Join Our 2-Month Bug Bounty & Web Pentesting Training – Live Program | Register Now Limited Seats

Samcommunityin

Join Our 2-Month Bug Bounty & Web Pentesting Training – Live Program | Register Now Limited Seats

5 days ago - 23:22

Pentesting Training

Let Me Study

Pentesting Training

3 months ago - 28:37

Pivot to Offensive Security: Learn Red Team Skills with Hands-On Pen Testing Training

York University School of Continuing Studies

Pivot to Offensive Security: Learn Red Team Skills with Hands-On Pen Testing Training

1 month ago - 0:55

CompTIA Pentest+  Certification II Best Pentesting Training II Course info II CareerMaker Solutions

CareerMaker Solutions

CompTIA Pentest+ Certification II Best Pentesting Training II Course info II CareerMaker Solutions

2 years ago - 1:11

Etchical Hacking - Pentesting- Training CS VISOR

CS VISOR

Etchical Hacking - Pentesting- Training CS VISOR

1 year ago - 0:32

Red Team Pentesting Training - Client POC

Motasem Hamdan

Red Team Pentesting Training - Client POC

6 years ago - 16:43

Are we living in the golden age of pentesting training?

Pentest-Tools

Are we living in the golden age of pentesting training?

1 year ago - 2:38

Mobile pen-testing training series - Static Code Analysis

RedShift Cyber Security

Mobile pen-testing training series - Static Code Analysis

3 years ago - 9:46

Stay Ahead of the Game: Advanced Cyber Security and Pentesting Training for International Clients

SpidervellA Technologies

Stay Ahead of the Game: Advanced Cyber Security and Pentesting Training for International Clients

2 years ago - 1:38

Mobile pen-testing training series - Dynamic Analysis

RedShift Cyber Security

Mobile pen-testing training series - Dynamic Analysis

2 years ago - 25:46

CPENT- Certified Pentesting Training

Hackers University, APC Learning Solutions

CPENT- Certified Pentesting Training

2 years ago - 1:01

Unbelievable Beware of Fake Networks Stealing Your Personal Information | #shorts #cybersecurity

LordPrettyFlacko

Unbelievable Beware of Fake Networks Stealing Your Personal Information | #shorts #cybersecurity

1 year ago - 0:37

Free Web App Pen Testing Training!!!

BlakCyber BugBounty

Free Web App Pen Testing Training!!!

5 years ago - 2:42

5 Simple Hacks to Outsmart Cyber Hackers and Protect Your Data online video cutter com

LordPrettyFlacko

5 Simple Hacks to Outsmart Cyber Hackers and Protect Your Data online video cutter com

1 year ago - 0:36

AWS Pentesting Training Feedback - Cyber's Secret (August2023)

Cyber's Secret

AWS Pentesting Training Feedback - Cyber's Secret (August2023)

1 year ago - 0:48

Red Team and Linux Pentesting Training - HackInos Vulnhub Part 1

Motasem Hamdan

Red Team and Linux Pentesting Training - HackInos Vulnhub Part 1

6 years ago - 28:35

Mobile pen-testing training series - Mobile Appliance Testing Process

RedShift Cyber Security

Mobile pen-testing training series - Mobile Appliance Testing Process

3 years ago - 4:15

PenTesting Training Live Stream

fa sec

PenTesting Training Live Stream

Streamed 8 years ago - 48:06

PenTesting Training Live Stream

fa sec

PenTesting Training Live Stream

Streamed 8 years ago - 5:51

Ethical Hacking (Pentesting) Training - Turkish - 09 Sep 24 #cybertraining

CS VISOR

Ethical Hacking (Pentesting) Training - Turkish - 09 Sep 24 #cybertraining

1 year ago - 0:32

pentesting training

Raj Yadav

pentesting training

2 years ago - 0:37

CyberSecZ Free hacking tutorials, pen testing training, cyber security tips and many more Launching

Cyber SecZ

CyberSecZ Free hacking tutorials, pen testing training, cyber security tips and many more Launching

8 years ago - 1:40

Mobile pen-testing training series - Runtime Security

RedShift Cyber Security

Mobile pen-testing training series - Runtime Security

2 years ago - 3:22

PenTesting Training Live Stream

fa sec

PenTesting Training Live Stream

Streamed 8 years ago - 1:10:34

NETWORK PENTESTING TRAINING 2021 | Host Discovery Process and Techniques | Mentorship Program

