Security Fundamentals
Foundational Concepts
CIA Triad & Security Controls
Confidentiality, Integrity, Availability principles and security control frameworks
Security Models Overview
Compare Bell-LaPadula, Biba, Clark-Wilson, and Brewer-Nash for layered assurance
The Cyber Kill Chain
Adversary lifecycle phases with controls and detection opportunities
MITRE ATT&CK® Framework
Tactics, techniques, and procedures for threat-informed defense
Cryptography
Symmetric Cryptography
Shared key encryption, AES, and implementation security
Asymmetric Cryptography
Public key cryptography fundamentals (comprehensive guide)
Hashing Algorithms
Cryptographic hash functions, properties, and security applications
Hashing Calculator
Interactive hashing calculator with multiple algorithms
Symmetric Encryption Demo
Interactive symmetric encryption and decryption tool
PKI (Public Key Infrastructure)
Certificate authorities, digital certificates, and trust management
Steganography
Hidden data techniques and LSB bitmap image manipulation
Networking & Security Tools
SSH (Secure Shell)
Secure remote access with key management and authentication
SSL/TLS (Transport Security)
Cryptographic protocols for secure network communications
Nmap
Network mapping and security scanning tool (comprehensive guide)
Tshark
Command-line packet analysis and network troubleshooting
Ettercap
Comprehensive suite for MITM attacks and network analysis
Threats & Vulnerabilities
Malware Types & Detection
Survey of malware families and modern detection techniques
OWASP Top Ten
Critical web application risks with mitigation strategies and labs
CVSS & NVD
Score vulnerabilities and operationalize the National Vulnerability Database
Vulnerability Scanning Techniques
Exposure discovery using authenticated scans, agents, and cloud APIs
Threat Intelligence & Hunting
Run an intelligence-led hunt programme that reduces adversary dwell time
Information Gathering
System & Data Protection
Document Classification & DLP
Label sensitive assets, apply DLP controls, and govern subjects/objects effectively
Windows Defender & Security
Comprehensive guide to Windows built-in security features
BitLocker Drive Encryption
Microsoft's full-volume disk encryption for data protection
Firewall Technologies
Compare legacy, NGFW, WAF, host-based, and cloud-native firewall controls
Networking
IPv4 Addresses
Unified IPv4 addressing fundamentals, calculators, and references
IPv6 Addresses
IPv6 addressing and configuration (comprehensive guide)
NAT/PAT (Address Translation)
Network address translation for IP conservation and security
VLANs (Virtual LANs)
Network segmentation, trunking, and VLAN security configuration
VPN (Virtual Private Networks)
Site-to-Site, Remote Access, and SSL VPN implementations
RADIUS & TACACS+ Authentication
Centralized AAA protocols for network device access control
Common Ports Reference
Network ports and services reference (comprehensive guide)
DNS Query & Troubleshooting Tools
Compare nslookup, dig, and host to diagnose DNS issues effectively
DNS Infrastructure
Follow resolution from hosts file and caches to root, TLD, and authoritative servers
Ping & Traceroute Toolkit
Compare ping, traceroute, tracert, pathping, and mtr for connectivity analysis
Hardware Components
Processors (CPU)
Intel, AMD, and Apple Silicon architectures and performance comparison
RAM Memory
Memory types, specifications, and performance characteristics
Storage Devices
HDDs, SSDs, NVMe drives, and storage technology comparison
Peripheral Connections
USB, ports, and connectivity standards (comprehensive guide)
Hardware Comparison Tool
Interactive tool to compare and configure computer hardware
CPU Performance Tool
Analyze processor performance for gaming, workloads, and efficiency
RAM Calculator
Calculate memory performance, bandwidth, and suitability for different use cases
Storage Calculator
Compare storage performance, transfer times, and cost analysis
Windows
Windows 11 Clean Install
Offline install workflow and ms-cxh:localonly account bypass
Windows 11 Offline Account
Trigger ms-cxh:localonly to create local admin accounts during OOBE
Reset Your PC
PC reset and troubleshooting guide
DiskPart
Windows disk management command-line utility
Windows Admin Tools
System administration and management
Windows Registry & System32\config
Explore registry hives, SYSTEM32\config files, and safe maintenance practices
PowerShell Execution Policy
PowerShell security settings (comprehensive guide)
Windows 11 File Sharing
Create and manage network shares with security best practices
Install WSL
Windows Subsystem for Linux setup guide
Windows Shortcuts
Essential keyboard shortcuts and commands
Scripting & Automation
Bash Scripting
Master Linux shell scripting with development environments, constructs, and automation
PowerShell Scripting
Windows PowerShell cmdlets, ISE, and automation techniques
Python Scripting
Python automation, interpreters, and cybersecurity applications
Interactive Scripting Labs
Hands-on laboratories for Bash, PowerShell, and Python scripting
Cloud Computing
IT Governance
Compliance Frameworks
ISO 27000 Series
International information security management system standards
PCI DSS
Payment Card Industry Data Security Standard controls and requirements
SOX (Sarbanes-Oxley)
Financial reporting requirements and key IT general controls
GLBA
Gramm-Leach-Bliley Act data protection expectations for financial institutions
HIPAA
Healthcare privacy, security rules, and safeguarding of PHI
GDPR
European Union personal data protection obligations and governance
UK Data Protection Act
UK GDPR and DPA 2018 duties for controllers, processors, and individuals
UK Computer Misuse Act
Criminal offences and defences for unauthorised access and misuse of IT systems
Common Criteria
Global assurance framework for evaluating security of IT products and systems
Capability Maturity Models
Maturity-level frameworks (CMMI, CERT-RMM) for governing process and resilience improvements
Business Continuity & Disaster Recovery
Resilience planning, continuity execution, and recovery strategies for critical services
SIEM & SOAR Automation
Integrate detection and response platforms using APIs, webhooks, YAML/JSON playbooks, and data pipelines
Other Lectures
Information Warfare
Modern tactics and defense strategies
Backup Strategies
Data backup and recovery methods (comprehensive guide)
Windows & Linux Commands
Command comparison reference (comprehensive guide)
Security Podcasts
Recommended cybersecurity podcasts
A+ Glossary
Essential IT terms and definitions
Yorkshire Burger
Anglo-American fusion recipe
Learning Games
Hands-on Labs
Windows CMD Lab
Hands-on exercises for Command Prompt basics
Windows Defender Security Lab
Configure antivirus, firewall, and advanced security features
Task Manager Lab
Master all ways to open and use Task Manager
Performance Monitor Lab
Master PerfMon for system monitoring and troubleshooting
BitLocker USB Encryption Lab
Hands-on practice encrypting USB drives with BitLocker To Go
IIS Installation Lab
Install and configure Internet Information Services on Windows 11
Linux Terminal Lab
Master essential Linux/Unix command line operations
macOS Terminal Lab
Unix commands and Mac-specific terminal features
LSB Steganography Demo
1 bit per byte manipulation - hiding text in RGB pixel data
Quizzes
Numbers
Number Sequences
Mathematical sequences and patterns
Base-10 (Decimal) System
Understanding the decimal number system fundamentals
Base-2 (Binary) System
Binary number system - the language of computers
Base-16 (Hexadecimal) System
Hexadecimal system for memory addressing and networking
ASCII Table
Complete ASCII character encoding reference