top of page

VIDEOS

Are you interested in learning more about cyber security? Do you want to learn about the most common cyber-attacks and how to keep your home or business network safe from them? If you want to learn and be more educated about cybersecurity fundamentals, then please subscribe to my channel, and I promise you'll have a great time!  Subscribe >

radio hacking with a master hacker
42:20

radio hacking with a master hacker

SW defined Radio is the new uprising vector of attack due to accessibility to the general public. So many applications in our modern life use radio frequency elements that is hard to list them all (Automobile, mouse & keyboards, cellphone signals, remote control, satellite transmission, police and encrypted military communication, drone control and etc...) these signals can be captured, converted to digital and then manipulated and transmitted back as attacks. Don't miss my discussion with master hacker #OccupyTheWeb to learn more about SW defined Radio Disclaimer: The opinions expressed by Occupy The Web in this interview are his own. This channel is not promoting illegal activity and, all contents provided by this channel is meant for educational purpose only! CHAPTERS 0:00 - 0:37 Coming up...... 0:38 - 0:50 Channel Introduction video 0:51 - 5:16 Idea behind SW defined Radio (SDR) 5:17 - 14:10 Radio Hacking overview 14:11 - 27:24 Demo of Tools and websites for SDR 27:25 - 39:21 Skills required to operate SDR and required tech to use 39:22 - 41:24 Zero flipper for hackers 41:25 - 42:20 Thank you OccupyTheWeb Books - Affiliate links: 1. Become a master Hacker - https://amzn.to/3Eq6vX4 2. NEW BOOK - Network basics for hackers - https://amzn.to/3YNd1iz 3. Linux Basics for Hackers - https://amzn.to/3Sdoh5i Hackers-Arise Classes: https://www.hackers-arise.com/three-levels-of-training 1. RTL-SDR (Receiver) - https://amzn.to/3yVAfYE 2. Hacker RF One (Receiver + Transmitter) - https://amzn.to/3Jy5A8G 3. Ethos B200 (Receiver + Transmitter) - https://amzn.to/3nbp0bI 4. Lime SDR (Receiver + Transmitter) - https://amzn.to/3LKeKBP Watch more cyber security fundamental videos 1. Stuxnet - https://youtu.be/fLwLRvp1YFA 2. Flame - https://youtu.be/GllYYwosJX8 3. Duqu - https://youtu.be/bSp926XdHK4 4. API Hacking - https://youtu.be/1t5wXWFI0yU 5. DNS Hacking - https://youtu.be/Hsj_67RhNMc 6. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 7. NotPetya - https://youtu.be/6gqKkTf9fWY 8. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 9. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 10. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #occupytheweb #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
software defined radio hacking | Trailer
00:36

software defined radio hacking | Trailer

Hi Everyone, This is a trailer of my discussion with Master Hacker OccupyTheWeb on Radio hacking. coming out on Wednesday, March 22nd. OccupyTheWeb Books - Affiliate links: 1. Become a master Hacker - https://amzn.to/3Eq6vX4 2. NEW BOOK - Network basics for hackers - https://amzn.to/3YNd1iz 3. Linux Basics for Hackers - https://amzn.to/3Sdoh5i Hackers-Arise Classes: https://www.hackers-arise.com/three-levels-of-training Watch more cyber security fundamental videos 1. Stuxnet - https://youtu.be/fLwLRvp1YFA 2. Flame - https://youtu.be/GllYYwosJX8 3. Duqu - https://youtu.be/bSp926XdHK4 4. API Hacking - https://youtu.be/1t5wXWFI0yU 5. DNS Hacking - https://youtu.be/Hsj_67RhNMc 6. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 7. NotPetya - https://youtu.be/6gqKkTf9fWY 8. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 9. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 10. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #occupytheweb #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
hacking access control systems
21:04

