ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

472 results

CyberMindset
OSINT Case Study

Exploring cyber mysteries, OSINT investigations, and the dark side of the web. This channel dives into cybersecurity threats, ...

1:00
OSINT Case Study

47 views

1 year ago

media.ccc.de
36C3 -  The Case for Scale in Cyber Security

https://media.ccc.de/v/36c3-11220-the_case_for_scale_in_cyber_security Security Track Keynote The impact of scale in our field ...

32:19
36C3 - The Case for Scale in Cyber Security

2,250 views

6 years ago

DFIRScience
DFS101: 4.1 Basics of Cybercrime Investigation

In this video, we discuss how investigators begin to investigate cybercrime. We discuss crime detection, evidence collection, ...

20:21
DFS101: 4.1 Basics of Cybercrime Investigation

63,556 views

5 years ago

DEFCONConference
DEF CON 33 -  How Nation-State Hackers Turn Human Error into Catastrophic Failures - N Case, J McCoy

Nation-state hackers pose a formidable threat to critical infrastructure, compromising national security, intellectual property, and ...

36:03
DEF CON 33 - How Nation-State Hackers Turn Human Error into Catastrophic Failures - N Case, J McCoy

782 views

6 months ago

Cyberiom
Titan Rain: The 2005 Cyber Attacks on the US Department of Defense

In 2005, a series of cyber attacks known as "Titan Rain" were carried out against the United States Department of Defense (DOD) ...

4:21
Titan Rain: The 2005 Cyber Attacks on the US Department of Defense

149 views

3 years ago

The Linux Foundation
Implementing and Validating Linux Cyber Security Requirements: SEAPATH, a... - Enguerrand & Mathieu

Implementing and Validating Linux Cyber Security Requirements: SEAPATH, a Case Study - Enguerrand de Ribaucourt ...

31:56
Implementing and Validating Linux Cyber Security Requirements: SEAPATH, a... - Enguerrand & Mathieu

212 views

2 years ago

The Evolution of Video. Human Heart, AI Smart.
Creating a Promo Video for Cybersecurity Firm ParanoidLab | Motion Design Case Study

How do you transform a complex cybersecurity concept into a dynamic and compelling promo video? Here's a behind-the-scenes ...

0:54
Creating a Promo Video for Cybersecurity Firm ParanoidLab | Motion Design Case Study

46 views

7 months ago

The Berkman Klein Center for Internet & Society
FBI: New Cyber Challenges and Recent Take-Downs

Bryan Vorndran, Assistant Director for the Federal Bureau of Investigation's Cyber Division discusses the work of the FBI's Cyber ...

58:15
FBI: New Cyber Challenges and Recent Take-Downs

382 views

2 years ago

CyberLink Security
Cyber Security Fundamentals : 1 Hour Tutorial

Learn about Cybersecurity in 1 hour for beginners. A beginner's guide to data security / cyber security. Hackers are everywhere.

1:05:16
Cyber Security Fundamentals : 1 Hour Tutorial

401 views

3 years ago

DEFCONConference
DEF CON Safe Mode Red Team Village - Mauro Casere - Evil Genius Why You Shouldnt Trust that Keyboard

... example let's take a look at this set of speakers that we have tampered ourselves for another case of study these speakers might ...

22:46
DEF CON Safe Mode Red Team Village - Mauro Casere - Evil Genius Why You Shouldnt Trust that Keyboard

689 views

5 years ago

Advocacy Assembly
Security First Phishing Malware and Social Engineering Case study 4.1

Now let's take a look at a fishing case study by Gillian York a writer and activist focused on the intersection of technology and ...

3:25
Security First Phishing Malware and Social Engineering Case study 4.1

119 views

9 years ago

Trusted CI
Incident Response: Crimea Case Study

In this video we look at how the NCSA incident response team dealt with a public relation base incident involving NTP and Crimea ...

5:53
Incident Response: Crimea Case Study

641 views

11 years ago

Jiffry Uthumalebbe
Massive Cyberattack Exposes Millions: Capital One Customers in Jeopardy | June 23, 2024

Capital One has confirmed that it was affected by a cyberattack on NCB Management Services, a company that purchases debt.

0:57
Massive Cyberattack Exposes Millions: Capital One Customers in Jeopardy | June 23, 2024

93 views

2 years ago

FIRST
A Playbook for Effective Corporate Communication After a Cyber Security Incident

Speaker: Dr. Jason Nurse (University of Kent, UK) A cyber security incident can cripple an organisation, particularly because of ...

20:46
A Playbook for Effective Corporate Communication After a Cyber Security Incident

554 views

4 years ago

The Linux Foundation
Software Supply Chain Security Case Study at Anaconda - Sebastien Awwad, Anaconda

Software Supply Chain Security Case Study at Anaconda - Sebastien Awwad, Anaconda This session will cover the authors' ...

43:27
Software Supply Chain Security Case Study at Anaconda - Sebastien Awwad, Anaconda

40 views

2 years ago

DEFCONConference
DEF CON 32 - War Games  Red Team for OT Based on Real World Case Studies- Shishir Gupta

In this talk, Shishir will share some critical insights from performing a decade worth of Red Team (attack simulation) exercises for ...

23:08
DEF CON 32 - War Games Red Team for OT Based on Real World Case Studies- Shishir Gupta

4,593 views

1 year ago

Cybersecurity and Privacy Institute UWaterloo
Subversion – From Spies to Hackers - Lennart Maschmeyer - CPI Talk

Subversion – From Spies to Hackers Although cyber conflict has existed for thirty years, the strategic utility of cyber operations ...

1:21:14
Subversion – From Spies to Hackers - Lennart Maschmeyer - CPI Talk

74 views

2 years ago

Trusted CI
Incident Response Pivot Attack Case Study

In this video we will take a look at how the NCSA response team handled a pivot, or island hoping attack on one of the HPC ...

11:11
Incident Response Pivot Attack Case Study

887 views

11 years ago

Trusted CI
Case study: Threat identification

http://trustedci.org/ The second part of the case study of the CTSC risk assessment. This video talks about making threat ...

5:31
Case study: Threat identification

2,188 views

11 years ago

Timeless Hub
Russia's Cyber Warfare: Global Threats Unveiled!

... Cyber Warfare and Global Conflict 00:00:44 Russia's Cyber Weapon 00:01:21 A Case Study in Cyber Warfare 00:02:03 US ...

2:53
Russia's Cyber Warfare: Global Threats Unveiled!

11 views

1 year ago