Join Our 2-Month Bug Bounty & Web Pentesting Training – Live Program | Register Now Limited Seats

Samcommunityin

Join Our 2-Month Bug Bounty & Web Pentesting Training – Live Program | Register Now Limited Seats

4 days ago - 23:22

Pentesting Training

Let Me Study

Pentesting Training

3 months ago - 28:37

Pivot to Offensive Security: Learn Red Team Skills with Hands-On Pen Testing Training

York University School of Continuing Studies

Pivot to Offensive Security: Learn Red Team Skills with Hands-On Pen Testing Training

1 month ago - 0:55

CompTIA Pentest+  Certification II Best Pentesting Training II Course info II CareerMaker Solutions

CareerMaker Solutions

CompTIA Pentest+ Certification II Best Pentesting Training II Course info II CareerMaker Solutions

2 years ago - 1:11

Etchical Hacking - Pentesting- Training CS VISOR

CS VISOR

Etchical Hacking - Pentesting- Training CS VISOR

1 year ago - 0:32

Red Team Pentesting Training - Client POC

Motasem Hamdan

Red Team Pentesting Training - Client POC

6 years ago - 16:43

Mobile pen-testing training series - Static Code Analysis

RedShift Cyber Security

Mobile pen-testing training series - Static Code Analysis

3 years ago - 9:46

Are we living in the golden age of pentesting training?

Pentest-Tools

Are we living in the golden age of pentesting training?

1 year ago - 2:38

CPENT- Certified Pentesting Training

Hackers University, APC Learning Solutions

CPENT- Certified Pentesting Training

2 years ago - 1:01

Stay Ahead of the Game: Advanced Cyber Security and Pentesting Training for International Clients

SpidervellA Technologies

Stay Ahead of the Game: Advanced Cyber Security and Pentesting Training for International Clients

2 years ago - 1:38

Mobile pen-testing training series - Dynamic Analysis

RedShift Cyber Security

Mobile pen-testing training series - Dynamic Analysis

2 years ago - 25:46

Free Web App Pen Testing Training!!!

BlakCyber BugBounty

Free Web App Pen Testing Training!!!

5 years ago - 2:42

Unbelievable Beware of Fake Networks Stealing Your Personal Information | #shorts #cybersecurity

LordPrettyFlacko

Unbelievable Beware of Fake Networks Stealing Your Personal Information | #shorts #cybersecurity

1 year ago - 0:37

5 Simple Hacks to Outsmart Cyber Hackers and Protect Your Data online video cutter com

LordPrettyFlacko

5 Simple Hacks to Outsmart Cyber Hackers and Protect Your Data online video cutter com

1 year ago - 0:36

AWS Pentesting Training Feedback - Cyber's Secret (August2023)

Cyber's Secret

AWS Pentesting Training Feedback - Cyber's Secret (August2023)

1 year ago - 0:48

Red Team and Linux Pentesting Training - HackInos Vulnhub Part 1

Motasem Hamdan

Red Team and Linux Pentesting Training - HackInos Vulnhub Part 1

6 years ago - 28:35

Mobile pen-testing training series - Mobile Appliance Testing Process

RedShift Cyber Security

Mobile pen-testing training series - Mobile Appliance Testing Process

3 years ago - 4:15

PenTesting Training Live Stream

fa sec

PenTesting Training Live Stream

Streamed 8 years ago - 48:06

PenTesting Training Live Stream

fa sec

PenTesting Training Live Stream

Streamed 8 years ago - 5:51

Mobile pen-testing training series - Introduction

RedShift Cyber Security

Mobile pen-testing training series - Introduction

3 years ago - 1:45

Full Hands-On Ethical Hacking Course with Kali Linux for Beginners Step-by-Step | Cyber Security

Sunny Dimalu The Cyborg

Full Hands-On Ethical Hacking Course with Kali Linux for Beginners Step-by-Step | Cyber Security