InfoSecAddicts

NETWORK PENTESTING TRAINING 2021 | Host Discovery Process and Techniques | Mentorship Program

5 years ago - 27:02

DAY - 1 | TRIE DSA  - SEARCH LIKE A CODING WIZARD - 4 DAYS FREE BOOTCAMP

DevTown

DAY - 1 | TRIE DSA - SEARCH LIKE A CODING WIZARD - 4 DAYS FREE BOOTCAMP

-

Shocking Chinese Connection Are Your Electronics Spying on You |#shorts #cybersecurity #fyp #mindset

LordPrettyFlacko

Shocking Chinese Connection Are Your Electronics Spying on You |#shorts #cybersecurity #fyp #mindset

1 year ago - 0:48

Full Hands-On Ethical Hacking Course with Kali Linux for Beginners Step-by-Step | Cyber Security

Sunny Dimalu The Cyborg

Full Hands-On Ethical Hacking Course with Kali Linux for Beginners Step-by-Step | Cyber Security

10 months ago - 3:35:21

Mobile pen-testing training series - Mobile Security Controls

RedShift Cyber Security

Mobile pen-testing training series - Mobile Security Controls

3 years ago - 13:39

Roadmap For Ethical Hacking and Pentesting for Beginners

CybowPoint

Roadmap For Ethical Hacking and Pentesting for Beginners

1 year ago - 32:03

BizComm Conversation: Pushing the Boundaries of Pentesting Skillset

Infosec In the City

BizComm Conversation: Pushing the Boundaries of Pentesting Skillset

3 years ago - 1:04:12

Understand how man-in-the-middle attacks pose a threat to your online security | #shorts #fyp

LordPrettyFlacko

Understand how man-in-the-middle attacks pose a threat to your online security | #shorts #fyp

1 year ago - 0:33

How I would Start Learning Penetration Testing Today [Hands-On Approach]

Cristi Vlad

How I would Start Learning Penetration Testing Today [Hands-On Approach]

3 years ago - 12:44

Etchical Hacking - Pentesting Training CS VISOR

CS VISOR

Etchical Hacking - Pentesting Training CS VISOR

11 months ago - 0:48

How to Get Pentesting and Appsec Clients [Unconventionally]

Cristi Vlad

How to Get Pentesting and Appsec Clients [Unconventionally]

2 years ago - 3:05

How to Learn Coding for Pentesting and Bug Hunting - feat @TCMSecurityAcademy

Cristi Vlad

How to Learn Coding for Pentesting and Bug Hunting - feat @TCMSecurityAcademy

5 years ago - 2:56

AI Taking Over Your (Cyber) Job - And What to Do

Cristi Vlad

AI Taking Over Your (Cyber) Job - And What to Do

4 years ago - 4:59

Principles of Security - Jr. Penetration Tester [Learning Path]

Cristi Vlad

Principles of Security - Jr. Penetration Tester [Learning Path]

3 years ago - 20:49

Penetration Testing (CISSP Free by Skillset.com)

Skillset

Penetration Testing (CISSP Free by Skillset.com)

9 years ago - 6:31

Pentesting AWS - IAM Enumeration [Cloud Security Essentials - #1]

Cristi Vlad

Pentesting AWS - IAM Enumeration [Cloud Security Essentials - #1]

4 years ago - 24:03

DevOps Full Course 2025 | DevOps Tutorial For Beginners | Intellipaat

Intellipaat

DevOps Full Course 2025 | DevOps Tutorial For Beginners | Intellipaat

-

How to be Extremely Efficient in Cyber and Life - The 80-20 Principle

Cristi Vlad

How to be Extremely Efficient in Cyber and Life - The 80-20 Principle

5 years ago - 4:40

Python Dictionaries Simplified - A Hands-On Tutorial

Cristi Vlad

Python Dictionaries Simplified - A Hands-On Tutorial

5 years ago - 8:06

RedShift Cyber Security

RedShift Cyber Security

@redshiftcybersecurity9046 subscribers

How to Hunt for Bugs on Amazon - AWS Pentesting

Cristi Vlad

How to Hunt for Bugs on Amazon - AWS Pentesting

4 years ago - 3:22

How to be a Top Bug Hunter and Cybersecurity Professional

Cristi Vlad

How to be a Top Bug Hunter and Cybersecurity Professional

4 years ago - 1:48

Realistic Pentesting - Exploiting a Misconfigured nginx Server

Cristi Vlad

Realistic Pentesting - Exploiting a Misconfigured nginx Server

5 years ago - 12:39

Pentesting AWS - Dangerous Policy Combination [Cloud Security Essentials - #4]

