Secure Boot GRUB Hardening | STIGs You Should and Shouldn't Apply in AWS
Practical Academy
Secure Boot GRUB Hardening | STIGs You Should and Shouldn't Apply in AWS
5:53
Burp Suite Web App Testing Lab | Manual Exploitation, Intruder Fuzzing & Session Analysis
Practical Academy
Burp Suite Web App Testing Lab | Manual Exploitation, Intruder Fuzzing & Session Analysis
1:30:27
Disabling USB Password STIGs in AWS | Fix or Defer
Practical Academy
Disabling USB Password STIGs in AWS | Fix or Defer
5:12
Mini Web Application Penetration Test Walkthrough, Findings, and Reporting
Practical Academy
Mini Web Application Penetration Test Walkthrough, Findings, and Reporting
5:55
Burp Suite Intruder Explained | Fuzzing Web Application Inputs
Practical Academy
Burp Suite Intruder Explained | Fuzzing Web Application Inputs
4:54
Fixing High-Risk STIG Findings on Ubuntu 22.04 | Risk Prioritization & Remediation Evidence
Practical Academy
Fixing High-Risk STIG Findings on Ubuntu 22.04 | Risk Prioritization & Remediation Evidence
12:13
Introduction to Session Handling & Authentication Testing (Web App Pentesting)
Practical Academy
Introduction to Session Handling & Authentication Testing (Web App Pentesting)
5:28
Tampering with Input Fields Parameters | Web Security Ethical Hacking Explained
Practical Academy
Tampering with Input Fields Parameters | Web Security Ethical Hacking Explained
5:47
Burp Suite Basics | Intercepting and Understanding Web Traffic
Practical Academy
Burp Suite Basics | Intercepting and Understanding Web Traffic
7:56
Secure Ubuntu File Permissions   STIG Hardening for etc shadow  Logs
Practical Academy
Secure Ubuntu File Permissions STIG Hardening for etc shadow Logs
6:20
Manual Vulnerability Verification | Confirming Real Security Risks
Practical Academy
Manual Vulnerability Verification | Confirming Real Security Risks
6:54
HTTP Request & Response Analysis: Security Headers Explained | Ethical Hacking Fundamentals
Practical Academy
HTTP Request & Response Analysis: Security Headers Explained | Ethical Hacking Fundamentals
6:24
Nikto + OWASP ZAP Tutorial | Finding & Exploiting Web Vulnerabilities (Week 4 Assignment)
Practical Academy
Nikto + OWASP ZAP Tutorial | Finding & Exploiting Web Vulnerabilities (Week 4 Assignment)
59:46
Automated Web Scanning with Nikto | Ethical Hacking Web Reconnaissance
Practical Academy
Automated Web Scanning with Nikto | Ethical Hacking Web Reconnaissance
7:07
How to Create Your First Security Scorecard | STIG Findings Analysis & Remediation Tracking (Week 3)
Practical Academy
How to Create Your First Security Scorecard | STIG Findings Analysis & Remediation Tracking (Week 3)
6:39
What Is Digital Forensics? | Foundations of Cyber Investigations & Evidence Analysis
Practical Academy
What Is Digital Forensics? | Foundations of Cyber Investigations & Evidence Analysis
9:05
Network Scanning & Enumeration Explained | Nmap, PCAP Analysis, and Service Discovery (Lab)
Practical Academy
Network Scanning & Enumeration Explained | Nmap, PCAP Analysis, and Service Discovery (Lab)
1:25:03
Introduction to Web Application Security | OWASP Top 10 Explained (Beginner-Friendly)
Practical Academy
Introduction to Web Application Security | OWASP Top 10 Explained (Beginner-Friendly)
7:15
OWASP ZAP Explained: Passive vs Active Scanning | Web Security Basics
Practical Academy
OWASP ZAP Explained: Passive vs Active Scanning | Web Security Basics
6:50
Week 2 Baseline Scan Walkthrough (Lynis + DISA STIG Viewer) | Build Your First CKL Audit Report
Practical Academy
Week 2 Baseline Scan Walkthrough (Lynis + DISA STIG Viewer) | Build Your First CKL Audit Report
6:39
Service Enumeration & Fingerprinting Explained | Ethical Hacking Reconnaissance
Practical Academy
Service Enumeration & Fingerprinting Explained | Ethical Hacking Reconnaissance
6:04
Capturing & Analyzing Network Scans with Wireshark and tshark | Ethical Hacking Lab
Practical Academy