10 months ago - 3:35:21

AWS Pentesting Training Feedback - Cyber's Secret

Cyber's Secret

AWS Pentesting Training Feedback - Cyber's Secret

2 years ago - 1:01

Mobile pen-testing training series - Runtime Security

RedShift Cyber Security

Mobile pen-testing training series - Runtime Security

2 years ago - 3:22

pentesting training

Raj Yadav

pentesting training

2 years ago - 0:37

Ethical Hacking (Pentesting) Training - Turkish - 09 Sep 24 #cybertraining

CS VISOR

Ethical Hacking (Pentesting) Training - Turkish - 09 Sep 24 #cybertraining

1 year ago - 0:32

PenTesting Training Live Stream

fa sec

PenTesting Training Live Stream

Streamed 8 years ago - 1:10:34

NETWORK PENTESTING TRAINING 2021 | Host Discovery Process and Techniques | Mentorship Program

InfoSecAddicts

NETWORK PENTESTING TRAINING 2021 | Host Discovery Process and Techniques | Mentorship Program

5 years ago - 27:02

CyberSecZ Free hacking tutorials, pen testing training, cyber security tips and many more Launching

Cyber SecZ

CyberSecZ Free hacking tutorials, pen testing training, cyber security tips and many more Launching

8 years ago - 1:40

Mobile pen-testing training series - Mobile Security Controls

RedShift Cyber Security

Mobile pen-testing training series - Mobile Security Controls

3 years ago - 13:39

Roadmap For Ethical Hacking and Pentesting for Beginners

CybowPoint

Roadmap For Ethical Hacking and Pentesting for Beginners

1 year ago - 32:03

BizComm Conversation: Pushing the Boundaries of Pentesting Skillset

Infosec In the City

BizComm Conversation: Pushing the Boundaries of Pentesting Skillset

3 years ago - 1:04:12

Etchical Hacking - Pentesting Training CS VISOR

CS VISOR

Etchical Hacking - Pentesting Training CS VISOR

11 months ago - 0:48

Shocking Chinese Connection Are Your Electronics Spying on You |#shorts #cybersecurity #fyp #mindset

LordPrettyFlacko

Shocking Chinese Connection Are Your Electronics Spying on You |#shorts #cybersecurity #fyp #mindset

1 year ago - 0:48

How I would Start Learning Penetration Testing Today [Hands-On Approach]

Cristi Vlad

How I would Start Learning Penetration Testing Today [Hands-On Approach]

3 years ago - 12:44

SSRF Part 1 - Jr. Penetration Tester [Learning Path]

Cristi Vlad

SSRF Part 1 - Jr. Penetration Tester [Learning Path]

3 years ago - 22:42

AI Taking Over Your (Cyber) Job - And What to Do

Cristi Vlad

AI Taking Over Your (Cyber) Job - And What to Do

4 years ago - 4:59

Understand how man-in-the-middle attacks pose a threat to your online security | #shorts #fyp

LordPrettyFlacko

Understand how man-in-the-middle attacks pose a threat to your online security | #shorts #fyp

1 year ago - 0:33

Practical Pentesting - How I Modify and Fire a Python RCE Exploit - AttackDefense Labs

Cristi Vlad

Practical Pentesting - How I Modify and Fire a Python RCE Exploit - AttackDefense Labs

6 years ago - 17:22

Realistic Pentesting - Exploiting a Misconfigured nginx Server

Cristi Vlad

Realistic Pentesting - Exploiting a Misconfigured nginx Server

5 years ago - 12:39

Principles of Security - Jr. Penetration Tester [Learning Path]

Cristi Vlad

Principles of Security - Jr. Penetration Tester [Learning Path]

3 years ago - 20:49

How to Get Pentesting and Appsec Clients [Unconventionally]

Cristi Vlad

How to Get Pentesting and Appsec Clients [Unconventionally]