Cristi Vlad

Pentesting AWS - Dangerous Policy Combination [Cloud Security Essentials - #4]

4 years ago - 20:23

You Can’t Hack Them All - Master of One - From Noob to Clients

Cristi Vlad

You Can’t Hack Them All - Master of One - From Noob to Clients

2 years ago - 2:39

Red Teaming 101

Hackers To Founders

Red Teaming 101

7 months ago - 0:40

Command Injection - Part 1 - Jr. Penetration Tester [Learning Path]

Cristi Vlad

Command Injection - Part 1 - Jr. Penetration Tester [Learning Path]

3 years ago - 27:05

SQL Injection - Part 3 - Jr. Penetration Tester [Learning Path]

Cristi Vlad

SQL Injection - Part 3 - Jr. Penetration Tester [Learning Path]

3 years ago - 31:48

Practical Pentesting - How I Modify and Fire a Python RCE Exploit - AttackDefense Labs

Cristi Vlad

Practical Pentesting - How I Modify and Fire a Python RCE Exploit - AttackDefense Labs

6 years ago - 17:22

My Tips on Mobile Bug Hunting, API Security and Web Scanners

Cristi Vlad

My Tips on Mobile Bug Hunting, API Security and Web Scanners

5 years ago - 3:11

How I use Python to Modify Exploits

Cristi Vlad

How I use Python to Modify Exploits

5 years ago - 4:06

Practical Web Application Security - Part 21 - Open Redirect Defenses [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 21 - Open Redirect Defenses [Hacksplaining]

2 years ago - 12:11

SSRF Part 1 - Jr. Penetration Tester [Learning Path]

Cristi Vlad

SSRF Part 1 - Jr. Penetration Tester [Learning Path]

3 years ago - 22:42

How to Learn Coding for Pentesting and Bug Hunting - feat @TCMSecurityAcademy

Cristi Vlad

How to Learn Coding for Pentesting and Bug Hunting - feat @TCMSecurityAcademy

5 years ago - 2:56

Ultimate GraphQL Recon - A Tactical Approach

Cristi Vlad

Ultimate GraphQL Recon - A Tactical Approach

2 years ago - 5:09

How I Stay Motivated

Cristi Vlad

How I Stay Motivated

5 years ago - 2:04

The Most Frequent Vulnerabilities I Found in 80+ Pentests in 2022

Cristi Vlad

The Most Frequent Vulnerabilities I Found in 80+ Pentests in 2022

2 years ago - 3:43

OSEP | Offensive Security New | Offensive Security Expert Penetration Tester| PEN-300

Chakvi Mandeer

OSEP | Offensive Security New | Offensive Security Expert Penetration Tester| PEN-300

4 years ago - 4:33

The Top Stocks I Currently Invest In - A Peter Lynch Strategy

Cristi Vlad

The Top Stocks I Currently Invest In - A Peter Lynch Strategy

4 years ago - 4:30

Practical Pentesting - Basics of SQLite Recon - AttackDefense Labs

Cristi Vlad

Practical Pentesting - Basics of SQLite Recon - AttackDefense Labs

5 years ago - 15:29

Live! Hands-On Pentesting, Resources, and Q&A - #21

Cristi Vlad

Live! Hands-On Pentesting, Resources, and Q&A - #21

Streamed 4 years ago - 59:15

You can't be an Expert in Cybersecurity

Cristi Vlad

You can't be an Expert in Cybersecurity

5 years ago - 3:13

How to be a Real Hacker - In Cyber and Life

Cristi Vlad

How to be a Real Hacker - In Cyber and Life

4 years ago - 3:30

A Cybersecurity Professional’s Free Learning Resources - ft. @LoiLiangYang

Cristi Vlad

A Cybersecurity Professional’s Free Learning Resources - ft. @LoiLiangYang

5 years ago - 1:44

Automated Recon with Fast Tools in 2 Steps in under 2 Minutes

Cristi Vlad

Automated Recon with Fast Tools in 2 Steps in under 2 Minutes

4 years ago - 2:36

Finding Uncommon Vulnerabilities with Manual Testing - [A Pentester's Perspective]