Capturing & Analyzing Network Scans with Wireshark and tshark | Ethical Hacking Lab
6:11
Firewall Exposure & Port Auditing in Linux | UFW, iptables, AWS Security Groups
Practical Academy
Firewall Exposure & Port Auditing in Linux | UFW, iptables, AWS Security Groups
5:35
Web Reconnaissance & OSINT | Ethical Hacking Week 2 Lab Walkthrough
Practical Academy
Web Reconnaissance & OSINT | Ethical Hacking Week 2 Lab Walkthrough
38:15
Logging & Auditing in Ubuntu 22.04 | auditd, rsyslog & STIG Compliance
Practical Academy
Logging & Auditing in Ubuntu 22.04 | auditd, rsyslog & STIG Compliance
6:50
Reconnaissance & Web Scanning Hands On Lab
Practical Academy
Reconnaissance & Web Scanning Hands On Lab
33:00
Nmap Scan Types Explained: TCP, SYN, Version & OS Detection
Practical Academy
Nmap Scan Types Explained: TCP, SYN, Version & OS Detection
6:37
Nmap Scan Timing Explained | Speed, Stealth, and Detection (Ethical Hacking)
Practical Academy
Nmap Scan Timing Explained | Speed, Stealth, and Detection (Ethical Hacking)
5:52
Authentication Hardening & Justified Exceptions | ISSO-Level Linux Security (STIGs & PAM)
Practical Academy
Authentication Hardening & Justified Exceptions | ISSO-Level Linux Security (STIGs & PAM)
6:27
Risk Methodology Explained | Prioritizing STIG & Lynis Findings
Practical Academy
Risk Methodology Explained | Prioritizing STIG & Lynis Findings
6:29
Network Scanning & Enumeration Explained | Nmap + Wireshark for Ethical Hacking
Practical Academy
Network Scanning & Enumeration Explained | Nmap + Wireshark for Ethical Hacking
5:38
Directory Discovery with Gobuster | Web Reconnaissance for Ethical Hacking
Practical Academy
Directory Discovery with Gobuster | Web Reconnaissance for Ethical Hacking
8:09
Web Fingerprinting with WhatWeb | Ethical Hacking Reconnaissance Basics
Practical Academy
Web Fingerprinting with WhatWeb | Ethical Hacking Reconnaissance Basics
4:40
Kernel Hardening with sysctl | Secure Linux Kernel Configuration Ubuntu 22.04
Practical Academy
Kernel Hardening with sysctl | Secure Linux Kernel Configuration Ubuntu 22.04
6:41
theHarvester Explained: OSINT Collection for Ethical Hacking
Practical Academy
theHarvester Explained: OSINT Collection for Ethical Hacking
7:14
Passive vs Active Reconnaissance Explained (Ethical Hacking)
Practical Academy
Passive vs Active Reconnaissance Explained (Ethical Hacking)
7:12
Turn Scan Results into Security Strategy | Ubuntu OS Hardening
Practical Academy
Turn Scan Results into Security Strategy | Ubuntu OS Hardening
6:15
What Is OSINT? Open Source Intelligence for Ethical Hacking
Practical Academy
What Is OSINT? Open Source Intelligence for Ethical Hacking
6:42
How Secure Is Your Ubuntu? Hardening with Lynis, STIG Viewer & CKL Files
Practical Academy
How Secure Is Your Ubuntu? Hardening with Lynis, STIG Viewer & CKL Files
6:45
Web Vulnerability Scanning with Nikto (Ethical Hacking Basics)
Practical Academy
Web Vulnerability Scanning with Nikto (Ethical Hacking Basics)
7:56
Operating System Hardening: STIGs, Lynis, & Secure Ubuntu 22.04 Setup
Practical Academy
Operating System Hardening: STIGs, Lynis, & Secure Ubuntu 22.04 Setup
7:34
Reconnaissance Scanning with Nmap (Ethical Hacking Basics)
Practical Academy
Reconnaissance Scanning with Nmap (Ethical Hacking Basics)
8:10
Penetration Testing Laws & Ethics: Consent, Scope, and the CFAA
Practical Academy
Penetration Testing Laws & Ethics: Consent, Scope, and the CFAA
6:39
Types of Hackers Explained: White Hat vs Black Hat vs Grey Hat
Practical Academy
Types of Hackers Explained: White Hat vs Black Hat vs Grey Hat
8:33
What Is Ethical Hacking? (White Hat and Black Hat Explained) NEW
Practical Academy
What Is Ethical Hacking? (White Hat and Black Hat Explained) NEW
10:13
What Is Ethical Hacking? (White Hat Hacking & Penetration Testing Explained)
Practical Academy
What Is Ethical Hacking? (White Hat Hacking & Penetration Testing Explained)
9:03