Cyber Security News : Episode 1
Life Tech Mentor
Cyber Security News : Episode 1
31:16
Be a Smart Researcher using AI
Life Tech Mentor
Be a Smart Researcher using AI
17:28
Binary Exploitation - Session 1
Life Tech Mentor
Binary Exploitation - Session 1
3:10:39
Red Team Session - 1
Life Tech Mentor
Red Team Session - 1
1:47:56
Linux Basics - Part 2
Life Tech Mentor
Linux Basics - Part 2
34:17
Linux Basics - Part 1
Life Tech Mentor
Linux Basics - Part 1
1:03:44
Bandit Level 0-6
Life Tech Mentor
Bandit Level 0-6
24:20
Lets' Practice OSCP - Part 1
Life Tech Mentor
Lets' Practice OSCP - Part 1
49:34
Systems Thinking for Consultancy
Life Tech Mentor
Systems Thinking for Consultancy
1:46:29
Intro to API Security
Life Tech Mentor
Intro to API Security
1:14:01
Introduction to Consultancy
Life Tech Mentor
Introduction to Consultancy
1:31:46
DevOps Lectures - (Intro to Docker)
Life Tech Mentor
DevOps Lectures - (Intro to Docker)
1:20:09
Intro to Roam Research
Life Tech Mentor
Intro to Roam Research
55:48
How to do Research   Session 1
Life Tech Mentor
How to do Research Session 1
54:35
Let's Build a CTF Box (Intro)
Life Tech Mentor
Let's Build a CTF Box (Intro)
52:35
Memory Forensics
Life Tech Mentor
Memory Forensics
1:20:03
Life Tech Mentor Live Stream
Life Tech Mentor
Life Tech Mentor Live Stream
Memory Forensics - Practical
Life Tech Mentor
Memory Forensics - Practical
26:32
DevOps Introduction
Life Tech Mentor
DevOps Introduction
26:54
DevOps RoadMap
Life Tech Mentor
DevOps RoadMap
19:30
Logical Access Controls
Life Tech Mentor
Logical Access Controls
26:18
Malware Analysis - Intro
Life Tech Mentor
Malware Analysis - Intro
33:03
Machine Learning (Accuracy/Precision/Reall/F1/ROC)
Life Tech Mentor
Machine Learning (Accuracy/Precision/Reall/F1/ROC)
29:41
DevOps Series (Git Basics 1)
Life Tech Mentor
DevOps Series (Git Basics 1)
8:14
DevOps Series (Git Basics- part 2)
Life Tech Mentor
DevOps Series (Git Basics- part 2)
21:17
DevOps Series (Git Basics - Part 3)
Life Tech Mentor
DevOps Series (Git Basics - Part 3)
18:08
DevNet - Part 1
Life Tech Mentor
DevNet - Part 1
39:34
ROP - POP- RET (oops)
Life Tech Mentor
ROP - POP- RET (oops)
49:36
ROP Demo
Life Tech Mentor
ROP Demo
49:42
ROP   Ret2win
Life Tech Mentor
ROP Ret2win
35:33
Web Hacking (Bug Bounty) - Session 1 (Burp Intro)
Life Tech Mentor
Web Hacking (Bug Bounty) - Session 1 (Burp Intro)
52:56
Web Security (OWASP Juice Shop) - Session 1
Life Tech Mentor
Web Security (OWASP Juice Shop) - Session 1
1:08:39
CNN Intro
Life Tech Mentor
CNN Intro
1:15:39
The What, Why and How of Web Analytics Testing
Life Tech Mentor
The What, Why and How of Web Analytics Testing
43:34
Malware Analysis using Wireshark (Part 1)
Life Tech Mentor
Malware Analysis using Wireshark (Part 1)
28:09
Malware Analysis using Wireshark (Part 2)
Life Tech Mentor
Malware Analysis using Wireshark (Part 2)
34:33
Malware Analysis with Wireshark (Part-3)
Life Tech Mentor
Malware Analysis with Wireshark (Part-3)
40:34
Mitre Att&ck  Framework
Life Tech Mentor
Mitre Att&ck Framework
1:00:58
Fuzzing Intro
Life Tech Mentor
Fuzzing Intro
48:09
Interactive Dashboards  - Visualizations with R's HTMLwidgets and flex dashboards
Life Tech Mentor
Interactive Dashboards - Visualizations with R's HTMLwidgets and flex dashboards
46:48
Deep Learning 2019   Resnets from scratch; U net; Generative adversarial networks
Life Tech Mentor
Deep Learning 2019 Resnets from scratch; U net; Generative adversarial networks
2:12:07
Conducting Defensive Information Warfare on Open Platforms
Life Tech Mentor
Conducting Defensive Information Warfare on Open Platforms
57:44
Information Warfare in the 21st century
Life Tech Mentor
Information Warfare in the 21st century
46:18
Fly With SLIIT
Life Tech Mentor
Fly With SLIIT
7:50
Logical Access Exposures (Auditing)
Life Tech Mentor
Logical Access Exposures (Auditing)
30:35
(Information Auditing) Protection of Information  Assets   - Part 1
Life Tech Mentor
(Information Auditing) Protection of Information Assets - Part 1
29:08
Basic Data Analysis in RStudio
Life Tech Mentor