hacking access control systems

Hi Everyone, in this video I will speak and show how hackers accelerate their privileges and exploit access control systems. If you would like to learn more about access control systems, understand the models/types, common vulnerabilities and ways to protect your org systems, this video is for you. Disclaimer - this is educational purpose video only. its done in a closed lab environment to demo and guide how to better protect your systems. Remember - hacking is illegal without permission !!! CHAPTERS 0:00 - 0:21 Opening 0:22 - 0:34 Introduction Video 0:35 - 2:22 A bit about myself and Agenda for Video 2:23 - 4:04 Major incidents related to broken access controls 4:05 - 9:19 What is access Control (Types, Models...) 9:20 - 12:19 Access control vulnerabilities 12:20 - 15:48 Hands-on Demo 15:49 - 18:00 Actions that organisations can take 18:01 - 21:04 The future Watch more cyber security hacking videos 1. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 2. Stuxnet - https://youtu.be/fLwLRvp1YFA 3. Flame - https://youtu.be/GllYYwosJX8 4. Duqu - https://youtu.be/bSp926XdHK4 5. API Hacking - https://youtu.be/1t5wXWFI0yU 6. DNS Hacking - https://youtu.be/Hsj_67RhNMc 7. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 8. NotPetya - https://youtu.be/6gqKkTf9fWY 9. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 10. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #accesscontrolsystem #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
hacking industrial control systems scada
42:38

hacking industrial control systems scada

Hi Everyone, This is my second interview with Master Hacker Occupy The Web. In this video we discuss the danger/impact of hacking industrial control systems (ICS) using SCADA (supervisory control and data acquisition), what's the diff between IT network and SCADA network, Vulnerabilities , Vectors of attacks and some Defense tips. Chapters: 0:00.- 1:02 Opening by OccupyTheWeb (OTW) 1:03 - 1:15 Channel Intro Video 1:16 - 7:25 OTW Books, Citizen of the world, agenda...... 7:26 - 36:55 What is SCADA/ICS? Diff between IT net and SCADA, Attack vectors, Method... 36:56 - 42:01 Hackers-raise 42:02 - 42:38 Summary OccupyTheWeb Books - Affiliate links in Amazon: 1. Become a master Hacker - https://amzn.to/3Eq6vX4 2. NEW BOOK - Network basics for hackers - https://amzn.to/3YNd1iz 3. Linux Basics for Hackers - https://amzn.to/3Sdoh5i Hackers-Arise classes: https://www.hackers-arise.com Watch more cyber security fundamental videos 1. How to become a master hacker (With OTW) - https://youtu.be/NE2_Id0I6UM 2. Stuxnet - https://youtu.be/fLwLRvp1YFA 3. Flame - https://youtu.be/GllYYwosJX8 4. Duqu - https://youtu.be/bSp926XdHK4 5. API Hacking - https://youtu.be/1t5wXWFI0yU 6. DNS Hacking - https://youtu.be/Hsj_67RhNMc 7. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 8. NotPetya - https://youtu.be/6gqKkTf9fWY 9. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 10. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #occupytheweb #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
how to become a master hacker
32:52

how to become a master hacker

Hi Everyone, in this episode you will get a unique view to one of the world's most famous hackers - #OccupyTheWeb (OTW). OTW is the nom de guerre of an information security researcher and forensic investigator with more than 20 years in the industry. He is a former university professor and used to train hackers at every branch of the US military and intelligence agencies. OTW and I will discuss his New book (Network basics for hackers), teaching classes at "hackers-arise", his main focus and activity these days, the threat landscape along with new and innovative methods and will finish with useful tips for people that seek to get into cybersecurity and hacking. CHAPTERS: 0:00 - 0:45 Opening 0:46 - 5:00 Who are you OccupyTheWeb (OTW)? 5:01 - 13:52 NEW BOOK - "Network Basics for Hackers" 13:53 - 18:52 Hackers Basics - OS, Networking, Programming 18:53 - 22:07 What is hackers-arise? 22:08 - 23:52 How to keep up to date in cybersecurity 23:53 - 29:00 Hacking Trends today 29:01 - 32:52 OTW summary OccupyTheWeb Books - Affiliate links: 1. Become a master Hacker - https://amzn.to/3Eq6vX4 2. NEW BOOK - Network basics for hackers - https://amzn.to/3YNd1iz 3. Linux Basics for Hackers - https://amzn.to/3Sdoh5i Hackers-Arise: https://www.hackers-arise.com Watch more cyber security fundamental videos 1. Stuxnet - https://youtu.be/fLwLRvp1YFA 2. Flame - https://youtu.be/GllYYwosJX8 3. Duqu - https://youtu.be/bSp926XdHK4 4. API Hacking - https://youtu.be/1t5wXWFI0yU 5. DNS Hacking - https://youtu.be/Hsj_67RhNMc 6. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 7. NotPetya - https://youtu.be/6gqKkTf9fWY 8. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 9. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 10. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #occupytheweb #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
5g security and evolving architectures
01:00:58

