Mossé Cyber Security Institute

@mosseinstitute - 505 本の動画

チャンネル登録者数 9820人

MCSI equips cyber operators and warriors with the knowledge and abilities they need to maintain operational superiority in the cyber domain. The certificatio...

最近の動画

Damien Manuel and Mike Trovato share AISA's 10-year history with professionalisation 1:05:06

Damien Manuel and Mike Trovato share AISA's 10-year history with professionalisation

Writing a Python program that interacts with Windows APIs 3:45

Writing a Python program that interacts with Windows APIs

Writing a C program that interacts with Windows APIs 5:12

Writing a C program that interacts with Windows APIs

Categories of Windows APIs 4:05

Categories of Windows APIs

What are Windows APIs? 4:22

What are Windows APIs?

Windows APIs and System Calls 3:20

Windows APIs and System Calls

Remote Procedure Calls 3:56

Remote Procedure Calls

Access Tokens 5:02

Access Tokens

Elevation 3:20

Elevation

Registry 6:21

Registry

Objects and Handles 3:52

Objects and Handles

Jobs 4:00

Jobs

Virtual Memory 2:50

Virtual Memory

Drivers 4:24

Drivers

Shared Memory 2:01

Shared Memory

Users and Groups 6:09

Users and Groups

What Sets Mossé Cyber Security Institute Apart From Other Training Platforms? #shorts 0:31

What Sets Mossé Cyber Security Institute Apart From Other Training Platforms? #shorts

How Does Mossé Cyber Security Institute Help Students Achieve Their Goals? #shorts 0:32

How Does Mossé Cyber Security Institute Help Students Achieve Their Goals? #shorts

What Support Does Mossé Cyber Security Institute Offer? #shorts 0:28

What Support Does Mossé Cyber Security Institute Offer? #shorts

What Content Does Mossé Cyber Security Institute Offer? #shorts 0:51

What Content Does Mossé Cyber Security Institute Offer? #shorts

How Can Students Use Mossé Cyber Security Institute To Improve Their Portfolio? #shorts 0:57

How Can Students Use Mossé Cyber Security Institute To Improve Their Portfolio? #shorts

How Does Mossé Cyber Security Institute Benefit Organizations And Individuals? #shorts 0:31

How Does Mossé Cyber Security Institute Benefit Organizations And Individuals? #shorts

How Do You Ensure Mossé Cyber Security Institute Is The Correct Solution For Organizations? #shorts 0:35

How Do You Ensure Mossé Cyber Security Institute Is The Correct Solution For Organizations? #shorts

How Can Mossé Cyber Security Institute Help Organizations Grow Their Team? #shorts 0:49

How Can Mossé Cyber Security Institute Help Organizations Grow Their Team? #shorts

How Does Mossé Cyber Security Institute Emphasize Real-World Mission Simulations? #shorts 0:26

How Does Mossé Cyber Security Institute Emphasize Real-World Mission Simulations? #shorts

How Do other platforms Fall Short on Practical Mission Simulations? #shorts 0:42

How Do other platforms Fall Short on Practical Mission Simulations? #shorts

How Do Other Platforms Fall Short Of Meeting Cyber Security Training Needs? #shorts 0:44

How Do Other Platforms Fall Short Of Meeting Cyber Security Training Needs? #shorts

What Does A Real World Mission Look Like? #shorts 0:35

What Does A Real World Mission Look Like? #shorts

How Do Students Become Cyber Security Experts? #shorts 0:58

How Do Students Become Cyber Security Experts? #shorts

Which Cyber Domain Would Be The Best For A Student To Study? #shorts 0:50

Which Cyber Domain Would Be The Best For A Student To Study? #shorts

Why Did You Decide To Use AI When Creating Videos? #shorts 0:57

Why Did You Decide To Use AI When Creating Videos? #shorts

Does Mossé Cyber Security Institute Supply Any Theory Other Than The Library? #shorts 0:51

Does Mossé Cyber Security Institute Supply Any Theory Other Than The Library? #shorts

Access Control Lists (ACLs) 5:49

Access Control Lists (ACLs)

What is the Mossé Cyber Security Institute Library? #shorts 0:59

What is the Mossé Cyber Security Institute Library? #shorts

How Can Mossé Cyber Security Institute Revolutionize Talent Vetting? #shorts 0:57

How Can Mossé Cyber Security Institute Revolutionize Talent Vetting? #shorts

How Does Mossé Cyber Security Institute Help Reduce The Cost Of Learning? #shorts 0:56

How Does Mossé Cyber Security Institute Help Reduce The Cost Of Learning? #shorts

What Are Students Saying About Mossé Cyber Security Institute? #shorts 0:42

What Are Students Saying About Mossé Cyber Security Institute? #shorts

How Did You Achieve Mossé Cyber Security Institute's Success Without Marketing? #shorts 0:49

How Did You Achieve Mossé Cyber Security Institute's Success Without Marketing? #shorts

How Does Mossé Cyber Security Institute Keep Up To Date With Current Trends? #shorts 0:48

How Does Mossé Cyber Security Institute Keep Up To Date With Current Trends? #shorts

How Does Mossé Cyber Security Institute Compliment Real-world Engagements? #shorts 0:48

How Does Mossé Cyber Security Institute Compliment Real-world Engagements? #shorts

How Did Mossé Cyber Security Institute Get Started? #shorts 0:51

How Did Mossé Cyber Security Institute Get Started? #shorts

How Was The User Experience When You First Built Mossé Cyber Security Institute? #shorts 0:20

