Introduction to JSON Web Token (JWT)
Naila Rizvan
Introduction to JSON Web Token (JWT)
7:13
Misconfigurations in the Cloud
Naila Rizvan
Misconfigurations in the Cloud
6:48
Kerberoasting Explained
Naila Rizvan
Kerberoasting Explained
7:13
Kerbrute in CyberSecurity
Naila Rizvan
Kerbrute in CyberSecurity
7:07
Identity and Access Management IAM in Cloud Environments
Naila Rizvan
Identity and Access Management IAM in Cloud Environments
6:48
VPC Peering
Naila Rizvan
VPC Peering
7:15
iOS Jailbreaking
Naila Rizvan
iOS Jailbreaking
7:40
Using Frida for SSL Pinning Bypass
Naila Rizvan
Using Frida for SSL Pinning Bypass
7:24
Mastering Threat Modeling for Better Security
Naila Rizvan
Mastering Threat Modeling for Better Security
6:03
Mobile Penetration Testing
Naila Rizvan
Mobile Penetration Testing
7:35
Firewall Architecture and Configuration Best Practices
Naila Rizvan
Firewall Architecture and Configuration Best Practices
7:42
Browser Security and Web Application Threats
Naila Rizvan
Browser Security and Web Application Threats
7:32
Cloud Misconfigurations
Naila Rizvan
Cloud Misconfigurations
6:48
Browser Security and Web Application Threats
Naila Rizvan
Browser Security and Web Application Threats
7:32
MITRE ATT&CK Framework in Threat Detection
Naila Rizvan
MITRE ATT&CK Framework in Threat Detection
7:29
Email Security   Combating BEC and Phishing Attacks
Naila Rizvan
Email Security Combating BEC and Phishing Attacks
7:15
Adversarial Machine Learning in Cybersecurity
Naila Rizvan
Adversarial Machine Learning in Cybersecurity
7:37
Forensics of Mobile Devices
Naila Rizvan
Forensics of Mobile Devices
7:31
Incident Response and Recovery - Lessons Learned from Breaches
Naila Rizvan
Incident Response and Recovery - Lessons Learned from Breaches
7:49
Reverse Engineering Malware   Insights into the Mind of a Hacker
Naila Rizvan
Reverse Engineering Malware Insights into the Mind of a Hacker
8:09
Quantum Computers and Cybersecurity – A Double Edged Sword
Naila Rizvan
Quantum Computers and Cybersecurity – A Double Edged Sword
7:50
Monolithic & Microservices Architecture
Naila Rizvan
Monolithic & Microservices Architecture
7:18
Cloud Security   Ensuring Safety in a Shared Environment
Naila Rizvan
Cloud Security Ensuring Safety in a Shared Environment
6:43
Cybersecurity in Space
Naila Rizvan
Cybersecurity in Space
7:47
Cybersecurity Challenges in E Commerce
Naila Rizvan
Cybersecurity Challenges in E Commerce
7:26
Reverse Engineering Malware
Naila Rizvan
Reverse Engineering Malware
7:36
Zero Trust Security Models
Naila Rizvan
Zero Trust Security Models
8:11
Windows vs Linux
Naila Rizvan
Windows vs Linux
8:28
CyberSecurity in IoT
Naila Rizvan
CyberSecurity in IoT
7:50
Cryptography in Blockchain
Naila Rizvan
Cryptography in Blockchain
9:03
Defense in Depth
Naila Rizvan
Defense in Depth
8:56
Introduction to OSI Model
Naila Rizvan
Introduction to OSI Model
8:32
What Happens When Windows OS Boots Up?
Naila Rizvan
What Happens When Windows OS Boots Up?
8:18
Unerstanding Firewalls
Naila Rizvan
Unerstanding Firewalls
8:25
Unmasking Malware: Understanding Types, Impacts, and Protection Strategies
Naila Rizvan
Unmasking Malware: Understanding Types, Impacts, and Protection Strategies
8:39
Understanding Cybersecurity: Protecting the Digital World
Naila Rizvan
Understanding Cybersecurity: Protecting the Digital World
9:34
Blockchain: Transforming the Future of Technology
Naila Rizvan
Blockchain: Transforming the Future of Technology
10:41
Introduction to TCP/IP
Naila Rizvan
Introduction to TCP/IP
9:56
Introduction to Hashmaps
Naila Rizvan
Introduction to Hashmaps
6:48
Introduction to Neural Networks
Naila Rizvan
Introduction to Neural Networks
8:01
Introduction to Internet of Things (IoT)
Naila Rizvan
Introduction to Internet of Things (IoT)
8:13
Learn to Start and Run Your Own Online Business Profitably
Naila Rizvan
Learn to Start and Run Your Own Online Business Profitably
0:37