NewStats: 3,263,657 , 8,180,919 topics. Date: Saturday, 07 June 2025 at 06:24 AM u45226382y |
(1) (of 1 pages)
![]() |
ive Reconnaissance Using Google Dorks, GHDB, and the Wayback Machine Part 1 https://www.youtube.com/watch?v=Re4ZKKkm8-k&t=29s Google Dorking & ive Reconnaissance Lab | Ethical Hacking Tutorial (Step-by-Step) 🔍 💣 ive Reconnaissance Using Google Dorks, GHDB, and the Wayback Machine! Ready to uncover the internet’s hidden secrets? In this hands-on lab, I walk you through Google Advanced Searches, Google Hacking Database (GHDB), and the Wayback Machine to perform ive reconnaissance like a pro ethical hacker. 🕵️‍♂️ Whether you're prepping for your Cisco Ethical Hacker, CompTIA Pentest, CEH or just love cybersecurity, this tutorial is a must-watch! 🎯 What you'll learn: ✅ Google Dorking techniques to find sensitive data ✅ Exploring GHDB for real hacker dorks ✅ Using the Wayback Machine to uncover archived secrets ✅ How hackers gather intel without triggering alarms ✅ Real-world applications for ethical hacking & penetration testing 🧠Level up your cyber skills with this practical walkthrough and start using Google like a hacker. This is the kind of intel gathering that ethical hackers use to get ahead—and stay legal. Check complete playlist for the ethical hacker course: https://www.youtube.com/playlist?list=PLmi6GtTayDkdiQzG7A4CLvSjSZbXFJxeq Dont forget to subscribe and share to stay updated. |
![]() |
Interested in Data Science- Analytics and Machine Learning SOUTECH Academy organizes as free remote session for interested prospects. Date: ( Sat-19th and Sun- 20th Nov 2022) Venue: Zoom, WhatsApp *Data Science* (Python, SPSS/Jamovi, Research Methods, BI with Google Data Studio ) Want to become a data analyst? Then the SOUTECH Academy custom made data science course is for you. Starts with a introduction to the python programming language, python libraries eg- numpy, pandas, pandas with some visualization libraries like matplotlib and seaborn. The course progresses with three machine learning algorithm- linear regression, logistics regression and deciscion tree. Research Methods and Data analysis using SPSS/Jamovi is next with exhaustive hands on for participants. The course course concludes with case studies for sales, business data intelligence using Google Data Studio. Duration: 5 weekends + 3 weeks follow up projects *Get started with the Initial 2 Classes for free* SOUTECH REMOTE ACADEMY is inviting you to a scheduled Zoom meeting. Topic: SOUTECH REMOTE ACADEMY's Zoom Meeting Time: Nov 19, 2022 11:00 AM West Central Africa Zoom Meeting https://us05web.zoom.us/j/88677210984?pwd=enBEZXJSVnVicHhLSUFTVXRFWFVGZz09 Meeting ID: 886 7721 0984 code: soutech Kindly forward to interested persons Thanks #teamSOUTECH www.soutechventures.com/courses Abuja, Owerri, Remote If interested send a message to s. link at time Via WhatsApp u will be added to a mentorship group ASAP. Thank. |
![]() |
Digital Forensics and Cyber Security Free Guide https://www.youtube.com/watch?v=jH2hrbm_HgE&list=PLmi6GtTayDkcqc21yiwejvT-r8pQh5R7B Learning objectives -------------- -Goals of computer forensics -Pursuing a career in computer forensics -Using open source and digital forensic tools -File system fundamentals -Acquiring data, preserving and presenting evidence data -Ensuring data integrity -Generating a digital forensic report Modules 1. Introduction and Understanding Computer Forensics: - Goals, History, Types of Investigation, Tools, Legal Implication, Current and Future Trends, Challenges, Anti-forensic Techniques, Compliance and Forensics, Cyber security and Forensics https://www.youtube.com/watch?v=jH2hrbm_HgE&list=PLmi6GtTayDkcqc21yiwejvT-r8pQh5R7B&index=1 2. Careers and Aspects of Digital Forensics: - Network, Operating System, Web Application, Cloud, Malware, Mobile and Email Forensics, Digital Forensic Certifications 3. Preparing for an Investigation: - Tools and Knowledge Requirements, Hardware, Software, Understanding Hex Numbers, Forensic OS Distributions 4. File System Fundamentals: - Boot sequence, Disk Drives, Master Boot Record(MBR),Partitions 5. Cryptography, Cracking And Steganography - Cryptography Concepts and Types, Cracking methodologies, Hiding Files and revealing hidden files during forensic investigations 6. Acquiring Data and Preserving Data - Data Aquizition approaches, static acquisition with open-source tools, dcfldd software, commercial tools for acquiring data, memory dump analysis with volatility. - Evidence Preservation approaches, Role of Write blockers, Software and Hardware Write blockers, Hashing and File Integrity and Algorithms, FTK Imager, Understanding Disk Mounting. https://www.youtube.com/watch?v=JRJITjuWc-k&list=PLmi6GtTayDkcqc21yiwejvT-r8pQh5R7B&index=8 7. Analyzing Data and Presentation Of Digital Evidence - Forensic Data Analysis, Staganography, Generating Reports, Tools for the course --------------------- -Windows and Linux Operating System -Autopsy -VMware -Hex Workshop -dcfldd -Volatility Foundation -FTK Imager -Openstego -Wireshark -VirusTotal -Sucuri -Bulk Extractor -DD Linux Utility -SysInternal -GParted -BinaryHexConverter.com Inbox if you need further guide and mentorship. thanks |
![]() |
You can learn these programs 1. Cisco Cybersecurity Essentials https://www.youtube.com/watch?v=dBvA-3hJV0c&list=PLmi6GtTayDkeMVTTktKD56AUoGovV5ubG Has about 20+ Hands on Labs and remote digital exam and digital badge 2. Cisco Information Technology Essentials https://www.youtube.com/watch?v=5jWTDrmthJ4&list=PLmi6GtTayDkfJZkLoSKIJWRW1bNMSyqJG This has about 30+ Hands on Labs and remote digital exam and digital badge 3. Cisco Cybersecurity Operations Associate https://www.youtube.com/watch?v=dBvA-3hJV0c&list=PLmi6GtTayDkeMVTTktKD56AUoGovV5ubG This has about 40+Hands on Labs and remote digital exam and digital badge As an accredited CISCO Academy you can get training, certification and digital badges and transcript for your learnings like https://credly.com//victor-chidi-okpuruka Start learning by watching the comprehensive videos on the channel and comment or check signature if you need assistance All the best in your tech career!