5g security and evolving architectures

Hi Everyone, in this insightful episode, I will be talking with Pramod Nair, one of the world's experts in 5G security and author of the book "Securing 5G and Evolving architectures". We will touch many topics such as evolution of mobile networks, introduction to 5G, security challenges, uses cases and deployment models, but also technology in general. So if you would like to learn more about 5G in general and cybersecurity specifically this video is for you!!! Enjoy CHAPTERS 0:00 - 0:45 Opening 0:46 - 0:55 Channel Intro 0:56 - 7:16 Pramod Nair introduction, evolution of mobile networks 7:17 - 13:58 What inspired you to write the book ? 13:59 - 31:47 What's new in 5G and what are the main security challenges 31:48 - 47:46 Use cases and Security threats (Infrastructure, AppSec, API....) 47:47 - 55:09 Future of 5G 55:10 - 1:00:58 Takeaways from the book and summary Link to buy the book: https://www.amazon.com/Securing-Evolving-Architectures-Pramod-Nair/dp/0137457936/ref=sr_1_1?crid=29LE58NALK3EK&keywords=securing+5g+and+evolving+networks&qid=1676449886&sprefix=securing+5g+and+evolving+networks%2Caps%2C233&sr=8-1&ufe=app_do%3Aamzn1.fos.006c50ae-5d4c-4777-9bc0-4513d670b6bc Watch more cyber security fundamental videos 1. Stuxnet - https://youtu.be/fLwLRvp1YFA 2. Flame - https://youtu.be/GllYYwosJX8 3. Duqu - https://youtu.be/bSp926XdHK4 4. API Hacking - https://youtu.be/1t5wXWFI0yU 5. DNS Hacking - https://youtu.be/Hsj_67RhNMc 6. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 7. NotPetya - https://youtu.be/6gqKkTf9fWY 8. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 9. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 10. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #5g #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
Israel and cyber security
15:51

Israel and cyber security

Hi Everyone, in this episode I will speak about what makes Israel a cybersecurity powerhouse and one of the top 5 nations in that space. I will undergo the main pillars that made Israel to be recognized as the "Startup Nation", its technology and innovation, human capital and risk taking culture along with its future in cybersecurity. Enjoy! Chapters: 0:00 - 0:21Opening 0:22 - 0:30 Channel introduction video 0:31 - 5:11History - The Beginning 5:12 - 7:53 Military and Intelligence 7:54 - 9:36 Risk taking mentality 9:37 - 10:42 Access to Capital (VCs) 10:43 - 13:17 Strong educational system (Human capital investment) 13:18 - 15:25 Future of Israel cybersecurity 15:26 - 15:50 Summary Watch more cyber security fundamental videos 1. Stuxnet - https://youtu.be/fLwLRvp1YFA 2. Flame - https://youtu.be/GllYYwosJX8 3. Duqu - https://youtu.be/bSp926XdHK4 4. API Hacking - https://youtu.be/1t5wXWFI0yU 5. DNS Hacking - https://youtu.be/Hsj_67RhNMc 6. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 7. NotPetya - https://youtu.be/6gqKkTf9fWY 8. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 9. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 10. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #israel #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews
how hackers bypass 2 step verification
16:59

