- 59
- 38 773
Hansani Vihanga
Sri Lanka
เข้าร่วมเมื่อ 16 มิ.ย. 2012
#cybersecurity #research and #othervideos
Windows Registry for Digital Forensics
In this video, we dive deep into the Windows Registry and its crucial role in digital forensics. The Windows Registry holds a wealth of valuable information about system activity, user behavior, and system configuration, making it an essential resource for investigators. We’ll cover the structure of the registry and key areas to examine during a forensic investigation.
Whether you're a digital forensics professional, law enforcement officer, or someone interested in cybersecurity, this video provides practical insights into utilizing the Windows Registry for effective investigation.
Whether you're a digital forensics professional, law enforcement officer, or someone interested in cybersecurity, this video provides practical insights into utilizing the Windows Registry for effective investigation.
มุมมอง: 150
วีดีโอ
Understanding True Positive, True Negative, False Positive, False Negative, and BTP in Cybersecurity
มุมมอง 82หลายเดือนก่อน
Confused about terms like True Positive, False Positive, and False Negative in cybersecurity? In this video, we break down these key concepts with simple examples, helping you understand how security systems detect threats, avoid mistakes, and keep your devices safe.
Cyber Threat Intelligence 101: Why It’s Crucial for Your Security
มุมมอง 378หลายเดือนก่อน
Cyber threats are everywhere, but with the right knowledge, you can stay one step ahead. In this video, we’ll break down what Cyber Threat Intelligence (CTI) is and how it helps protect your data. We’ll talk about: What CTI is and why it’s so important. Types of CTI. How CTI works. Some of the platforms experts use in the field. Reference: www.recordedfuture.com/blog/threat-intelligence-lifecyc...
Email Header Analysis Demo
มุมมอง 1872 หลายเดือนก่อน
Email Header Analysis Demo explains how the Email Header is analyzed and what some of the important fields represent in the header. Sublime Text Plugin: github.com/13Cubed/EmailHeader/blob/master/EmailHeader.sublime-syntax IANA Message Header: www.iana.org/assignments/message-headers/message-headers.xhtml
How far does certifications help in your career? (Certifications vs. Skills)
มุมมอง 5352 หลายเดือนก่อน
In the video, 'How far does certifications help in your career; I dive deep into the debate between certifications and skill sets in shaping your career. While certifications can enhance your resume, are they really the key to success? We'll discuss: - The role of certifications in various industries - How hands-on experience and skills can outshine credentials Whether you’re starting your care...
My First Book - Taking a Stand | A tale of Cyber Bullying
มุมมอง 2762 หลายเดือนก่อน
Taking a Stand | A tale of Cyber Bullying is the first book I wrote. This is targeted for Children and has a story that makes them aware of what Cyber Bullying is and how two girls overcome a situation they have faced. Kindle Link: tinyurl.com/tscbhv Blurb: The new girl Ava quickly befriends Daisy, a popular student at school. But when jealous classmates spread harmful rumors online, Daisy’s on...
Email Header Analysis - An Introductory Video
มุมมอง 6007 หลายเดือนก่อน
In this Email Header Analysis, we will understand what an Email Header is, the purpose of the email, the flow of the email and the main fields that we must know to analyze an Email Header in detail.
