The Correct Way to Start a Career in Cybersecurity (2026 Roadmap)
Hansani Vihanga
The Correct Way to Start a Career in Cybersecurity (2026 Roadmap)
14:13
Happy New Year Everyone!!
Hansani Vihanga
Happy New Year Everyone!!
0:06
Difference between EDR, NDR, XDR and MDR | Cybersecurity for Beginners
Hansani Vihanga
Difference between EDR, NDR, XDR and MDR | Cybersecurity for Beginners
10:12
How to Think Like CISSP Exam Wants You To Think
Hansani Vihanga
How to Think Like CISSP Exam Wants You To Think
6:21
Merry Christmas Everyone! 🎄
Hansani Vihanga
Merry Christmas Everyone! 🎄
0:06
Red Team, Blue Team, Purple Team & White Team Explained (Cybersecurity Basics)
Hansani Vihanga
Red Team, Blue Team, Purple Team & White Team Explained (Cybersecurity Basics)
3:36
10 Step Beginner Cybersecurity Roadmap for 2026
Hansani Vihanga
10 Step Beginner Cybersecurity Roadmap for 2026
4:35
CISSP Security Models - Bell-LaPadula , Biba and Clark Wilson
Hansani Vihanga
CISSP Security Models - Bell-LaPadula , Biba and Clark Wilson
11:24
A Glimpse of First Mandiant Community Night | Google Singapore
Hansani Vihanga
A Glimpse of First Mandiant Community Night | Google Singapore
0:29
Incident Response – NIST SP 800-61r3 Explained Simply
Hansani Vihanga
Incident Response – NIST SP 800-61r3 Explained Simply
9:45
5 Common Mistakes in SOC Incident Response (and How to Avoid Them)
Hansani Vihanga
5 Common Mistakes in SOC Incident Response (and How to Avoid Them)
6:03
How SOC alerts are Created and Handled
Hansani Vihanga
How SOC alerts are Created and Handled
8:10
5 Must Know Tools Inside a Security Operations Center (SOC)
Hansani Vihanga
5 Must Know Tools Inside a Security Operations Center (SOC)
9:41
ISC2 CISSP Welcome Pack
Hansani Vihanga
ISC2 CISSP Welcome Pack
1:33
What is Security Operations?
Hansani Vihanga
What is Security Operations?
10:00
Supply Chain Risk Management: CISSP Domain 1
Hansani Vihanga
Supply Chain Risk Management: CISSP Domain 1
7:15
CISSP Threat Modeling Explained: STRIDE, DREAD, PASTA, VAST
Hansani Vihanga
CISSP Threat Modeling Explained: STRIDE, DREAD, PASTA, VAST
8:00
Cyber Security Career Roadmap Video for Beginners
Hansani Vihanga
Cyber Security Career Roadmap Video for Beginners
0:06
Start a Career in Cyber Security -  Roadmap 2025
Hansani Vihanga
Start a Career in Cyber Security - Roadmap 2025
9:02
CISSP Domain 1: Due Diligence & Due Care Explained
Hansani Vihanga
CISSP Domain 1: Due Diligence & Due Care Explained
2:16
CISSP Domain 1| 4 Ways to Evaluate Security Vendors Before Outsourcing
Hansani Vihanga
CISSP Domain 1| 4 Ways to Evaluate Security Vendors Before Outsourcing
4:46
Strategic, Tactical & Operational Planning – Simplified for CISSP
Hansani Vihanga
Strategic, Tactical & Operational Planning – Simplified for CISSP
3:51
CISSP Domain 1 Explained: Security Governance vs Security Functions
Hansani Vihanga
CISSP Domain 1 Explained: Security Governance vs Security Functions
2:53
How I Passed the CISSP Exam | Study Plan, Resources, Tips & Exam Experience
Hansani Vihanga
How I Passed the CISSP Exam | Study Plan, Resources, Tips & Exam Experience
9:31
Differences between Partial Homomorphic Encryption (PHE) and Fully Homomorphic Encryption (FHE)
Hansani Vihanga
Differences between Partial Homomorphic Encryption (PHE) and Fully Homomorphic Encryption (FHE)
4:06
Understanding Homomorphic Encryption: The Future of Privacy in Computing
