Channel Avatar

CyberPro Tec @UCbT2JRxmrt_2khIU4Hkg6Yg@youtube.com

1.2K subscribers - no pronouns :c

Welcome to our channel, where we empower IT professionals wi


21:29
Adversary Emulation-Detection Capability 4
45:53
Adversary Emulation-Detection Capability 3
29:16
Adversary Emulation-Detection Capability 2
36:48
Adversary Emulation-Detection Capability 1
54:23
Docker_2.0: Docker Volumes & Building Docker Images
58:00
Docker_1.0
35:21
SuperMario Deployment Locally Using Docker and on EKS
40:28
Active Directory Security Hardening V3: Kerberos Authentication Security
18:28
Active Directory Security Hardening V2
45:27
Active Directory Security Hardening V1
47:06
Hunt 2: Insider Threat
35:11
Hunt 1: DDoS Attack Hunt Using Log Parser Studio
37:51
Secure Your RDP with Privilege Access Workstation, Jump-host and IPSec
23:41
Part 5: Wazuh Deployment On EKS
41:39
Part 4: Wazuh Firehose Guarduty integration and Agent Enroll
34:11
Part 3: Wazuh Integrations - Incident Handling and Reporting
27:54
Part 2: Wazuh Integrations Backup/Restore Configurations
18:28
Part 1: Wazuh EKS Cluster Deployment
16:01
From Local Admin to Domain Admin - Hypobrychium
05:32
Burp Suite - Fuzzing for valid Extensions
17:24
Burp Suite - Fuzzing for valid files
10:55
Burp Suite - Fuzzing for credentials
15:22
Burp Suite Beginner to Pro - Scanner_01
12:57
Burp Suite Beginner to Pro - 2
16:40
Burp Suite Beginner to Pro - 1
15:28
Linux System Admin 4
18:13
Linux System Admin - 3
20:25
Linux System Admin - 2
29:25
Linux System Admin - 1
23:19
Hosting WordPress Using Amazon S3
32:49
Manage Applications at Scale with Amazon ECS
23:53
Working with Amazon Elastic Container Service
23:18
Caching Static Files with Amazon CloudFront
16:59
Streaming Dynamic Content using Amazon CloudFront
43:00
Automating AWS Services with Scripting and the AWS CLI
17:45
AWS Identity and Access Management IAM
32:26
Launching and Managing a Web Application with AWS CloudFormation
23:59
Creating AWS VPC with CloudFormation
27:35
Building Serverless Applications with an Event Driven Architecture on AWS
18:36
Build Helo WOrld REST API with Lambda Proxy Integration in AWS
21:49
Use CodeCommit, CodePipeline, and CloudFront to Build and Expose a Static Website
20:30
Build HTTP API with a Private Integration to Amazon ECS
22:51
Create an API to Create Read Use Put data to DynamoDB
01:10:05
Building your Applications on AWS - The Serverless Approach
19:25
API Security - API Firewall
10:10
Kiba tRYhackMe Walkthrough
21:16
Tech Supp0rt-1 TryHackMe
01:05:23
Container Security
19:36
Using Microsoft Visual Studio to build and host .Net application
18:12
Use GitLab CICD to backup your Application into AWS S3
25:38
Site to Site VPN with Amazon Web Services
30:54
Linux Special Permission (ACL) V1
21:06
FireEye Redline - Investigating Windows
10:42
AS REP Roasting Active Directory
12:24
BloodHound and SharpHound AD Enumeration
09:28
Service Principal Name SPN Abuse - Kerberoasting
08:47
Phishing with SET
13:42
Adding Myself to Your Network
22:03
Biteme TryHackMe Bruteforcing MFA
09:49
ProjectDiscovery - Uncover: Active Recon