MITRE ATT&CK Framework: Part 1
มุมมอง 199ปีที่แล้ว
This video is the Part 1 of my comprehensive series on the MITRE ATT&CK Framework! In this video, we are looking into the fundamentals, exploring what MITRE ATT&CK is and how it plays a pivotal role in understanding cyber threats. Stay tuned for upcoming episodes! Link to Mitre Attack Framework: attack.mitre.org/matrices/enterprise/
Mastering the Basics: Your path to Success in Cyber Security
มุมมอง 667ปีที่แล้ว
Mastering the Basics: Your path to Success in Cyber Security
Digital Forensic: Build your Forensic Workstation
มุมมอง 1.8Kปีที่แล้ว
Digital Forensic: Build your Forensic Workstation
A Day in life of a Cyber Security Analyst
มุมมอง 1.9Kปีที่แล้ว
A Day in life of a Cyber Security Analyst
5 OSINT Tools used by Information Security Professionals - Part 01
มุมมอง 962 ปีที่แล้ว
5 OSINT Tools used by Information Security Professionals - Part 01
Beginner - Valuable Skills to develop for Cyber Security
มุมมอง 7632 ปีที่แล้ว
Beginner - Valuable Skills to develop for Cyber Security
Digital Forensics : Report Writing and Presentation
มุมมอง 3K2 ปีที่แล้ว
Digital Forensics : Report Writing and Presentation
Digital Forensics : Acquisition and Processing DEMO
มุมมอง 5792 ปีที่แล้ว
Digital Forensics : Acquisition and Processing DEMO
Digital Forensics : Acquisition and Processing
มุมมอง 6K3 ปีที่แล้ว
Digital Forensics : Acquisition and Processing
Digital Forensics: Evidence Collection Process
มุมมอง 3.7K3 ปีที่แล้ว
Digital Forensics: Evidence Collection Process
Wireshark Basics with DEMO on capturing HTTP plaintext credentials
มุมมอง 8083 ปีที่แล้ว
Wireshark Basics with DEMO on capturing HTTP plaintext credentials
What is TCP 3-way handshake and SYN Flood attack?
มุมมอง 9973 ปีที่แล้ว
What is TCP 3-way handshake and SYN Flood attack?
How to write a Research Paper - Step by Step Guide
มุมมอง 2143 ปีที่แล้ว
How to write a Research Paper - Step by Step Guide
Great insight !
ohhh. Computer cop
Excellent work
🩷🩷🩷🩷
Welcome Back🎉
hindi please
hindi please
Great Job!!!
Great material, my digital forensics professor in a graduate course recommended one of your videos as actual reference material in one of the classes modules. You've done great work explaining the basic fundamentals of digital forensics and are putting out some awesome content. Great work!
Thank you so much for the encouraging words. Means alot. 😊
How to become a cyber security analyst fresher nd put video like roadmap to become cybersecurity analyst...sis
Hi, I'm doing a cybersecurity degree in APIIT😊😊😊😊
We need more like this video thank-you sharing your knowledge with us
Keep it 💪❤️
Thank you...❤
Thanks for sharing
Nice Knowledge...........
Agar sirf ethical hacking se career bnaya ja sakta h kya
2:48 smile caught me off guard 🙈 too much for infosec
Hope we can also grab an opportunity as you got...
This insight did help me. Thank you for sharing. 🎓
Wow that's so good can you add the purchasing details of that book... I really excited for it.
💐
Thanks
Would like to have a copy to Women In Need, Sri Lanka . Please let me know how we can purchase one. Thank you
Hi.. Thank you so much for reaching out. I would love to donate few books, will get in touch with you when I can provide them.
I read the book. It shows a great level of conceptualisation. Great video. Nice backdrop and good lighting. Looking forward to the next video soon.
Thank you so much for the encouraging words ☺🥰
Amazing 👏
Thank you so much 😊
❤
❤🥰
Great music! 🔥
woo such a amazing tutorial we can understand easily thanku so much provide knowledge
Good content... Keep doing.
Please make a series on digital forensics ❤
Great content 💯 Keep it up.
Really great explanation! And byw I have a question for you that's not related to this video. Do you happen to know about a payment gateway we can use from Sri Lanka?
u so beauttiful ar u on IG?
Nice
Thank you for sharing the knowledge ❤
Superb job
HELLO.... I REALLY LIKE YOUR WAY OF TEACHING I am a freelancer i can edit the videos for you if you want because i saw the editing is not that good if you are interested just answer me on this comment ...
Put some more videos please
♥
Akki what subjects did you do for A levels? Do i have to be pretty good at maths if i wanna major in cybersecurity...?
❤💐
❤
Unbelievable. Keep it up...!!
superb
Very Informative Tutorial. Thank you. 😍
Please also add mobile phone acquisition
Well done girly... Keep it up.. 🎉❤
you are so beautiful you gained a follower
Merry Christmas 🎄