how hackers bypass 2 step verification

Hi Everyone, in today's video I will explain how do hackers bypass 2FA/MFA? I will share the 4 most common methods used by hackers (Evilgnix2, Pass the cookie, SMS swapping and attack on Soft Tokens), along with ways to protect against it + my view about using 2FA/MFA as an addtional security layer to protect online accounts. Hope it will be insightful and interesting. Enjoy!!!!! Chapters: 0:00 - 0:18 Opening 0:19 - 2:17 Channel Intro Video 2:18 - 5:25 How 2FA/MFA works 5:26 - 5:36 4 Most common attack methods 5:37 - 8:21Evilgnix2 8:22 - 10:05 Pass the Cookie 10:06 - 10:50 SMS Swapping 10:51 - 12:46 Attack on Soft Tokens 12:47 - 15:13 How to protect yourself from 2FA bypass? 15:14 - 16:59 Conclusion Useful Links: 1. Jeff Warren on blog of bypassing MFA with pass the cookie - https://blog.netwrix.com/2022/11/29/bypassing-mfa-with-pass-the-cookie-attack/ 2. CISO perspective channel and blog - https://cisoperspective.com and YT https://www.youtube.com/@TheCISOPerspective/videos 3. Recommended Password Managers: (a) Nordpass - https://nordpass.com , (b) 1password - https://1password.com Watch more cyber security fundamental videos 1. API Hacking - https://youtu.be/1t5wXWFI0yU 2. DNS Hacking - https://youtu.be/Hsj_67RhNMc 3. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 4. Stuxnet - https://youtu.be/fLwLRvp1YFA 5. NotPetya - https://youtu.be/6gqKkTf9fWY 6. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 7. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 8. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #2fa #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews #cybersecuritytrainingforbeginners #cyberattack
Hacking business logic applications
12:24

Hacking business logic applications

Hi Everybody, Its Yaniv Hoffman here with a new topic and demonstration on how hackers can exploit application business logic and buy items with unintended prices, what developers should take in mind and how to overcome such vulnerabilities. Enjoy!!! Remember that hacking without permission is illegal, and purpose of today is for educational purpose only to raise awareness and help organisations and professionals close loop holes and overcome vulnerabilities in their systems CHAPTERS 0:00 - 0:24 Opening 0:25 - 0:34 Introduction video 0:35 - 3:12 Hacking Business logic apps 3:13 - 4:12 How does E-Commerce work? 4:13 - 5:20 How do hackers make purchases with unintended prices ? 5:21 - 7:10 Demo prerequisites 7:11 - 11:10 Hands-on Demo 11:11 - 12:10 How to prevent such types of vulnerabilities 12:11 - 12:24 Thank you Sources/Links: Researchers Hack - https://www.newscientist.com/article/mg21028095-600-hackers-trick-goods-out-of-online-shopping-sites/ Burpsuite external browser config - https://portswigger.net/burp/documentation/desktop/external-browser-config Portswigger registration - https://portswigger.net/users/register Portswigger lab access - https://portswigger.net/web-security/logic-flaws/examples/lab-logic-flaws-excessive-trust-in-client-side-controls Watch more cyber security fundamental videos 1. API Hacking - https://youtu.be/1t5wXWFI0yU 2. DNS Hacking - https://youtu.be/Hsj_67RhNMc 3. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 4. Stuxnet - https://youtu.be/fLwLRvp1YFA 5. NotPetya - https://youtu.be/6gqKkTf9fWY 6. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 7. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 8. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #hacking #webapplicationsecurity #yanivhoffman #burpsuite #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews #cybersecuritytrainingforbeginners #cyberattack
cybersecurity concerns with chatgpt
13:42

cybersecurity concerns with chatgpt

How ChatGPT is changing the way cybersecurity practitioners look at the potential of AI? Researchers have been able to leverage the program to unlock capabilities that could make life easier for both cybersecurity defenders and malicious hackers. in this video i will explain what is ChatGPT? what are the concerns and benefits for cybersecurity along with my interesting disucssion with ChatGPT Watch more cyber security fundamental videos 1. API Hacking - https://youtu.be/1t5wXWFI0yU 2. DNS Hacking - https://youtu.be/Hsj_67RhNMc 3. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 4. Stuxnet - https://youtu.be/fLwLRvp1YFA 5. NotPetya - https://youtu.be/6gqKkTf9fWY 6. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 7. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 8. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #chatgpt #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews #cybersecuritytrainingforbeginners #cyberattack
What to expect in cybersecurity today
31:31

