Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

...

Security Threats can be managed by Layer ( see OSI layers model )





Image Added



Youtube Sites tracking Security Threats


Introducing 44 cybersecurity YouTube channels:

1) Black Hills Information Security — Everything cybersecurity related.
2) The Cyber Mentor — Ethical hacking, web-application hacking, and tools.
3) The Hated One — Research that explains cybersecurity conceptions.
4) MalwareTechBlog — Cybersecurity and reverse engineering content.
5) John Hammond — Malware analysis, programming, and careers.
6) BlackPerl — Malware analysis, forensics and incident response.
7) Simply Cyber — Helps people with cybersecurity career development.
8) DEFCONConference — Everything from DEFCON cybersecurity event.
9) David Bombal — Everything cybersecurity related.
10) Offensive Security — Educational content and lab walkthroughs.
11) Day Cyberwox — Useful cloud security content and walkthroughs.
12) Security Weekly — Interviews with cybersecurity figures.
13) Computerphile — Covers basic concepts and techniques.
14) LiveOverflow — Involves hacking, write-up videos, and capture-the-flags.
15) Peter Yaworski — Web-application hacking tips and interviews.
16) Bugcrowd — Bug bounty methodology and interviews.
17) Z-winK University — Bug bounty education and demonstrations.
18) Professor Messer — Guides covering certifications.
19) Hak5 — General cybersecurity coverage.
20) Network Chuck — Everything cybersecurity related.
21) InfoSec Live — Everything from tutorials to interviews.
22) The PC Security Channel — Windows, malware news, and tutorials.
23) Infosec Institute — Cybersecurity awareness.
24) OWASP Foundation — Web-application security content.
25) SANS Offensive Operations — Technical cybersecurity videos.
26) Cyberspatial — Cybersecurity education and training.
27) Security Now — Cybercrime news, hacking and web-application security.
28) Pentester Academy TV — Discussions and demonstrating attacks.
29) STÖK — Videos on tools, vulnerability analysis, and methodology.
30) Cyrill Gössi — Extensive cryptography videos.
31) InsiderPHD — How to get started with bug bounty hunting.
32) The XSS Rat — Everything bounty hunting.
33) Outpost Gray — Cybersecurity career development.
34) 13Cubed — Videos on tools, forensics, and incident response.
35) Cyber CDH — Cybersecurity tools, tactics, and techniques.
36) Hack eXPlorer — General tutorials, tips, and techniques.
37) HackerSploit — Penetration testing, web-application hacking.
38) Nahamsec — Educational hacking and bug bounty videos.
39) Joe Collins — Everything Linux related, including tutorials and guides.
40) DC CyberSec — Generic cybersecurity coverage.
41) ITProTV — General cybersecurity coverage.
42) Black Hat — Technical cybersecurity conferences.
43) Null Byte — Cybersecurity for ethical hackers, and computer scientists.
44) IppSec — Labs and capture-the-flag tutorials, HackTheBox etc.






Potential Value Opportunities

...