Channel Avatar

Candan BOLUKBAS @UC7NmOUOJn0Vr5BrfzjgBD2A@youtube.com

11K subscribers - no pronouns :c

More from this channel (soon)


01:05:10
Threat Hunting w/ Elasticsearch, Logstash, Kibana and Beats part #1
51:03
An Introduction to Machine Learning for Threat Hunting part #1
30:06
Threat Hunting: The Capture The Flag part #1
21:52
Threat Hunting w/ Elasticsearch, Logstash, Kibana and Beats part #2
25:55
Threat Hunting: Disc Forensics
59:17
Deep Packet Analysis with Wireshark and Tshark part #1
25:44
Deep Packet Analysis with Wireshark and Tshark part #2
21:47
An Introduction to Machine Learning for Threat Hunting part #2
28:35
Threat Hunting: The Capture The Flag part #2
01:17:55
Threat Hunting: Memory Analysis with Volatility
01:05:39
Malware Analysis Part 3: Introduction to Malware Reverse Engineering (no audio)
35:36
Malware Analysis Part #2: Basic Dynamic Analysis
50:49
Malware Analysis Part #1: Basic Static Analysis
42:23
Threat Hunting Examples with Linux Command Line Tools
52:37
Basic Linux Commands Line Tools Part #1 - grep, cut, head, more, awk etc. and some python & regex
41:09
Basic Linux Commands Line Tools Part #2 - grep, for, find, awk etc. and some python & regex
01:04:48
Tunneling to Bypass NG Firewalls
56:17
Web application pentest part #2
21:28
Web application pentest part #3
55:19
Web application pentest part #1
27:44
Meterpreter Pivoting and Port Forwarding with Metasploit
21:57
Metasploit Usage and Meterpreter Part #1
22:41
Metasploit Usage and Meterpreter Part #2
26:50
Firewall & IPS Evasion Techniques
47:53
Basic Anti-Virus Bypass Techniques
19:52
Basic Exploit Development and Scanning
01:19:56
Introduction to Ethical Hacking
10:09
#HackingTeam dosyasını @MirgunCabas ile @cnnturk te değerlendiriyoruz.