Video
-
Cyber Security: What is SSL?
SSL (Secure Sockets Layer) is the original cryptographic protocol designed to secure communications over a…
-
Cyber Security: What is Hashcat?
Hashcat is an open-source, GPU-accelerated password recovery tool that takes hashed credentials and attempts to…
-
Cyber Security: What is John the Ripper?
John the Ripper (often shortened to John) is an open-source password-cracking utility maintained by the…
-
Cyber Security: What is the OSCP certification?
The OSCP (Offensive Security Certified Professional) is a penetration testing certification offered by OffSec (formerly…
-
Cyber Security: What is an ethical hacker?
An ethical hacker is a security professional who uses the same techniques as a malicious…
-
Cyber Security: What is a Penetration Tester?
A penetration tester (often shortened to pen tester or ethical hacker) is a security professional…
-
Cyber Security: What is a vulnerability assessment?
A vulnerability assessment is a structured process of identifying, categorising, and prioritising security weaknesses across…
-
Cyber Security: What is a vulnerability?
In cyber security a vulnerability is a weakness in a system, application, configuration, or process…
-
Cyber Security: What is an exploit?
An exploit is the specific code, technique, or sequence of steps that takes advantage of…
-
Cyber Security: What is SQL Injection?
SQL injection is a web application vulnerability that allows an attacker to manipulate a database…