Hansani Vihanga
Understanding Homomorphic Encryption: The Future of Privacy in Computing
8:29
Now available in jumpbooks.lk
Hansani Vihanga
Now available in jumpbooks.lk
0:09
Windows Registry for Digital Forensics
Hansani Vihanga
Windows Registry for Digital Forensics
12:49
Happy New Year 2025 everyone!! #newyear2025
Hansani Vihanga
Happy New Year 2025 everyone!! #newyear2025
0:06
Difference between Unallocated Space and Slack Space #technology #digitalforensics #cybersecurity
Hansani Vihanga
Difference between Unallocated Space and Slack Space #technology #digitalforensics #cybersecurity
0:59
Understanding True Positive, True Negative, False Positive, False Negative, and BTP in Cybersecurity
Hansani Vihanga
Understanding True Positive, True Negative, False Positive, False Negative, and BTP in Cybersecurity
3:24
Threat Hunting & Threat Intelligence #cybersecurity #cyberattack #threatintelligence #threathunting
Hansani Vihanga
Threat Hunting & Threat Intelligence #cybersecurity #cyberattack #threatintelligence #threathunting
1:01
Cyber Threat Intelligence 101: Why It’s Crucial for Your Security
Hansani Vihanga
Cyber Threat Intelligence 101: Why It’s Crucial for Your Security
8:42
Difference between XDR, SIEM and SOAR #cybersecurity #threatdetection
Hansani Vihanga
Difference between XDR, SIEM and SOAR #cybersecurity #threatdetection
1:01
Email Header Analysis Demo
Hansani Vihanga
Email Header Analysis Demo
8:53
Cyber Kill Chain VS Mitre Att&ck #cybersecurity #cyberattack
Hansani Vihanga
Cyber Kill Chain VS Mitre Att&ck #cybersecurity #cyberattack
0:57
How far does certifications help in your career? (Certifications vs. Skills)
Hansani Vihanga
How far does certifications help in your career? (Certifications vs. Skills)
6:28
My First Book - Taking a Stand | A tale of Cyber Bullying
Hansani Vihanga
My First Book - Taking a Stand | A tale of Cyber Bullying
1:49
🩵
Hansani Vihanga
🩵
0:22
Email Header Analysis - An Introductory Video
Hansani Vihanga
Email Header Analysis - An Introductory Video
9:13
Happy New Year 2024
Hansani Vihanga
Happy New Year 2024
0:06
MITRE ATT&CK Framework: Part 1
Hansani Vihanga
MITRE ATT&CK Framework: Part 1
5:24
Reflecting on a year of growth and gratitude. #2023
Hansani Vihanga
Reflecting on a year of growth and gratitude. #2023
0:16
Merry Christmas!! 🎄🎅
Hansani Vihanga
Merry Christmas!! 🎄🎅
0:09
Difference between EDR, XDR and MDR. #cybersecurity #threatdetection
Hansani Vihanga
Difference between EDR, XDR and MDR. #cybersecurity #threatdetection
0:59
Red Team vs Blue Team in #cybersecurity
Hansani Vihanga
Red Team vs Blue Team in #cybersecurity
0:59
Cybersecurity Analyst vs. Engineer: Key Differences Explained #cybersecurity #cybercareers
Hansani Vihanga
Cybersecurity Analyst vs. Engineer: Key Differences Explained #cybersecurity #cybercareers
1:00
How to use Windows Prefetch
Hansani Vihanga
How to use Windows Prefetch
4:38
Happy to be a part of the Fit4Future program at MillenniumIT ESP. #cybersecurity
Hansani Vihanga
Happy to be a part of the Fit4Future program at MillenniumIT ESP. #cybersecurity
0:22
Mastering the Basics: Your path to Success in Cyber Security
Hansani Vihanga
Mastering the Basics: Your path to Success in Cyber Security
6:45
The Cyberpod, a podcast initiative by the Cybersecurity  Community of SLIIT.
Hansani Vihanga
The Cyberpod, a podcast initiative by the Cybersecurity Community of SLIIT.
