Channel Avatar

CQURE Academy @UCWIEIMHXyJ62RF4aVmU30og@youtube.com

15K subscribers - no pronouns :c

Welcome to CQURE Academy - Where Windows Security Experts Le


26:04
Hacks Weekly #58 The Biggest PKI Misconfigurations
08:52
Hacks Weekly 55 Insecure Data Storage
06:12
Hacks Weekly 56 Ram Capturer
01:56:40
Hacks Weekly #57 Webinars: Top 6 Things on Defending Active Directory
03:06
Cybersecurity Master Annual Program 2024
04:31
Hacks Weekly #54 Crashing Application
05:33
Hacks Weekly #53 Hybrid Analysis
07:35
Hacks Weekly #52 Malware Analysis with AnyRun
09:22
Hacks Weekly #51 Investigating Risky Events Azure AD
20:58
Hacks Weekly #50 Network Traffic Analysis
06:10
Hacks Weekly #49 Introduction to Boot Monitoring
06:44
Hacks Weekly #48 - Introduction to Stackwalking.
07:57
CQURE Hacks Weekly #47: Memory Dump
01:17
Q&A #1- Great Raccoon Giveaway 2022 - What are the top trends in cybersecurity industry in 2023?
05:10
CQ Hacks Back To Basics: Using PIM in Azure Active Directory Security
09:33
CQ Hacks Back to Basics: Conditional Access in Azure Active Directory
06:42
CQ Hacks Back to Basics: Identity Protection in Azure Active Directory
02:14
Social Engineering & Phishing Mastery Course by CQURE Academy
04:57
"Dear User”: Sorting Real Emails from Phishing by Paula J
08:05
How to Bury Risk in the Sand ? Configure Windows Sandbox for malware analysis
05:01
CQURE Hacks #42: That Can Fool Anyone. Don’t Ignore Social Engineering
05:48
CQURE Hacks #41: Don’t Take Candy or USBs from Strangers – USB attack is the serious threat
04:22
CQURE Hacks #40: Man-in-the-middle attack – everything you need to know to perform it
10:54
CQ Hacks 39: A Look Inside a Pass-the-PRT Attack
04:14
CQ Hacks #38 How Forensic Experts Use Windows Prefetch
09:10
CQURE Hacks #37 – How to Recover Corrupted EVTX Log Files and Extract Information
01:17
Want to be a digital Sherlock Holmes? Join 1 day Forensics & Prevention Mastery Course!
14:53
CQURE Hacks #36: User Secrets: How to Get Them Back Using Password Recovery Tools
31:18
#CQLabs 8.6 - from the Risks and Solutions When Working from Home Webinar
06:21
#CQLabs 8.5 - from the Risks and Solutions When Working from Home Webinar
04:19
Introduction to CQLabs – How UAC bypass methods really work
10:20
#CQLabs 8.4 - from the Risks and Solutions When Working from Home Webinar
19:24
#CQLabs 8.3 - from the Risks and Solutions When Working from Home Webinar
22:19
#CQLabs 8.2 - from the Risks and Solutions When Working from Home Webinar
03:54
#CQLabs 8.1 - from the Risks and Solutions When Working from Home Webinar
01:33:46
WEBINAR REPLAY WITH LIVE CHAT - How to Become Windows Forensics Master 2.0
01:33:48
WEBINAR REPLAY WITH LIVE CHAT - How to Become Windows Forensics Master 2.0
02:08:39
Hackers’ Perspective: Risks and Solutions When Working from Home - Replay with LIVE CHAT with CQURE
00:47
CQURE Greetings
14:06
How not to become a target of social engineering - Paula Januszkiewicz talks with Jayson E. Street
08:14
Exploiting Windows Hello for Business - Mike Jankowski-Lorek talks with Michael Grafnetter, CQURE
00:53
CQURE at What the H@ack Conference 2019, Warsaw, Poland
02:41
CQURE at Black Hat Europe - London 2019
26:27
CQLabs DNS
13:10
How it began: The Story Behind Mimikatz - Paula Januszkiewicz talks with Benjamin Delpy
01:20
Learn how to transmit sensitive data safely in just 7 hours – join our new course!
03:25
Paula J On The Origins Of CQURE | The Story Behind
08:32
🎀What is it with Baking and IT? πŸ₯ – Interview with Niv Goldenberg at MS Ignite 2018
04:05
How Paula Januszkiewicz Got Started in Cybersecurity? πŸ‘€
15:22
πŸŽ™πŸ”₯ Cybersecurity Talk Special Edition πŸ”₯πŸŽ™: Interview with Adam Hall at #Microsoft Ignite 2018 ❗️
09:39
πŸŽ™πŸ”₯ Cybersecurity Talk Special Edition πŸ”₯πŸŽ™: Interview with Jeremy Winter at #Microsoft Ignite 2018 ❗️
06:46
πŸŽ™πŸ”₯ Cybersecurity Talk Special Edition πŸ”₯πŸŽ™: Interview with Corey Sanders at #Microsoft Ignite 2018 ❗️
08:04
πŸŽ™πŸ”₯ Cybersecurity Talk Special Edition πŸ”₯πŸŽ™: Interview with Jeffrey Snover at Microsoft Ignite 2018 ❗️
18:23
Hacks Weekly #35: Configuring Out Web Proxy Auto-Discovery
12:42
Hacks Weekly #34: Going Undercover With Invoke-Obfuscation
11:48
Hacks Weekly #33: How To Burp With Confidence - Our 5 Favourite Features
37:11
Hacks Weekly #32: Wrong Permission Delegation Can Dismantle Your Whole Active Directory!
01:17
πŸ›‘What Is Whitelisting & How It Can Prevent Malware Attack 🀫
14:11
Hacks Weekly #31: NSE Scripts – More Than Scanning
25:27
Hacks Weekly #30: Grab Files On The Fly – How To Protect Unencrypted Network Protocols?