Cristi Vlad

Finding Uncommon Vulnerabilities with Manual Testing - [A Pentester's Perspective]

3 years ago - 9:16

How to get Really Good at Bug Bounty Hunting

Cristi Vlad

How to get Really Good at Bug Bounty Hunting

4 years ago - 2:45

Live! Learning Python Loops and Exploiting Apache Misconfiguration

Cristi Vlad

Live! Learning Python Loops and Exploiting Apache Misconfiguration

Streamed 5 years ago - 1:04:42

Pentesting AWS - Exploiting Misconfigured Policies II [Cloud Security Essentials - #5]

Cristi Vlad

Pentesting AWS - Exploiting Misconfigured Policies II [Cloud Security Essentials - #5]

4 years ago - 15:07

Insights from my 55 Appsec Assessments and Pentests in 2022

Cristi Vlad

Insights from my 55 Appsec Assessments and Pentests in 2022

2 years ago - 3:31

From Hacker to Hero - The Exciting World of Cybersecurity Careers

Cristi Vlad

From Hacker to Hero - The Exciting World of Cybersecurity Careers

2 years ago - 6:53

Your Attention has been Hijacked - Get Back in Control

Cristi Vlad

Your Attention has been Hijacked - Get Back in Control

4 years ago - 4:01

PAID Services and Tools I use in Pentesting and Cyber Research

Cristi Vlad

PAID Services and Tools I use in Pentesting and Cyber Research

4 years ago - 3:54

OSCP vs. eLearnSecurity - Which to go For - feat @TCMSecurityAcademy

Cristi Vlad

OSCP vs. eLearnSecurity - Which to go For - feat @TCMSecurityAcademy

5 years ago - 2:23

Getting a Shell and Privilege Escalation - Hackademic_RTB1 - Part 2

Cristi Vlad

Getting a Shell and Privilege Escalation - Hackademic_RTB1 - Part 2

7 years ago - 20:30

Authentication Bypass - Jr. Penetration Tester [Learning Path]

Cristi Vlad

Authentication Bypass - Jr. Penetration Tester [Learning Path]

3 years ago - 29:54

Are You the Eternal Beginner Hacker? Do This!

Cristi Vlad

Are You the Eternal Beginner Hacker? Do This!

5 years ago - 2:35

Good Wordlists for Bug Bounty Hunting

Cristi Vlad

Good Wordlists for Bug Bounty Hunting

5 years ago - 2:03

Practical Pentesting - Hackme1 Vulnhub - Zero to Root Walkthrough

Cristi Vlad

Practical Pentesting - Hackme1 Vulnhub - Zero to Root Walkthrough

5 years ago - 30:10

AMA with HackTheBox - Pentesting, OSCP, Getting a Job, Bug Bounties and More

Cristi Vlad

AMA with HackTheBox - Pentesting, OSCP, Getting a Job, Bug Bounties and More

6 years ago - 54:29

XSS - Part 1 - Jr. Penetration Tester [Learning Path]

Cristi Vlad

XSS - Part 1 - Jr. Penetration Tester [Learning Path]

3 years ago - 23:14

You’ve Got Your OSCP! Now What? - feat @TCMSecurityAcademy

Cristi Vlad

You’ve Got Your OSCP! Now What? - feat @TCMSecurityAcademy

5 years ago - 2:38

Be part of My Closed Circle

Cristi Vlad

Be part of My Closed Circle

5 years ago - 1:24

From Practice Labs to Real Targets - [and No Bug Bounties]

Cristi Vlad

From Practice Labs to Real Targets - [and No Bug Bounties]

2 years ago - 1:48

Practical Web Application Security - Part 20 - Open Redirect Attacks [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 20 - Open Redirect Attacks [Hacksplaining]

