Channel Avatar

O-Line Security @UCxSOw8PcovVuTcFejHXJUFw@youtube.com

4.5K subscribers - no pronouns :c

Welcome to O-Line Security - Where Cybersecurity Dreams Beco


22:39
How Ports & Protocols Work
01:20
How To Get Into IT
01:55
Quality Cybersecurity Training
02:09
Free Cybersecurity Training
01:35
Why Cybersecurity Training with O-Line Security?
02:25
Why O-Line Security?
01:13
Do You Need a Degree to Get Into IT?
05:16
Does O-Line Security Meet Your Expectations?
20:46
How to use Jira
08:53
How to Install VMware Fusion on MacBook's
16:29
Implementing a Firewall
17:15
Using Network Sniffers
18:01
Network Incident Investigation and Remediation
13:18
Configuring System Monitoring
31:42
Performing DNS Filtering
11:24
Hardening
23:35
Using Group Policy
16:00
Use Cases of Automation and Scripting
08:29
Training and Awareness through Simulation
27:28
Performing Penetration Testing
23:24
Performing Reconnaissance
08:53
Implementing Allow Lists and Deny Lists
19:46
Using a Playbook
13:33
Understanding On Path Attacks
15:20
Detecting and Responding to Malware
44:41
Performing Root Cause Analysis
25:48
Performing Digital Forensic
20:00
Incident Response Detection
10:29
Understanding Security Baselines
23:05
Performing Vulnerability Scans
10:34
Working with Threat Feeds
28:32
Exploiting and Detecting SQLi
26:50
Performing Drive Sanitization
21:19
Implementing Backups
22:48
Using Virtualization
14:03
Using Containers
21:07
Using IPSec Tunneling
22:27
Setting up Remote Access
24:32
Managing Permissions
30:12
Managing Password Security
24:54
Using Hashing and Salting
36:09
Using Storage Encryption
10:35
Implementing a Firewall
17:36
Using SET to Perform Social Engineering
19:41
Finding Open Service Ports
40:58
Configuring Examples of Security Control Types
20:57
Perform System Configuration Gap Analysis
32:36
Exploring the Lab Environment
07:26
Kali Linux Screen is Small
10:33
How to Install Splunk
18:34
Hack The Box: Irked w/o Metasploit
03:53
TCP 3 Way Handshake
41:41
Hack The Box: Bankrobber w/o Metasploit
00:31
Break Into Cybersecurity
36:33
Hack The Box: Forest w/o TartarSauce
36:37
Hack The Box: Forest w/o Metasploit
24:12
Hack The Box: Sunday w/o Metasploit
11:31
What is a Container?
14:07
Hack The Box: Chatterbox w/o Metasploit
28:54
Hack The Box: Poison w/o Metasploit