Practical Academy
Secure Boot GRUB Hardening | STIGs You Should and Shouldn't Apply in AWS
5:53
Practical Academy
Burp Suite Web App Testing Lab | Manual Exploitation, Intruder Fuzzing & Session Analysis
1:30:27
Practical Academy
Disabling USB Password STIGs in AWS | Fix or Defer
5:12
Practical Academy
Mini Web Application Penetration Test Walkthrough, Findings, and Reporting
5:55
Practical Academy
Burp Suite Intruder Explained | Fuzzing Web Application Inputs
4:54
Practical Academy
Fixing High-Risk STIG Findings on Ubuntu 22.04 | Risk Prioritization & Remediation Evidence
12:13
Practical Academy
Introduction to Session Handling & Authentication Testing (Web App Pentesting)
5:28
Practical Academy
Tampering with Input Fields Parameters | Web Security Ethical Hacking Explained
5:47
Practical Academy
Burp Suite Basics | Intercepting and Understanding Web Traffic
7:56
Practical Academy
Secure Ubuntu File Permissions STIG Hardening for etc shadow Logs
6:20
Practical Academy
Manual Vulnerability Verification | Confirming Real Security Risks
6:54
Practical Academy
HTTP Request & Response Analysis: Security Headers Explained | Ethical Hacking Fundamentals
6:24
Practical Academy
Nikto + OWASP ZAP Tutorial | Finding & Exploiting Web Vulnerabilities (Week 4 Assignment)
59:46
Practical Academy
Automated Web Scanning with Nikto | Ethical Hacking Web Reconnaissance
7:07
Practical Academy
How to Create Your First Security Scorecard | STIG Findings Analysis & Remediation Tracking (Week 3)
6:39
Practical Academy
What Is Digital Forensics? | Foundations of Cyber Investigations & Evidence Analysis
9:05
Practical Academy
Network Scanning & Enumeration Explained | Nmap, PCAP Analysis, and Service Discovery (Lab)
1:25:03
Practical Academy
Introduction to Web Application Security | OWASP Top 10 Explained (Beginner-Friendly)
7:15
Practical Academy
OWASP ZAP Explained: Passive vs Active Scanning | Web Security Basics
6:50
Practical Academy
Week 2 Baseline Scan Walkthrough (Lynis + DISA STIG Viewer) | Build Your First CKL Audit Report
6:39
Practical Academy
Service Enumeration & Fingerprinting Explained | Ethical Hacking Reconnaissance
6:04
Practical Academy
Capturing & Analyzing Network Scans with Wireshark and tshark | Ethical Hacking Lab
6:11
Practical Academy
Firewall Exposure & Port Auditing in Linux | UFW, iptables, AWS Security Groups
5:35
Practical Academy
Web Reconnaissance & OSINT | Ethical Hacking Week 2 Lab Walkthrough
38:15
Practical Academy
Logging & Auditing in Ubuntu 22.04 | auditd, rsyslog & STIG Compliance
6:50
Practical Academy
Reconnaissance & Web Scanning Hands On Lab
33:00
Practical Academy
Nmap Scan Types Explained: TCP, SYN, Version & OS Detection
6:37
Practical Academy
Nmap Scan Timing Explained | Speed, Stealth, and Detection (Ethical Hacking)
5:52
Practical Academy
Authentication Hardening & Justified Exceptions | ISSO-Level Linux Security (STIGs & PAM)
6:27
Practical Academy
Risk Methodology Explained | Prioritizing STIG & Lynis Findings
6:29
Practical Academy
Network Scanning & Enumeration Explained | Nmap + Wireshark for Ethical Hacking
5:38
Practical Academy
Directory Discovery with Gobuster | Web Reconnaissance for Ethical Hacking
8:09
Practical Academy
Web Fingerprinting with WhatWeb | Ethical Hacking Reconnaissance Basics
4:40
Practical Academy
Kernel Hardening with sysctl | Secure Linux Kernel Configuration Ubuntu 22.04
6:41
Practical Academy
theHarvester Explained: OSINT Collection for Ethical Hacking
7:14
Practical Academy
Passive vs Active Reconnaissance Explained (Ethical Hacking)
7:12
Practical Academy
Turn Scan Results into Security Strategy | Ubuntu OS Hardening
6:15
Practical Academy
What Is OSINT? Open Source Intelligence for Ethical Hacking
6:42
Practical Academy
How Secure Is Your Ubuntu? Hardening with Lynis, STIG Viewer & CKL Files
6:45
Practical Academy
Web Vulnerability Scanning with Nikto (Ethical Hacking Basics)
7:56
Practical Academy
Operating System Hardening: STIGs, Lynis, & Secure Ubuntu 22.04 Setup
7:34
Practical Academy
Reconnaissance Scanning with Nmap (Ethical Hacking Basics)
8:10
Practical Academy
Penetration Testing Laws & Ethics: Consent, Scope, and the CFAA
6:39
Practical Academy
Types of Hackers Explained: White Hat vs Black Hat vs Grey Hat
8:33
Practical Academy
What Is Ethical Hacking? (White Hat and Black Hat Explained) NEW
10:13
Practical Academy
What Is Ethical Hacking? (White Hat Hacking & Penetration Testing Explained)
9:03