture
- www.theknowledgeacademy.com/blog/togaf-vs-sabsa/
- csf.tools/reference/nist-cybersecurity-framework/v2-0/
- fr.wikipedia.org/wiki/The_Open_Group_Architecture_Framework
āļĄāļļāļĄāļĄāļāļ: 98
āļ§āļĩāļāļĩāđāļ
Formation et sensibilisation des employÃĐs
āļĄāļļāļĄāļĄāļāļ 3612 āļāļąāđāļ§āđāļĄāļāļāļĩāđāļāđāļēāļāļĄāļē
RÃĐfÃĐrences : - www.crowdstrike.com/solutions/small-business/employee-cybersecurity-training-program/
Gestion des risques
āļĄāļļāļĄāļĄāļāļ 9621 āļāļąāđāļ§āđāļĄāļāļāļĩāđāļāđāļēāļāļĄāļē
La gestion des risques est un des ÃĐlÃĐments important pour le fonctionnement d'une organisation en rÃĐduisant le risque et ainsi s'assurer au mieux de la continuitÃĐ du business. On va parler de la gestion des risques Le cycle de gestion des risques (identification, analyse, ÃĐvaluation, traitement...) Et de diffÃĐrentes mÃĐthodologies pour la gestion de risques : (NIST SP 800-30, ISO 27005, OCTAVE, ...
Protocoles de communication
āļĄāļļāļĄāļĄāļāļ 178āļ§āļąāļāļāļĩāđāļāđāļēāļāļĄāļē
PrÃĐsentation d'un ensemble de protocoles de communications ainsi que les dÃĐtails de certaines attaques spÃĐcifiques à ces protocoles : - ARP - IP - ICMP - TCP - UDP - DNS 1er TP (17/10/2024) TCP/IP et TCPdump cheatsheet : sansorg.egnyte.com/dl/2BjQFec1dS
Gouvernance et ConformitÃĐ
āļĄāļļāļĄāļĄāļāļ 12614 āļ§āļąāļāļāļĩāđāļāđāļēāļāļĄāļē
Dans cette vidÃĐo on va parler de ce que sont la gouvernance et la conformitÃĐ. L'utilitÃĐ d'une bonne gouvernance. La difference entre ConformitÃĐ et Compliance. L'avantage et les dÃĐfis. la prÃĐsentation d'un ensemble rÃĐglementations et normes (RGPD, HIPAA, ISO27001, NIST SP 800-53, PCI-DSS, SOC 2) RÃĐferences : - www.cisa.gov/topics/cybersecurity-best-practices/cybersecurity-governance - www.okiok....
Posture de sÃĐcuritÃĐ
āļĄāļļāļĄāļĄāļāļ 22714 āļ§āļąāļāļāļĩāđāļāđāļēāļāļĄāļē
On retrouvera dans cette vidÃĐo ce qu'est une posture de sÃĐcuritÃĐ, Ã quoi elle sert, les composants d'une posture de sÃĐcuritÃĐ, Les bÃĐnÃĐfices d'une posture de sÃĐcuritÃĐ forte,... RÃĐferences : - NIST SP 800-128 - www.techtarget.com/searchsecurity/The-ultimate-guide-to-cybersecurity-planning-for-businesses - www.verizon.com/business/resources/reports/dbir/ - www.splunk.com/en_us/blog/learn/security-...
