- 140
- 29 875
TheTr3sor
āđāļāđāļēāļĢāđāļ§āļĄāđāļĄāļ·āđāļ 2 āđāļĄ.āļĒ. 2010
Hi and welcome to my TH-cam channel!
This TH-cam channel is focused on information security/Cyber-security.
I've graduated as an Computer Science engineer in 2009 from USTHBðĐðŋ.
I've done a post-grad degree in CS (Magister degree) in 2012.
I've been a full time university teacher since 2013, teaching infosec related courses:
- Pentesting,
- Cyber Security Analysis,
- Risk management.
As I've been uploading my courses to youtube for my students, it made me realize that I should continue on doing that and putting more content (mostly in english and/or french).
Right now, I'm documenting the journey through every path in TryHackMe, 1 video/week/
Follow me on this journey!
If you read til here, I wish you a happy week ï―Ąâ ââ âŋâ ââ ï―Ą
You can also find me on:
Twitter: Tr3s0r
This TH-cam channel is focused on information security/Cyber-security.
I've graduated as an Computer Science engineer in 2009 from USTHBðĐðŋ.
I've done a post-grad degree in CS (Magister degree) in 2012.
I've been a full time university teacher since 2013, teaching infosec related courses:
- Pentesting,
- Cyber Security Analysis,
- Risk management.
As I've been uploading my courses to youtube for my students, it made me realize that I should continue on doing that and putting more content (mostly in english and/or french).
Right now, I'm documenting the journey through every path in TryHackMe, 1 video/week/
Follow me on this journey!
If you read til here, I wish you a happy week ï―Ąâ ââ âŋâ ââ ï―Ą
You can also find me on:
Twitter: Tr3s0r
āļ§āļĩāļāļĩāđāļ
Cyber Kill Chain
āļĄāļļāļĄāļĄāļāļ 2512 āļāļąāđāļ§āđāļĄāļāļāļĩāđāļāđāļēāļāļĄāļē
Cyber Kill Chain
IngÃĐnierie de DÃĐtection
āļĄāļļāļĄāļĄāļāļ 2714 āļāļąāđāļ§āđāļĄāļāļāļĩāđāļāđāļēāļāļĄāļē
IngÃĐnierie de DÃĐtection
Principes d'architecture de sÃĐcuritÃĐ
āļĄāļļāļĄāļĄāļāļ 199āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
La conception d'une architecture de sÃĐcuritÃĐ doit prendre en compte de plusieurs principes, parmi eux : le principe du moindre privilÃĻge, la sÃĐcuritÃĐ par dÃĐfaut, l'ÃĐchec sÃĐcurisÃĐ, la responsabilitÃĐ partagÃĐe, etc. Nous allons voir dans cette vidÃĐo un ensemble de ces principes. RÃĐfÃĐrences : - aws.amazon.com/fr/compliance/shared-responsibility-model/ web.archive.org/web/20221020132403/ - www.ipc.o...
Zero Trust
āļĄāļļāļĄāļĄāļāļ 160āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Zero trust est une stratÃĐgie d'architecture de sÃĐcuritÃĐ qui prone entre autre la vÃĐrification et validation avant l'accÃĻs à quelque ressource qu'elle soit. Dans cette vidÃĐo, je vais prÃĐsenter le Zero Trust, ses principes, ses composants logiques vus dans le NIST SP 800-207, ses avantages et inconvÃĐnients, ainsi qu'une comparaison entre le ZT et la dÃĐfense en profondeur, et le ZT et le SASE. RÃĐf...
SASE - Secure Access Service Edge
āļĄāļļāļĄāļĄāļāļ 167āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
SASE - Secure Access Service Edge
DÃĐfense en profondeur
āļĄāļļāļĄāļĄāļāļ 1552 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
DÃĐfense en profondeur
Architecture de sÃĐcuritÃĐ 1ÃĻre partie
āļĄāļļāļĄāļĄāļāļ 3212 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Architecture de sÃĐcuritÃĐ 1ÃĻre partie
Formation et sensibilisation des employÃĐs
āļĄāļļāļĄāļĄāļāļ 1162 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Formation et sensibilisation des employÃĐs
Gestion des risques
āļĄāļļāļĄāļĄāļāļ 2232 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Gestion des risques
Protocoles de communication
āļĄāļļāļĄāļĄāļāļ 3012 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Protocoles de communication
Gouvernance et ConformitÃĐ
āļĄāļļāļĄāļĄāļāļ 2372 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Gouvernance et ConformitÃĐ
Posture de sÃĐcuritÃĐ
āļĄāļļāļĄāļĄāļāļ 3272 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Posture de sÃĐcuritÃĐ
SÃĐcuritÃĐ informatique : TD 6 (Part 1)
āļĄāļļāļĄāļĄāļāļ 2018 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
SÃĐcuritÃĐ informatique : TD 6 (Part 1)
SÃĐcuritÃĐ informatique : TD 5 (Part 2)
āļĄāļļāļĄāļĄāļāļ 1648 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
SÃĐcuritÃĐ informatique : TD 5 (Part 2)
Cours SÃĐcuritÃĐ Informatique - ch 9 (Signature numÃĐrique)
āļĄāļļāļĄāļĄāļāļ 1498 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
Cours SÃĐcuritÃĐ Informatique - ch 9 (Signature numÃĐrique)
SÃĐcuritÃĐ informatique : Chapitre 7 (RSA)
āļĄāļļāļĄāļĄāļāļ 909 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
SÃĐcuritÃĐ informatique : Chapitre 7 (RSA)
SÃĐcuritÃĐ informatique : Chapitre 6
āļĄāļļāļĄāļĄāļāļ 989 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
SÃĐcuritÃĐ informatique : Chapitre 6
SÃĐcuritÃĐ informatique : TD 4
āļĄāļļāļĄāļĄāļāļ 2349 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
SÃĐcuritÃĐ informatique : TD 4
SÃĐcuritÃĐ informatique : TD 2
āļĄāļļāļĄāļĄāļāļ 3509 āļŦāļĨāļēāļĒāđāļāļ·āļāļāļāđāļāļ
SÃĐcuritÃĐ informatique : TD 2
Merci pour ces explications trÃĻs intÃĐressantes #bestteacher
Merci beaucoup! ð
ohhhhhh OMG so boring
But how tf you got 11 numbers in latitude and longitude?
I clearly saw you coping
Tnx âĪ amazing
IntÃĐressant ;-)
Merci ð
Uploaded part 2
I will, this week
Merci pour ces explications.
De rien
Nice video good explanation brother I subscribed your channel keep making and educating people
Good job sis
Thanks ð
ððððð
THANKS for explaining the tags! Not sure why they don't mention it saved time otherwise scrolling through -help
You're welcome :)
hi you don't have a contact. So before anyone else asks i want to get in touch with you if you were up for mentoring/tutoring, through the CBBH and CPTS which ill start next month. pls let me know how to contact you or share your threema ID or mozail relay if your more comfortable sharing that. thanks!
Hi, you can contact me through my Twitter which is in the description box. However, I didn't do CBBH or CPTS yet, so I don't know if I'll be able to provide any value as of now.
thanks for the content!
Thanks ð
Interesting videos
Great video! Thank you for putting this together!
You're welcome. Thanks for watching ð
Nice ;)
Glad you liked it :)
âĻ ãpããrããoããmããoããsããmã
Can we do the same with sidi yahia ???
ððð
Nice, I hope it can't be abused e.g. python Format String to sideload with strings: f'{__import__("os").system("whoami")}fake search'
Superb and very useful
Thank you ð
Nice!
Thank you Panda ð
Love this!
Thank you ð