2 years ago - 6:31

A Hacker's Toolkit for Web Penetration Testing - The Essentials

Cristi Vlad

A Hacker's Toolkit for Web Penetration Testing - The Essentials

5 years ago - 2:41

File Inclusion Part 1 - Jr. Penetration Tester [Learning Path]

Cristi Vlad

File Inclusion Part 1 - Jr. Penetration Tester [Learning Path]

3 years ago - 33:13

Top Tools for Penetration Testing Professionals - feat @TCMSecurityAcademy

Cristi Vlad

Top Tools for Penetration Testing Professionals - feat @TCMSecurityAcademy

5 years ago - 3:53

Practical Web Application Security - Part 9 - CSRF Defenses [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 9 - CSRF Defenses [Hacksplaining]

3 years ago - 13:28

Practical Web Application Security - Part 14 - DOM XSS Attacks [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 14 - DOM XSS Attacks [Hacksplaining]

3 years ago - 7:41

Kioptrix #4 Walkthrough - OSCP Prep - 5

Cristi Vlad

Kioptrix #4 Walkthrough - OSCP Prep - 5

6 years ago - 34:16

Practical Web Application Security - Part 27 - information Leakage Defenses [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 27 - information Leakage Defenses [Hacksplaining]

2 years ago - 13:52

Burp Suite - Part 10 - Intruder I - [Jr. Penetration Tester Path]

Cristi Vlad

Burp Suite - Part 10 - Intruder I - [Jr. Penetration Tester Path]

3 years ago - 15:03

Practical Web Application Security - Part 24 - User Enumeration Attacks [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 24 - User Enumeration Attacks [Hacksplaining]

2 years ago - 10:05

Hands-On Realistic Pentesting - How to Exploit JWT Vulnerabilities

Cristi Vlad

Hands-On Realistic Pentesting - How to Exploit JWT Vulnerabilities

5 years ago - 7:28

AlterAI is your Next-Level Personal AI - [Showcase]

Cristi Vlad

AlterAI is your Next-Level Personal AI - [Showcase]

4 years ago - 13:35

Practical Web Application Security - Part 15 - DOM XSS Defenses [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 15 - DOM XSS Defenses [Hacksplaining]

3 years ago - 12:33

Practical Pentesting - Extracting Sensitive Firmware Data - AttackDefense Labs

Cristi Vlad

Practical Pentesting - Extracting Sensitive Firmware Data - AttackDefense Labs

6 years ago - 12:31

Best Pentesting Tools, Getting an Infosec Job, Hard HTB Boxes - Cybertalk with HackerSploit

Cristi Vlad

Best Pentesting Tools, Getting an Infosec Job, Hard HTB Boxes - Cybertalk with HackerSploit

5 years ago - 36:15

How to Learn Coding for Penetration Testing

Cristi Vlad

How to Learn Coding for Penetration Testing

5 years ago - 6:40

Burp Suite - Part 12 - Intruder III - [Jr. Penetration Tester Path]

Cristi Vlad

Burp Suite - Part 12 - Intruder III - [Jr. Penetration Tester Path]

3 years ago - 14:09

Practical Web Application Security - Part 11 - Directory Traversal Attacks [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 11 - Directory Traversal Attacks [Hacksplaining]

3 years ago - 13:23

Realistic Pentesting with Netcat Like There's No Tomorrow

Cristi Vlad

Realistic Pentesting with Netcat Like There's No Tomorrow

5 years ago - 22:33

Live! On Pentesting, Bug Bounties and Growing Your Skills #11-#12

Cristi Vlad

Live! On Pentesting, Bug Bounties and Growing Your Skills #11-#12

Streamed 5 years ago - 55:29

AlterAI recommends books better than Amazon - [Here's How it Works]

Cristi Vlad

AlterAI recommends books better than Amazon - [Here's How it Works]