SÃĐcuritÃĐ informatique : TD 6 (Part 1)
āļĄāļļāļĄāļĄāļāļ 1916 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Module de sÃĐcuritÃĐ informatique, 1ÃĻre annÃĐe Master RSD sÃĐrie de TD 6. 13/04/2024
SÃĐcuritÃĐ informatique : TD 5 (Part 2)
āļĄāļļāļĄāļĄāļāļ 1576 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Module de sÃĐcuritÃĐ informatique, 1ÃĻre annÃĐe Master RSD sÃĐrie de TD 5. 13/04/2024
Cours SÃĐcuritÃĐ Informatique - ch 9 (Signature numÃĐrique)
āļĄāļļāļĄāļĄāļāļ 1376 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Dans ce cours on verra les ÃĐlÃĐments suivants: - la signature numÃĐrique - les PKI - les certificats X.509 13/04/2024
SÃĐcuritÃĐ informatique : Chapitre 7 (RSA)
āļĄāļļāļĄāļĄāļāļ 857 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Module de sÃĐcuritÃĐ informatique, 1ÃĻre annÃĐe Master RSD, Chapitre 7. 16/03/2024
SÃĐcuritÃĐ informatique : Chapitre 6
āļĄāļļāļĄāļĄāļāļ 977 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Module de sÃĐcuritÃĐ informatique, 1ÃĻre annÃĐe Master RSD, Chapitre 6. 16/03/2024
SÃĐcuritÃĐ informatique : TD 4
āļĄāļļāļĄāļĄāļāļ 2257 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Module de sÃĐcuritÃĐ informatique, 1ÃĻre annÃĐe Master RSD sÃĐrie de TD 4. 16/03/2024
SÃĐcuritÃĐ informatique : TD 2
āļĄāļļāļĄāļĄāļāļ 3387 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Module de sÃĐcuritÃĐ informatique, 1ÃĻre annÃĐe Master RSD sÃĐrie de TD 2. 09/03/2024
SÃĐcuritÃĐ informatique : Chapitre 3
āļĄāļļāļĄāļĄāļāļ 1187 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Module de sÃĐcuritÃĐ informatique, 1ÃĻre annÃĐe Master RSD, Chapitre 1. 09/03/2024
SÃĐcuritÃĐ informatique : TD 1
āļĄāļļāļĄāļĄāļāļ 1968 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Module de sÃĐcuritÃĐ informatique, 1ÃĻre annÃĐe Master RSD sÃĐrie de TD 1. 27/02/2024
SÃĐcuritÃĐ informatique : TD 0
āļĄāļļāļĄāļĄāļāļ 1508 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
SÃĐcuritÃĐ informatique : TD 0
SÃĐcuritÃĐ informatique : Chapitre 1
āļĄāļļāļĄāļĄāļāļ 4228 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
SÃĐcuritÃĐ informatique : Chapitre 1
OWASP Top 10 - Part 2
āļĄāļļāļĄāļĄāļāļ 589 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
OWASP Top 10 - Part 2
ohhhhhh OMG so boring
But how tf you got 11 numbers in latitude and longitude?
I clearly saw you coping
Tnx âĪ amazing
IntÃĐressant ;-)
Merci ð
Uploaded part 2
I will, this week
Merci pour ces explications.
De rien
Nice video good explanation brother I subscribed your channel keep making and educating people
Good job sis
Thanks ð
ððððð
THANKS for explaining the tags! Not sure why they don't mention it saved time otherwise scrolling through -help
You're welcome :)
hi you don't have a contact. So before anyone else asks i want to get in touch with you if you were up for mentoring/tutoring, through the CBBH and CPTS which ill start next month. pls let me know how to contact you or share your threema ID or mozail relay if your more comfortable sharing that. thanks!
Hi, you can contact me through my Twitter which is in the description box. However, I didn't do CBBH or CPTS yet, so I don't know if I'll be able to provide any value as of now.
thanks for the content!
Thanks ð
Interesting videos
Great video! Thank you for putting this together!
You're welcome. Thanks for watching ð
Nice ;)
Glad you liked it :)
âĻ ãpããrããoããmããoããsããmã
Can we do the same with sidi yahia ???
ððð
Nice, I hope it can't be abused e.g. python Format String to sideload with strings: f'{__import__("os").system("whoami")}fake search'
Superb and very useful
Thank you ð
Nice!
Thank you Panda ð
Love this!
Thank you ð