2 years ago - 3:05

How to Hunt for Bugs on Amazon - AWS Pentesting

Cristi Vlad

How to Hunt for Bugs on Amazon - AWS Pentesting

4 years ago - 3:22

Pentesting AWS - Dangerous Policy Combination [Cloud Security Essentials - #4]

Cristi Vlad

Pentesting AWS - Dangerous Policy Combination [Cloud Security Essentials - #4]

4 years ago - 20:23

How to be a Top Bug Hunter and Cybersecurity Professional

Cristi Vlad

How to be a Top Bug Hunter and Cybersecurity Professional

4 years ago - 1:48

Ultimate GraphQL Recon - A Tactical Approach

Cristi Vlad

Ultimate GraphQL Recon - A Tactical Approach

2 years ago - 5:09

How I use Python to Modify Exploits

Cristi Vlad

How I use Python to Modify Exploits

5 years ago - 4:06

OSEP | Offensive Security New | Offensive Security Expert Penetration Tester| PEN-300

Chakvi Mandeer

OSEP | Offensive Security New | Offensive Security Expert Penetration Tester| PEN-300

4 years ago - 4:33

The Top Stocks I Currently Invest In - A Peter Lynch Strategy

Cristi Vlad

The Top Stocks I Currently Invest In - A Peter Lynch Strategy

4 years ago - 4:30

You Can’t Hack Them All - Master of One - From Noob to Clients

Cristi Vlad

You Can’t Hack Them All - Master of One - From Noob to Clients

2 years ago - 2:39

Command Injection - Part 1 - Jr. Penetration Tester [Learning Path]

Cristi Vlad

Command Injection - Part 1 - Jr. Penetration Tester [Learning Path]

3 years ago - 27:05

SQL Injection - Part 3 - Jr. Penetration Tester [Learning Path]

Cristi Vlad

SQL Injection - Part 3 - Jr. Penetration Tester [Learning Path]

3 years ago - 31:48

My Tips on Mobile Bug Hunting, API Security and Web Scanners

Cristi Vlad

My Tips on Mobile Bug Hunting, API Security and Web Scanners

5 years ago - 3:11

Finding Uncommon Vulnerabilities with Manual Testing - [A Pentester's Perspective]

Cristi Vlad

Finding Uncommon Vulnerabilities with Manual Testing - [A Pentester's Perspective]

3 years ago - 9:16

From Hacker to Hero - The Exciting World of Cybersecurity Careers

Cristi Vlad

From Hacker to Hero - The Exciting World of Cybersecurity Careers

2 years ago - 6:53

Practical Web Application Security - Part 21 - Open Redirect Defenses [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 21 - Open Redirect Defenses [Hacksplaining]