Basic Data Analysis in RStudio
25:56
Deep Learning- NLP (Movie Classification) - IMDB Reviews
Life Tech Mentor
Deep Learning- NLP (Movie Classification) - IMDB Reviews
1:06:17
Social Media Analytics using R (Youtube Data)
Life Tech Mentor
Social Media Analytics using R (Youtube Data)
42:48
Machine Learning- Building a simple NN using PyCharm
Life Tech Mentor
Machine Learning- Building a simple NN using PyCharm
1:02:05
DHCP Server Installation
Life Tech Mentor
DHCP Server Installation
16:55
An Introduction To Malware Analysis
Life Tech Mentor
An Introduction To Malware Analysis
40:31
Capture the Flag for Developers   AppSecUSA 2017
Life Tech Mentor
Capture the Flag for Developers AppSecUSA 2017
46:26
Format String Vulnerability - Part 2
Life Tech Mentor
Format String Vulnerability - Part 2
50:59
Format String Vulnerability - Part 1
Life Tech Mentor
Format String Vulnerability - Part 1
1:12:15
Loving Linux Processes
Life Tech Mentor
Loving Linux Processes
1:01:26
Assignment Discussion (Standard)
Life Tech Mentor
Assignment Discussion (Standard)
11:43
Dissecting a security audit   common issues and how to fix them
Life Tech Mentor
Dissecting a security audit common issues and how to fix them
21:17
IAA Mini Project
Life Tech Mentor
IAA Mini Project
5:24
Preparing for PCI DSS v3 0
Life Tech Mentor
Preparing for PCI DSS v3 0
56:36
iPython Magic Commands (%, %%)
Life Tech Mentor
iPython Magic Commands (%, %%)
20:11
Deep Analysis of Exploitable Linux Kernel Vulnerabilities 2017 2019   Tong Lin & Luhai Chen, Intel M
Life Tech Mentor
Deep Analysis of Exploitable Linux Kernel Vulnerabilities 2017 2019 Tong Lin & Luhai Chen, Intel M
44:05
Journey to the Cloud
Life Tech Mentor
Journey to the Cloud
40:13
Linux Exploitation Project
Life Tech Mentor
Linux Exploitation Project
16:27
Machine Learning - Project
Life Tech Mentor
Machine Learning - Project
12:47
Exploit Development - Project
Life Tech Mentor
Exploit Development - Project
26:11
ML- How to Save a Machine Learning Model using Pickle and Joblib
Life Tech Mentor
ML- How to Save a Machine Learning Model using Pickle and Joblib
25:15
Samba Sever Instllation
Life Tech Mentor
Samba Sever Instllation
17:32
Machine Learning Using PyCharm - Linear Regression with Multi Variables
Life Tech Mentor
Machine Learning Using PyCharm - Linear Regression with Multi Variables
28:27
ML-Linear Regression (Using PyCharm)
Life Tech Mentor
ML-Linear Regression (Using PyCharm)
41:26
Socket Programming - Session 3 (Evil Echo Server)
Life Tech Mentor
Socket Programming - Session 3 (Evil Echo Server)
48:42
Socket Programming- Echo Client - Server Using Python
Life Tech Mentor
Socket Programming- Echo Client - Server Using Python
29:51
Auditing - Lecture 2
Life Tech Mentor
Auditing - Lecture 2
47:54
Enterprise Standards - Intro
Life Tech Mentor
Enterprise Standards - Intro
27:02
Digital Marketing - Part 1
Life Tech Mentor
Digital Marketing - Part 1
43:14
Life-Tech Podcast - Episode 2 (Why? Tools? Perception? - Work From Home)
Life Tech Mentor
Life-Tech Podcast - Episode 2 (Why? Tools? Perception? - Work From Home)
17:42
Socket Programming - Intro- 1
Life Tech Mentor
Socket Programming - Intro- 1
37:00
ANS- Lec 1
Life Tech Mentor
ANS- Lec 1
27:57
Life-Tech Podcast - Episode 1 (Cyber Safety - Work From Home)
Life Tech Mentor
Life-Tech Podcast - Episode 1 (Cyber Safety - Work From Home)
22:13
Social Media Anlaytics - Part 1
Life Tech Mentor
Social Media Anlaytics - Part 1
19:41
Auditing - Part 1
Life Tech Mentor
Auditing - Part 1
25:19
Linux Intro
Life Tech Mentor
Linux Intro
33:02
Security in Open Source Software
Life Tech Mentor
Security in Open Source Software
15:40
Research Video 8
Life Tech Mentor
Research Video 8
10:05
Research Video 7
Life Tech Mentor
Research Video 7
15:46
Research Video 5
Life Tech Mentor
Research Video 5
9:28
Google Hacking
Life Tech Mentor
Google Hacking
11:06
Research Video 4
Life Tech Mentor
Research Video 4
11:45
Research Video 3
Life Tech Mentor
Research Video 3
9:35
Research Video 2
Life Tech Mentor
Research Video 2
9:22
Research Video
Life Tech Mentor
Research Video
11:40