What to expect in cybersecurity today

Hi Everybody, in this video I am having a talk with Prof. Anthony Lim about the state of cybersecurity today, the threat stage of global cyber attacks , future of the threat landscape, governance, people, technology and processes.Enjoy! About Prof. Anthony Lim Asia Pacific iconic pioneer information security (cybersecurity) and governance advocate, business leader, consultant, auditor, and instructor, with over 25 year's professional experience in various domains. Prof. Lim is a long-time well-known speaker and content-provider for many local, regional and international industry, business, government and academic conferences, workshops, committees, forums, executive roundtables and media (broadcast, internet, print). Interviewed often on national and regional TV news. Anthony Lim Linkedin profile - https://www.linkedin.com/in/anthonylsg/ Watch more cyber security fundamental videos 1. API Hacking - https://youtu.be/1t5wXWFI0yU 2. DNS Hacking - https://youtu.be/Hsj_67RhNMc 3. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 4. Stuxnet - https://youtu.be/fLwLRvp1YFA 5. NotPetya - https://youtu.be/6gqKkTf9fWY 6. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 7. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc 8. Getting started in cybersecurity https://youtu.be/7lXfKZbzpHA My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #cybersecurityfundamentals #informationtechnology #cybersecuritytools #cyberattacks #cybersecuritycertification #informationtechnology #infosec #informationtechnology #cybersecuritynews #cybersecuritytrainingforbeginners #cyberattack
transport layer security explained
16:08

transport layer security explained

It's absolutely everywhere, but what is TLS and where did it come from? how does it work? can it be hacked? what are the benefits and challenges ? In this video I explain the background behind this ubiquitous Internet security protocol along with many of the common questions about it. Chapters: 0:00 - 1:06 Opening 1:07 - 1:16 Intro Video 1:17 - 2:21 Brief history SSL/TLS 2:22 - 3:22 SSL/TLS world usage (Statistics) 3:23 - 5:22 What is TLS? 5:23 - 6:20 Main Goals of TLS 6:21 - 9:33 TLS Handshake explained 9:34 - 10:45 Importance of TLS 10:46 - 12:27 Hacking TLS, possible? 12:28 - 13:21 Does TLS can protect your website? 13:22 - 13:50 Benefits of TLS 13:51 - 15:40 Challenges of TLS 15:41 - 16:07 Conclusion Watch more cyber security fundamental videos 1. API Hacking - https://youtu.be/1t5wXWFI0yU 2. DNS Hacking - https://youtu.be/Hsj_67RhNMc 3. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 4. Stuxnet - https://youtu.be/fLwLRvp1YFA 5. NotPetya - https://youtu.be/6gqKkTf9fWY 6. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 7. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecuritytools #ssl #tls #cybersecuritycertification #informationtechnology #infosec #cybersecuritytrainingforbeginners #cybersecuritytools #rsa #sslcertificate
2023 cyber security getting started
58:18

2023 cyber security getting started

How do you get started in Cybersecurity in 2023? Big THANKS to @daniellowrie that shows us the way. What you should start with in cybersecurity? tips for choosing the right path, job interviews essentials, how to achieve your goals and objective? getting out of your comfort zone and much more in this exceptional video. Daniel Lowrie YT channel: https://www.youtube.com/channel/UC7hgvxOCLAFZRhDRbUSjAsw ITProTV YT Channel: https://www.youtube.com/@UC-8Ba047kFinfgp3sO53qcA CHAPTERS: 0:00 - 0:19 Opening 0:20 - 0:28 Introduction video 0:29 - 3:27 Im Daniel Lowrie 3:28 - 16:11 How to start a cybersecurity career 16:12 - 27:20 Cybersecurity Degree vs Certification 27:21 - 33:39 Best resources online for free 33:40 - 33:45 Be Yourself 33:46 - 43:21 Tips for choosing career path, job interview and growth 43:22 - 45:22 Keep doing what you are passionate about 45:23 - 47:11 Communication skill is important 47:12 - 52:26 The keys to become professional 52:27 - 57:24 How to step out of your comfort zone 57:25 - 58:17 Summary Watch more cyber security fundamental videos 1. API Hacking - https://youtu.be/1t5wXWFI0yU 2. DNS Hacking - https://youtu.be/Hsj_67RhNMc 3. How to Build a hacking Box - https://youtu.be/vnYmb6spw30 4. Stuxnet - https://youtu.be/fLwLRvp1YFA 5. NotPetya - https://youtu.be/6gqKkTf9fWY 6. Red Vs Blue teams in cybersecurity - https://youtu.be/vOhvvYtVi6w 7. OSINT - Open Intelligence tools - https://youtu.be/M038ST3OMDc My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning. Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: https://cutt.ly/YanivHoffman Thank you for being here! Stay Safe and Healthy, Yaniv Hoffman #cybersecurity #cybersecuritycertification #informationtechnology #infosec #cybersecuritytrainingforbeginners #cybersecuritytools
bottom of page