Corporate Espionage Investigation | SMB Packets Decryption | TryHackMe We covered a corporate espionage scenario where two two previous employees used their non-deactivated accounts to login into the company…
FREE Wireshark Mini Course | From Beginner to Advanced in Under 2 Hours In this mini course, we presented the popular packet analyzer Wireshark covering its GUI interface, navigation, packet analysis &…
How Password Spraying & ASREP Roasting Work in Windows Active Directory? We demonstrated how password spraying and ASREP roasing attacks work agaisnt Windows Active Directory. ASREP Roasting is an attack that…
Computer Forensics Tools | Kroll Artifact Parser and Extractor | TryHackMe KAPE We covered KAPE as a computer forensics tool to extract forensics artifacts and process them for forensics investigation. We also provided…
How To Become a Junior Security Analyst | TryHackMe Jr Security Analyst Intro We covered the role of Junior security operations center analyst, the responsibilities and the required skills and certifications. We also…
How to Become a Professional Blogger & YouTuber Alternate title: Creative steps to becoming a pro blogger
Incident Response in Cyber Security | Training Course In this video, we covered the incident response lifecycle with all its stages covered and explained. Incident response phases start with…
Free OSINT Mini Course | Learn OSINT in Under Two Hours In this OSINT mini course, I tried to cover the basic subjects of open source intelligence. This mini course is a curated and tailored…
Pyramid of Pain in Cybersecurity Explained Practically | TryHackMe Summit We covered a newly-released challenge, named Summit, into the SOC level 1 track in TryHackMe. The challenge wraps blue teamers and red…
Wireless Vulnerabilities in Practice | WPS Pixie-Dust Attack Explained We covered one of the most popular wireless vulnerabilities, that is, WPS feature. Most wireless attacks that target this feature focus on…
Incident Response in Cyber Security | Identification & Scoping Phase | TryHackMe We covered the second phase of incident response, that is, identification & scoping or detection phase. In the detection phase, the SOC…