4 years ago - 21:51

Practical Pentesting - Extending Python Script for Bug Hunting

Cristi Vlad

Practical Pentesting - Extending Python Script for Bug Hunting

5 years ago - 16:38

Pentesting training with João Mota - VOID Software

MBU Office

Pentesting training with João Mota - VOID Software

4 years ago - 1:57:59

How to Use Cryptography in Cybersecurity

Cristi Vlad

How to Use Cryptography in Cybersecurity

5 years ago - 2:22

Live! Realistic Pentesting, Python, Bug Bounties and Q&A - #17

Cristi Vlad

Live! Realistic Pentesting, Python, Bug Bounties and Q&A - #17

Streamed 5 years ago - 2:11:54

Practical Pentesting - Testing Docker Registry Security - AttackDefense Labs

Cristi Vlad

Practical Pentesting - Testing Docker Registry Security - AttackDefense Labs

6 years ago - 11:26

How I use netcat for Getting Shells - Penetration Testing - OSCP Prep

Cristi Vlad

How I use netcat for Getting Shells - Penetration Testing - OSCP Prep

6 years ago - 15:01

How I use AI and Machine Learning in Cybersecurity - [feat GPT3]

Cristi Vlad

How I use AI and Machine Learning in Cybersecurity - [feat GPT3]

4 years ago - 27:16

AlterAI has just been Upgraded with OMNI - A Superpower

Cristi Vlad

AlterAI has just been Upgraded with OMNI - A Superpower

4 years ago - 27:27

If you don't learn Algorithms, You're Missing Out [Course Review]

Cristi Vlad

If you don't learn Algorithms, You're Missing Out [Course Review]

4 years ago - 15:11

Pentesting AWS - Misconfigured Trust Policy [Cloud Security Essentials - #2]

Cristi Vlad

Pentesting AWS - Misconfigured Trust Policy [Cloud Security Essentials - #2]

4 years ago - 9:40

Blocky HTB - Complete Walkthrough [Zero to Root]

Cristi Vlad

Blocky HTB - Complete Walkthrough [Zero to Root]

7 years ago - 35:28

Real World Application Security - How to Test with OWASP [Authentication II]

Cristi Vlad

Real World Application Security - How to Test with OWASP [Authentication II]

3 years ago - 18:13

3 Online Platforms where I Practice my Cybersecurity Skills

Cristi Vlad

3 Online Platforms where I Practice my Cybersecurity Skills

6 years ago - 7:53

Real World Application Security - How to Test with OWASP [Access Controls]

Cristi Vlad

Real World Application Security - How to Test with OWASP [Access Controls]

3 years ago - 18:47

Practical Web Application Security - Part 18 - Broken Access Controls Attacks [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 18 - Broken Access Controls Attacks [Hacksplaining]

3 years ago - 10:47

The Top 4 Tools a Mobile Malware Analyst Uses in Real Life

Cristi Vlad

The Top 4 Tools a Mobile Malware Analyst Uses in Real Life

5 years ago - 3:16

Artificial Intelligence and the Future of Bug Bounty Hunting

Cristi Vlad

Artificial Intelligence and the Future of Bug Bounty Hunting

5 years ago - 3:58

Practical Web Application Security - Part 2 - Cross-Site Scripting (XSS) Attacks [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 2 - Cross-Site Scripting (XSS) Attacks [Hacksplaining]

3 years ago - 9:28

The Story of a Bug Bounty Report - via Synack

Cristi Vlad

The Story of a Bug Bounty Report - via Synack

4 years ago - 5:07

Practical Web Application Security - Part 23 - Unencrypted Communication Defenses [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 23 - Unencrypted Communication Defenses [Hacksplaining]

2 years ago - 8:18

Live! Cyber Q&A and More - #22

Cristi Vlad

Live! Cyber Q&A and More - #22

Streamed 4 years ago - 1:14:33

What I Think of THM and AD Labs [And How I Learn Cyber in 2022]

Cristi Vlad

What I Think of THM and AD Labs [And How I Learn Cyber in 2022]

3 years ago - 15:05

Live! Pentesting Vulnerable Search Engine and Q&A

Cristi Vlad

Live! Pentesting Vulnerable Search Engine and Q&A

Streamed 5 years ago - 1:27:57

File Inclusion Part 2 - Jr. Penetration Tester [Learning Path]

Cristi Vlad

File Inclusion Part 2 - Jr. Penetration Tester [Learning Path]

3 years ago - 28:25

OWASP Top 10 for Bug Bounty Hunters - Think Again!

Cristi Vlad

OWASP Top 10 for Bug Bounty Hunters - Think Again!

