Security Resources Part - 2
THE LINKS PROVIDED INT THIS POST ARE FROM DIFFERENT CHANNELS ON YOUTUBE FROM VARIOUS PENTESTER’S AND RESEARCHER’S TO HELP YOU LEARN.
I DO NOT OWN THEM, I’VE JUST CURATED THEM TOGEHTER SO THE CREDIT GOES TO THEM.
I KNOW THE LIST IS INCOMPLETE AND THERE ARE TONS OF PLAYLISTS OUT THERE WHICH WILL BE ADDED LATER.
I’D LIKE TO THANK ALL THE AUTHOR’S OF THESE TUTORIALS FOR THEIR CONTRIBUTION IT MEANS A LOT.
FEEL FREE TO CONTACT ME (r00tb3) TO ADD MORE LINKS TO THIS LIST.
I WILL BE UPDATING THIS LIST IN FUTURE, SO STAY TUNED!!
EDIT 1: NOW OTHER LINKS INCLUDED TOO.
EDIT 2: INDEX ADDED.
Table of Contents
-
9.1 GSM EXPLOITATION
FUNDAMENTALS
Computer Science - CRASH COURSE…
Basic Courses. (7 courses must do)
CompTIA Network+ N10-006 Training Course
CompTIA Security+ SY0-401 Certification Course - Playlist 1 of 2
CompTIA Security+ SY0-401 Certification Course - Playlist 2 of 2
danscourses (NETWORKING COUSRSES!!!)
98-366: Networking Fundamentals (MICROSOFT)
Comprehensive Guide To pfSense 2.3 (FIREWALL)
Kernel Recipes (Conference Talks related to Linux kernel!!)
PENETRATION TESTING
How To Become A Penetration Tester
Sam Bowne - Ethical Hacking and Network Defense
Kali Linux - Complete Training Program from Scratch
Tradecraft - Red Team Operations
Powershell For Security Professionals
Black Hills Information Security
WEB-APP SECURITY
Website Security: Web Application Penetration Testing (OWASP TOP 10)
Sam Bowne - Securing Web Applications
SQLI-LABS (DUMB SERIES BY AUDI-1)
ANDROID / iOS PENTESING
Billy Ellis - iOS Hacking/Security Research Tutorials
REVERSE ENGINEERING / DEBUGGING / EXPLOIT DEVELOPMENT
Sam Bowne - Exploit Development
Defcon-Russia UseAfterFree WORKSHOP
MALWARE ANALYSIS / FORENSICS
MalwareAnalysisForHedgehogs(MALWARE ONLY)
Sam Bowne - Practical Malware Analysis
Sam Bowne - Computer Forensics
CRYPTOGRAPHY
Cryptography Lectures- (PROF.CHRISTOFPARR)
WIRELESS
TELECOMMUNICATIONS SECURITY
Software Defined Radio with HackRF (Michael Ossmann)
Corrosive (SDR PLAYLISTS!!! MUST WATCH)
How To Setup and Use Your RTL-SDR or HackRF
Hak5: Intro to Software Defined Radio (SDR)
GSM EXPLOITATION
Baseband-Exploitation_(Highest paid vulns in embedded & telecom security)_
PODCASTS (Thanks to HrushikeshK)
Brakeing Down Security Podcast
Security Now (YouTube)