2 years ago - 12:11

How to Learn Coding for Pentesting and Bug Hunting - feat @TCMSecurityAcademy

Cristi Vlad

How to Learn Coding for Pentesting and Bug Hunting - feat @TCMSecurityAcademy

5 years ago - 2:56

How I Stay Motivated

Cristi Vlad

How I Stay Motivated

5 years ago - 2:04

The Most Frequent Vulnerabilities I Found in 80+ Pentests in 2022

Cristi Vlad

The Most Frequent Vulnerabilities I Found in 80+ Pentests in 2022

2 years ago - 3:43

Live! Hands-On Pentesting, Resources, and Q&A - #21

Cristi Vlad

Live! Hands-On Pentesting, Resources, and Q&A - #21

Streamed 4 years ago - 59:15

AMA with HackTheBox - Pentesting, OSCP, Getting a Job, Bug Bounties and More

Cristi Vlad

AMA with HackTheBox - Pentesting, OSCP, Getting a Job, Bug Bounties and More

6 years ago - 54:29

Practical Pentesting - Basics of SQLite Recon - AttackDefense Labs

Cristi Vlad

Practical Pentesting - Basics of SQLite Recon - AttackDefense Labs

5 years ago - 15:29

You can't be an Expert in Cybersecurity

Cristi Vlad

You can't be an Expert in Cybersecurity

5 years ago - 3:13

How to be a Real Hacker - In Cyber and Life

Cristi Vlad

How to be a Real Hacker - In Cyber and Life

4 years ago - 3:30

A Cybersecurity Professional’s Free Learning Resources - ft. @LoiLiangYang

Cristi Vlad

A Cybersecurity Professional’s Free Learning Resources - ft. @LoiLiangYang

5 years ago - 1:44

Automated Recon with Fast Tools in 2 Steps in under 2 Minutes

Cristi Vlad

Automated Recon with Fast Tools in 2 Steps in under 2 Minutes

4 years ago - 2:36

How to get Really Good at Bug Bounty Hunting

Cristi Vlad

How to get Really Good at Bug Bounty Hunting

4 years ago - 2:45

Live! Learning Python Loops and Exploiting Apache Misconfiguration

Cristi Vlad

Live! Learning Python Loops and Exploiting Apache Misconfiguration

Streamed 5 years ago - 1:04:42

Pentesting AWS - Exploiting Misconfigured Policies II [Cloud Security Essentials - #5]

Cristi Vlad

Pentesting AWS - Exploiting Misconfigured Policies II [Cloud Security Essentials - #5]

4 years ago - 15:07

Insights from my 55 Appsec Assessments and Pentests in 2022

Cristi Vlad

Insights from my 55 Appsec Assessments and Pentests in 2022

2 years ago - 3:31

Tips for Penetration Testing APIs - [Mass Assignment]

Cristi Vlad

Tips for Penetration Testing APIs - [Mass Assignment]

3 years ago - 9:21

Your Attention has been Hijacked - Get Back in Control

Cristi Vlad

Your Attention has been Hijacked - Get Back in Control

4 years ago - 4:01

PAID Services and Tools I use in Pentesting and Cyber Research

Cristi Vlad

PAID Services and Tools I use in Pentesting and Cyber Research

4 years ago - 3:54

Getting a Shell and Privilege Escalation - Hackademic_RTB1 - Part 2

Cristi Vlad

Getting a Shell and Privilege Escalation - Hackademic_RTB1 - Part 2

7 years ago - 20:30

Are You the Eternal Beginner Hacker? Do This!

Cristi Vlad

Are You the Eternal Beginner Hacker? Do This!

5 years ago - 2:35

Good Wordlists for Bug Bounty Hunting

Cristi Vlad

Good Wordlists for Bug Bounty Hunting

5 years ago - 2:03

Practical Pentesting - Hackme1 Vulnhub - Zero to Root Walkthrough

Cristi Vlad

Practical Pentesting - Hackme1 Vulnhub - Zero to Root Walkthrough

5 years ago - 30:10

You’ve Got Your OSCP! Now What? - feat @TCMSecurityAcademy

Cristi Vlad

You’ve Got Your OSCP! Now What? - feat @TCMSecurityAcademy

5 years ago - 2:38

Be part of My Closed Circle

Cristi Vlad

Be part of My Closed Circle

5 years ago - 1:24

OSCP vs. eLearnSecurity - Which to go For - feat @TCMSecurityAcademy

Cristi Vlad

OSCP vs. eLearnSecurity - Which to go For - feat @TCMSecurityAcademy

5 years ago - 2:23

Practical Web Application Security - Part 20 - Open Redirect Attacks [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 20 - Open Redirect Attacks [Hacksplaining]

2 years ago - 6:31

A Hacker's Toolkit for Web Penetration Testing - The Essentials

Cristi Vlad

A Hacker's Toolkit for Web Penetration Testing - The Essentials

5 years ago - 2:41

Top Tools for Penetration Testing Professionals - feat @TCMSecurityAcademy

Cristi Vlad

Top Tools for Penetration Testing Professionals - feat @TCMSecurityAcademy

5 years ago - 3:53

Practical Web Application Security - Part 14 - DOM XSS Attacks [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 14 - DOM XSS Attacks [Hacksplaining]