5 years ago - 4:25

Pentesting AWS - Misconfigured S3 Buckets [Cloud Security Essentials - #6]

Cristi Vlad

Pentesting AWS - Misconfigured S3 Buckets [Cloud Security Essentials - #6]

3 years ago - 12:11

XSS - Part 2 - Jr. Penetration Tester [Learning Path]

Cristi Vlad

XSS - Part 2 - Jr. Penetration Tester [Learning Path]

3 years ago - 38:19

Top Tools Cybersecurity Professionals Use - feat @LoiLiangYang

Cristi Vlad

Top Tools Cybersecurity Professionals Use - feat @LoiLiangYang

5 years ago - 6:28

Kioptrix #1 Walkthrough - OSCP Prep - 2

Cristi Vlad

Kioptrix #1 Walkthrough - OSCP Prep - 2

6 years ago - 14:14

Quaoar Vulnhub - Complete Walkthrough [Penetration Testing]

Cristi Vlad

Quaoar Vulnhub - Complete Walkthrough [Penetration Testing]

7 years ago - 16:48

Practical Pentesting - How to do Memory Forensics with Volatility - AttackDefense Labs

Cristi Vlad

Practical Pentesting - How to do Memory Forensics with Volatility - AttackDefense Labs

6 years ago - 17:38

Top Bug Bounty Resources for Accelerated Learning

Cristi Vlad

Top Bug Bounty Resources for Accelerated Learning

4 years ago - 2:28

How to get a Job in Cybersecurity as a Beginner - A Modern Approach - feat @TCMSecurityAcademy

Cristi Vlad

How to get a Job in Cybersecurity as a Beginner - A Modern Approach - feat @TCMSecurityAcademy

5 years ago - 5:55

Hands-on Secure Code Review - Bypassing Regex for Command Execution

Cristi Vlad

Hands-on Secure Code Review - Bypassing Regex for Command Execution

3 years ago - 24:16

Command Injection - Part 2 - Jr. Penetration Tester [Learning Path]

Cristi Vlad

Command Injection - Part 2 - Jr. Penetration Tester [Learning Path]

3 years ago - 4:51

Practical Web Application Security - Part 13 - Reflected XSS Defenses [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 13 - Reflected XSS Defenses [Hacksplaining]

3 years ago - 10:58

The Best Way to Learn Python for Penetration Testing

Cristi Vlad

The Best Way to Learn Python for Penetration Testing

4 years ago - 3:21

Practical Web Application Security - Part 19 - Broken Access Controls Defenses [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 19 - Broken Access Controls Defenses [Hacksplaining]

3 years ago - 17:43

How I Got into Bug Bounty Hunting - My Journey so Far

Cristi Vlad

How I Got into Bug Bounty Hunting - My Journey so Far

5 years ago - 2:39

The Best Laptop for Hacking - Do you Really Need One?

Cristi Vlad

The Best Laptop for Hacking - Do you Really Need One?

5 years ago - 2:40

Python Penetration Testing - System Modules Explained (subprocess)

Cristi Vlad

Python Penetration Testing - System Modules Explained (subprocess)

6 years ago - 12:43

Practical Web Application Security - Part 10 - Directory Traversal Attacks [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 10 - Directory Traversal Attacks [Hacksplaining]

3 years ago - 6:53

The Less Known BOOKS you Must read NOW

Cristi Vlad

The Less Known BOOKS you Must read NOW

4 years ago - 8:19

Recon in Cybersecurity - Course

Cristi Vlad

Recon in Cybersecurity - Course

5 years ago - 1:13

How to Use Nmap as a Free Vulnerability Scanner [Powered by NSE]

Cristi Vlad

How to Use Nmap as a Free Vulnerability Scanner [Powered by NSE]

4 years ago - 4:25

Python Penetration Testing - System Modules Explained (sys)

Cristi Vlad

Python Penetration Testing - System Modules Explained (sys)

6 years ago - 11:24

Live! Hands-On Pentesting, Bounties and Cybersecurity Q&A - #15

Cristi Vlad

Live! Hands-On Pentesting, Bounties and Cybersecurity Q&A - #15

Streamed 5 years ago - 1:16:26

How to Build a Cybersecurity HomeLab Part III. Building a Metasploitable2 Virtual Machine

America CyberSquad ACS

How to Build a Cybersecurity HomeLab Part III. Building a Metasploitable2 Virtual Machine

6 months ago - 15:04