|
![]() |
Hello You can always watch the complete video of the training on youtube CyberOps is 28 Modules on NetAcad As an accredited CISCO Academy you can get training, certification and digital badges and transcript for your learnings like https://credly.com//victor-chidi-okpuruka Use my s in signature Connect on youtube or for any assistance you need. |
![]() |
Thanks for your response. You can reach me via my bio check out this video to see awesome entry level jobs you can get started with. - see you at the top- mentorship available https://www.youtube.com/watch?v=-KbHLLdWkqE |
![]() |
Complete Training Modules for CISCO CyberOps Associate https://www.youtube.com/watch?v=dBvA-3hJV0c&list=PLmi6GtTayDkeMVTTktKD56AUoGovV5ubG CyberOps Associate v1.0 covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center (SOC). Upon completion of the CyberOps Associate v1.0 course, students will be able to perform the following tasks: -Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events. -Explain the role of the Cybersecurity Operations Analyst in the enterprise. -Explain the Windows Operating System features and characteristics needed to cybersecurity analyses. -Explain the features and characteristics of the Linux Operating System. -Analyze the operation of network protocols and services. -Explain the operation of the network infrastructure. -Classify the various types of network attacks. -Use network monitoring tools to identify attacks against network protocols and services. -Explain how to prevent malicious access to computer networks, hosts, and data. -Explain the impacts of cryptography on network security monitoring. -Explain how to investigate endpoint vulnerabilities and attacks. -Evaluate network security alerts. -Analyze network intrusion data to identify compromised hosts and vulnerabilities. -Apply incident response models to manage network security incidents. Tools There are a number of tools and resources that are available to you that will help you in your journey as you develop your CyberOps skills and prepare for job opportunities. Lab Environment In this course, two virtual machines (VM) are used: CyberOps Workstation and Security Onion. These VMs provide all of the applications and latest security monitoring and network intrusion analysis capabilities needed for the course. The minimum RAM memory requirement to run CyberOps Workstation virtual machines is 1 GB. However, for the Security Onion virtual machine, 4 GB RAM is recommended. The RAM memory recommendation on Security Onion VM allows the services, such as network security monitoring (NSM), to function properly. Installation labs are available in the course and provide detailed steps to properly set up your VMs and the lab environment. About Security Onion Security Onion is developed by Security Onion Solutions. Security Onion is made available under GPL license. This course uses provides basic training in the use of Security Onion to validate the objectives of this course. For further training needs, visit the Security Onion Solutions developer site. https://www.youtube.com/watch?v=dBvA-3hJV0c&list=PLmi6GtTayDkeMVTTktKD56AUoGovV5ubG Let me know if you need any cyber security skill up questions and Thanks
|
![]() |
Free Complete Project Management Training Guide- All Knowledge Areas Covered https://www.youtube.com/watch?v=q3OA3AsWeYI&list=PLmi6GtTayDkfJbzTgOoYgttQHTOJlXTo0 During this training, you will learn that being a project management consultant is an exciting place to be. You will also understand how project managers help shape the success of organizations, implement new technology, change the business landscape, and have influence over all areas of a business. Project managers also earn a nice income and often move up the organizational chain into full-time management positions. In this course, we will examine the absolute basics of project management. Everyone has to start somewhere, right? In this fundamental course, we will explore the big picture of project management and the project management life cycle. You’ll finish this course with a great grasp of what project management is, what your roles and responsibilities as a project manager will be, and how to move forward in your career as a project manager. Just as this course is designed for people that are new to project management. It is also structured to give you a solid foundation of project management and to help you speak the project management language. Don’t worry this course is easy to follow, has a logical approach, and has a fun, can-do attitude in its delivery. Project managers use processes to move things forward. These processes are universal to all projects regardless of the industry you may work in. These processes are grouped into logical chunks and that’s our primary focus of the course. You’ll also learn the major components of the project management lifecycle: -Initiating the project -Planning the project -Executing the project -Monitoring and controlling the project -Closing the project
|
![]() |
I explained a wide range of career options and roles then looked at 5 certifications you can get to get you an entry level role within 30 days even if you have zero experience... https://www.youtube.com/watch?v=XCFoqRK72yM Let me know your thoughts and Willing to offer assistance to anyone interested in starting a career in cybersecurity ...
|
![]() |
nice one Awesome |
(1) (of 1 pages)
(Go Up)
Sections: How To . 33 Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or s on Nairaland. |