3 years ago - 7:41

Kioptrix #4 Walkthrough - OSCP Prep - 5

Cristi Vlad

Kioptrix #4 Walkthrough - OSCP Prep - 5

6 years ago - 34:16

Practical Web Application Security - Part 27 - information Leakage Defenses [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 27 - information Leakage Defenses [Hacksplaining]

2 years ago - 13:52

Burp Suite - Part 10 - Intruder I - [Jr. Penetration Tester Path]

Cristi Vlad

Burp Suite - Part 10 - Intruder I - [Jr. Penetration Tester Path]

3 years ago - 15:03

Practical Web Application Security - Part 24 - User Enumeration Attacks [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 24 - User Enumeration Attacks [Hacksplaining]

2 years ago - 10:05

Hands-On Realistic Pentesting - How to Exploit JWT Vulnerabilities

Cristi Vlad

Hands-On Realistic Pentesting - How to Exploit JWT Vulnerabilities

5 years ago - 7:28

Practical Pentesting - Extracting Sensitive Firmware Data - AttackDefense Labs

Cristi Vlad

Practical Pentesting - Extracting Sensitive Firmware Data - AttackDefense Labs

6 years ago - 12:31

How to Learn Coding for Penetration Testing

Cristi Vlad

How to Learn Coding for Penetration Testing

5 years ago - 6:40

Burp Suite - Part 12 - Intruder III - [Jr. Penetration Tester Path]

Cristi Vlad

Burp Suite - Part 12 - Intruder III - [Jr. Penetration Tester Path]

3 years ago - 14:09

Practical Web Application Security - Part 11 - Directory Traversal Attacks [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 11 - Directory Traversal Attacks [Hacksplaining]

3 years ago - 13:23

AlterAI recommends books better than Amazon - [Here's How it Works]

Cristi Vlad

AlterAI recommends books better than Amazon - [Here's How it Works]

4 years ago - 21:51

Mobile vs. Web App Bug Bounty Hunting - feat Stephen Ogu

Cristi Vlad

Mobile vs. Web App Bug Bounty Hunting - feat Stephen Ogu

5 years ago - 2:24

Best Pentesting Tools, Getting an Infosec Job, Hard HTB Boxes - Cybertalk with HackerSploit

Cristi Vlad

Best Pentesting Tools, Getting an Infosec Job, Hard HTB Boxes - Cybertalk with HackerSploit

5 years ago - 36:15

Practical Pentesting - Extending Python Script for Bug Hunting

Cristi Vlad

Practical Pentesting - Extending Python Script for Bug Hunting

5 years ago - 16:38

How to Use Cryptography in Cybersecurity

Cristi Vlad

How to Use Cryptography in Cybersecurity

5 years ago - 2:22

Live! Realistic Pentesting, Python, Bug Bounties and Q&A - #17

Cristi Vlad

Live! Realistic Pentesting, Python, Bug Bounties and Q&A - #17

Streamed 5 years ago - 2:11:54

Practical Pentesting - Testing Docker Registry Security - AttackDefense Labs

Cristi Vlad

Practical Pentesting - Testing Docker Registry Security - AttackDefense Labs

6 years ago - 11:26

How I use netcat for Getting Shells - Penetration Testing - OSCP Prep

Cristi Vlad

How I use netcat for Getting Shells - Penetration Testing - OSCP Prep

6 years ago - 15:01

How I use AI and Machine Learning in Cybersecurity - [feat GPT3]

Cristi Vlad

How I use AI and Machine Learning in Cybersecurity - [feat GPT3]

4 years ago - 27:16

Pentesting AWS - Misconfigured Trust Policy [Cloud Security Essentials - #2]

Cristi Vlad

Pentesting AWS - Misconfigured Trust Policy [Cloud Security Essentials - #2]

4 years ago - 9:40

Blocky HTB - Complete Walkthrough [Zero to Root]