0:48
A day in the life of a Cyber Security Analyst 🔒🔍#womenincybersecurity
Hansani Vihanga
A day in the life of a Cyber Security Analyst 🔒🔍#womenincybersecurity
0:55
Digital Forensic: Build your Forensic Workstation
Hansani Vihanga
Digital Forensic: Build your Forensic Workstation
11:33
Digital Forensics: Forensic Readiness
Hansani Vihanga
Digital Forensics: Forensic Readiness
13:36
Daily Security Update #6 #cybersecurity #informationsecurity
Hansani Vihanga
Daily Security Update #6 #cybersecurity #informationsecurity
0:21
The Daily Security Update #5 #cybersecurity #informationsecurity
Hansani Vihanga
The Daily Security Update #5 #cybersecurity #informationsecurity
0:16
Daily Security Update #4
Hansani Vihanga
Daily Security Update #4
0:16
Daily Security Update #3
Hansani Vihanga
Daily Security Update #3
0:16
Daily Security Update #2
Hansani Vihanga
Daily Security Update #2
0:16
Daily Security Update #1  #cybersecurity #informationsecurity
Hansani Vihanga
Daily Security Update #1 #cybersecurity #informationsecurity
0:16
A Day in life of a Cyber Security Analyst
Hansani Vihanga
A Day in life of a Cyber Security Analyst
4:59
1 January 2023
Hansani Vihanga
1 January 2023
0:25
5 OSINT Tools used by Information Security Professionals - Part 01
Hansani Vihanga
5 OSINT Tools used by Information Security Professionals - Part 01
0:43
Merry Christmas 🤶 🎄
Hansani Vihanga
Merry Christmas 🤶 🎄
0:16
Beginner - Valuable Skills to develop for Cyber Security
Hansani Vihanga
Beginner - Valuable Skills to develop for Cyber Security
12:05
Symmetric Key Cryptography
Hansani Vihanga
Symmetric Key Cryptography
4:01
Cryptography : Basics
Hansani Vihanga
Cryptography : Basics
4:09
TCP/IP Model
Hansani Vihanga
TCP/IP Model
5:22
Introduction to the OSI Model
Hansani Vihanga
Introduction to the OSI Model
6:22
Digital Forensics : Report Writing and Presentation
Hansani Vihanga
Digital Forensics : Report Writing and Presentation
7:26
Digital Forensics : Acquisition and Processing DEMO
Hansani Vihanga
Digital Forensics : Acquisition and Processing DEMO
5:38
Digital Forensics : Acquisition and Processing
Hansani Vihanga
Digital Forensics : Acquisition and Processing
6:03
Digital Forensics: Evidence Collection Process
Hansani Vihanga
Digital Forensics: Evidence Collection Process
4:11
Introduction to Digital Forensics
Hansani Vihanga
Introduction to Digital Forensics
5:27
Wireshark Basics with DEMO on capturing HTTP plaintext credentials
Hansani Vihanga
Wireshark Basics with DEMO on capturing HTTP plaintext credentials
8:24
What are CERTs and CSIRTs?
Hansani Vihanga
What are CERTs and CSIRTs?
8:43
What is TCP 3-way handshake and SYN Flood attack?
Hansani Vihanga
What is TCP 3-way handshake and SYN Flood attack?
6:16
Nmap for Penetration Testing
Hansani Vihanga
Nmap for Penetration Testing
13:37
What is DNS? How does it work?
Hansani Vihanga
What is DNS? How does it work?
5:08
How to write a Research Paper - Step by Step Guide
Hansani Vihanga
How to write a Research Paper - Step by Step Guide
6:17
Explanation of CIA Triad in less than 5 mins
Hansani Vihanga
Explanation of CIA Triad in less than 5 mins
4:29
3.6.1.1 - Securing Administrative Access Using AAA and RADIUS in GNS3
Hansani Vihanga
3.6.1.1 - Securing Administrative Access Using AAA and RADIUS in GNS3
17:15
8 E-Commerce or Online Shopping Security Considerations/ Tips
Hansani Vihanga
8 E-Commerce or Online Shopping Security Considerations/ Tips
3:27
A Simple Children Guide to Cyber Security
Hansani Vihanga
A Simple Children Guide to Cyber Security
2:34
Study tips for your Final Exam | 13 Study Tips
Hansani Vihanga
Study tips for your Final Exam | 13 Study Tips
3:24
Zotero Tutorial - Write your Citations and References Easily
Hansani Vihanga
Zotero Tutorial - Write your Citations and References Easily
6:30