Cristi Vlad

Blocky HTB - Complete Walkthrough [Zero to Root]

7 years ago - 35:28

Real World Application Security - How to Test with OWASP [Authentication II]

Cristi Vlad

Real World Application Security - How to Test with OWASP [Authentication II]

3 years ago - 18:13

3 Online Platforms where I Practice my Cybersecurity Skills

Cristi Vlad

3 Online Platforms where I Practice my Cybersecurity Skills

6 years ago - 7:53

Real World Application Security - How to Test with OWASP [Access Controls]

Cristi Vlad

Real World Application Security - How to Test with OWASP [Access Controls]

3 years ago - 18:47

Practical Web Application Security - Part 18 - Broken Access Controls Attacks [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 18 - Broken Access Controls Attacks [Hacksplaining]

3 years ago - 10:47

The Top 4 Tools a Mobile Malware Analyst Uses in Real Life

Cristi Vlad

The Top 4 Tools a Mobile Malware Analyst Uses in Real Life

5 years ago - 3:16

Artificial Intelligence and the Future of Bug Bounty Hunting

Cristi Vlad

Artificial Intelligence and the Future of Bug Bounty Hunting

5 years ago - 3:58

The Story of a Bug Bounty Report - via Synack

Cristi Vlad

The Story of a Bug Bounty Report - via Synack

4 years ago - 5:07

Practical Web Application Security - Part 23 - Unencrypted Communication Defenses [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 23 - Unencrypted Communication Defenses [Hacksplaining]

2 years ago - 8:18

Live! Cyber Q&A and More - #22

Cristi Vlad

Live! Cyber Q&A and More - #22

Streamed 4 years ago - 1:14:33

What I Think of THM and AD Labs [And How I Learn Cyber in 2022]

Cristi Vlad

What I Think of THM and AD Labs [And How I Learn Cyber in 2022]

3 years ago - 15:05

Live! Pentesting Vulnerable Search Engine and Q&A

Cristi Vlad

Live! Pentesting Vulnerable Search Engine and Q&A

Streamed 5 years ago - 1:27:57

File Inclusion Part 2 - Jr. Penetration Tester [Learning Path]

Cristi Vlad

File Inclusion Part 2 - Jr. Penetration Tester [Learning Path]

3 years ago - 28:25

OWASP Top 10 for Bug Bounty Hunters - Think Again!

Cristi Vlad

OWASP Top 10 for Bug Bounty Hunters - Think Again!

5 years ago - 4:25

Pentesting AWS - Misconfigured S3 Buckets [Cloud Security Essentials - #6]

Cristi Vlad

Pentesting AWS - Misconfigured S3 Buckets [Cloud Security Essentials - #6]

3 years ago - 12:11

Command Injection - Part 2 - Jr. Penetration Tester [Learning Path]

Cristi Vlad

Command Injection - Part 2 - Jr. Penetration Tester [Learning Path]

3 years ago - 4:51

XSS - Part 2 - Jr. Penetration Tester [Learning Path]

Cristi Vlad

XSS - Part 2 - Jr. Penetration Tester [Learning Path]

3 years ago - 38:19

Top Tools Cybersecurity Professionals Use - feat @LoiLiangYang

Cristi Vlad

Top Tools Cybersecurity Professionals Use - feat @LoiLiangYang

5 years ago - 6:28

Kioptrix #1 Walkthrough - OSCP Prep - 2

Cristi Vlad

Kioptrix #1 Walkthrough - OSCP Prep - 2

6 years ago - 14:14

Quaoar Vulnhub - Complete Walkthrough [Penetration Testing]

Cristi Vlad

Quaoar Vulnhub - Complete Walkthrough [Penetration Testing]

7 years ago - 16:48

Top Bug Bounty Resources for Accelerated Learning

Cristi Vlad

Top Bug Bounty Resources for Accelerated Learning

4 years ago - 2:28

How to get a Job in Cybersecurity as a Beginner - A Modern Approach - feat @TCMSecurityAcademy

Cristi Vlad

How to get a Job in Cybersecurity as a Beginner - A Modern Approach - feat @TCMSecurityAcademy

5 years ago - 5:55

Hands-on Secure Code Review - Bypassing Regex for Command Execution

Cristi Vlad

Hands-on Secure Code Review - Bypassing Regex for Command Execution

3 years ago - 24:16

Ultimate GraphQL Recon - A Tactical Approach

Cristi Vlad

Ultimate GraphQL Recon - A Tactical Approach

2 years ago - 5:09

Practical Web Application Security - Part 13 - Reflected XSS Defenses [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 13 - Reflected XSS Defenses [Hacksplaining]

3 years ago - 10:58

The Best Way to Learn Python for Penetration Testing

Cristi Vlad

The Best Way to Learn Python for Penetration Testing

4 years ago - 3:21

Practical Web Application Security - Part 19 - Broken Access Controls Defenses [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 19 - Broken Access Controls Defenses [Hacksplaining]

3 years ago - 17:43

How I Got into Bug Bounty Hunting - My Journey so Far

Cristi Vlad

How I Got into Bug Bounty Hunting - My Journey so Far

5 years ago - 2:39

Pentesting AWS - Exploiting Misconfigured Policies II [Cloud Security Essentials - #5]

Cristi Vlad

Pentesting AWS - Exploiting Misconfigured Policies II [Cloud Security Essentials - #5]

4 years ago - 15:07

The Best Laptop for Hacking - Do you Really Need One?

Cristi Vlad

The Best Laptop for Hacking - Do you Really Need One?

5 years ago - 2:40

Python Penetration Testing - System Modules Explained (subprocess)

Cristi Vlad

Python Penetration Testing - System Modules Explained (subprocess)

6 years ago - 12:43

Practical Pentesting - How to do Memory Forensics with Volatility - AttackDefense Labs

Cristi Vlad

Practical Pentesting - How to do Memory Forensics with Volatility - AttackDefense Labs

6 years ago - 17:38

Practical Web Application Security - Part 10 - Directory Traversal Attacks [Hacksplaining]

Cristi Vlad

Practical Web Application Security - Part 10 - Directory Traversal Attacks [Hacksplaining]

3 years ago - 6:53

The Less Known BOOKS you Must read NOW

Cristi Vlad

The Less Known BOOKS you Must read NOW

4 years ago - 8:19

Recon in Cybersecurity - Course

Cristi Vlad

Recon in Cybersecurity - Course

5 years ago - 1:13

How to Use Nmap as a Free Vulnerability Scanner [Powered by NSE]

Cristi Vlad

How to Use Nmap as a Free Vulnerability Scanner [Powered by NSE]

4 years ago - 4:25

Python Penetration Testing - System Modules Explained (sys)

Cristi Vlad

Python Penetration Testing - System Modules Explained (sys)

6 years ago - 11:24

Live! Hands-On Pentesting, Bounties and Cybersecurity Q&A - #15

Cristi Vlad

Live! Hands-On Pentesting, Bounties and Cybersecurity Q&A - #15

Streamed 5 years ago - 1:16:26

How to Build a Cybersecurity HomeLab Part III. Building a Metasploitable2 Virtual Machine

America CyberSquad ACS

How to Build a Cybersecurity HomeLab Part III. Building a Metasploitable2 Virtual Machine

6 months ago - 15:04

The Bug Hunting Methodology - A Ready to Use Formula

Cristi Vlad

The Bug Hunting Methodology - A Ready to Use Formula

5 years ago - 5:59

A Day in The Life of a Cybersecurity Professional

Cristi Vlad

A Day in The Life of a Cybersecurity Professional

5 years ago - 2:53

Why IOT has Huge Attack Surface - Pentesters and Researchers Rejoice

Cristi Vlad

Why IOT has Huge Attack Surface - Pentesters and Researchers Rejoice

4 years ago - 11:34