How Was The User Experience When You First Built Mossé Cyber Security Institute? #shorts

What Issues Did You Face Building Mossé Cyber Security Institute? #shorts 0:46

What Issues Did You Face Building Mossé Cyber Security Institute? #shorts

How Did You Begin Building Mossé Cyber Security Institute? #shorts 0:43

How Did You Begin Building Mossé Cyber Security Institute? #shorts

Is Self-Taught the Key to Landing Your Dream Job? #shorts 0:44

Is Self-Taught the Key to Landing Your Dream Job? #shorts

How Does Mossé Cyber Security Institute Compare To Other Training Methods? #shorts 0:48

How Does Mossé Cyber Security Institute Compare To Other Training Methods? #shorts

Why did you decide to build Mossé Cyber Security Institute? #shorts 0:56

Why did you decide to build Mossé Cyber Security Institute? #shorts

Windows Services 3:11

Windows Services

Windows Threads 4:01

Windows Threads

Windows Processes 5:31

Windows Processes

User mode vs Kernel Mode 3:42

User mode vs Kernel Mode

How to Perform Compliance Management in an Organization 4:45

How to Perform Compliance Management in an Organization

What is Compliance Management and Why is it Important? 4:44

What is Compliance Management and Why is it Important?

Validating and Monitoring Security Controls 7:50

Validating and Monitoring Security Controls

Selecting Security Controls 4:56

Selecting Security Controls

Control Implementation Methods 3:40

Control Implementation Methods

Types of Internal Controls 3:47

Types of Internal Controls

What is a Control Objective and Control Measure? 3:49

What is a Control Objective and Control Measure?

What are Internal Controls? 4:11

What are Internal Controls?

Steps Involved in Business Continuity Planning 4:39

Steps Involved in Business Continuity Planning

What is Disaster Recovery Planning? 4:24

What is Disaster Recovery Planning?

What is Business Continuity Planning? 4:46

What is Business Continuity Planning?

Performing Risk Reporting 3:59

Performing Risk Reporting

Monitoring and Analyzing KRIs 5:30

Monitoring and Analyzing KRIs

Developing KRIs for Risk Monitoring 5:41

Developing KRIs for Risk Monitoring

Updating the Risk Register 4:00

Updating the Risk Register

What is a Risk Register? 3:05

What is a Risk Register?

Extracting and analyzing strings from a malware sample 8:02

Extracting and analyzing strings from a malware sample

Decompiling .NET code using ILSpy 3:51

Decompiling .NET code using ILSpy

Using Sysmon to analyze a malware sample 4:56

Using Sysmon to analyze a malware sample

Analyzing malware samples with ProcMon 8:45

Analyzing malware samples with ProcMon

Automated malware analysis with Cuckoo Sandbox 6:56

Automated malware analysis with Cuckoo Sandbox

Introduction to Dynamic Analysis 3:44

Introduction to Dynamic Analysis

Using YARA to identify and classify malware samples 5:43

Using YARA to identify and classify malware samples

Using file hashes to identify and classify malware samples 5:50

Using file hashes to identify and classify malware samples

Using PEStudio to analyze malware 8:07

Using PEStudio to analyze malware

Using the Linux 'file' utility to recover file types 7:29

Using the Linux 'file' utility to recover file types

Using Resource Hacker to retrieve a malware's resources 4:16

Using Resource Hacker to retrieve a malware's resources

Common IOCs to retrieve from malware reverse engineering 3:31

Common IOCs to retrieve from malware reverse engineering

Protocol for safely handling and sharing malware samples 5:12

Protocol for safely handling and sharing malware samples

Setting up a lab for Malware Reverse Engineering 3:58

Setting up a lab for Malware Reverse Engineering

What is Systematic Approach to Malware Analysis (SAMA)? 3:34

What is Systematic Approach to Malware Analysis (SAMA)?

How does malware work? 3:20

How does malware work?

What knowledge do I need to have to be a reverse engineer? 3:21

What knowledge do I need to have to be a reverse engineer?

What are the main categories of tools we use for SRE? 3:40

What are the main categories of tools we use for SRE?

Establishing Ownership and Accountability 3:54

Establishing Ownership and Accountability

Different Ways of Treating Risk 3:13

Different Ways of Treating Risk

The Risk Treatment Process 3:56

The Risk Treatment Process

Plagiarism detected 2:12

Plagiarism detected

Why do we reverse engineer software? 3:55

Why do we reverse engineer software?

Risk Criteria and Risk Evaluation 4:15

Risk Criteria and Risk Evaluation

Specialized Techniques for Risk Analysis 5:04

Specialized Techniques for Risk Analysis

Introduction to Reverse Engineering 2:44

Introduction to Reverse Engineering

How to use Discord and ask good IT questions 7:55

How to use Discord and ask good IT questions

Methods for Risk Analysis 5:51

Methods for Risk Analysis

Performing a Gap Analysis 3:49

Performing a Gap Analysis

The Risk Assessment Process 4:31

The Risk Assessment Process

The importance of creating personalized content 3:27

The importance of creating personalized content

Presentation tips for a professional video submission 3:48

Presentation tips for a professional video submission

How can I show off my progress? 2:50

How can I show off my progress?

動画

Damien Manuel and Mike Trovato share AISA's 10-year history with professionalisation 1:05:06

Damien Manuel and Mike Trovato share AISA's 10-year history with professionalisation

52 回視聴 - 12 日前

Writing a Python program that interacts with Windows APIs 3:45

Writing a Python program that interacts with Windows APIs

3140 回視聴 - 1 年前

Writing a C program that interacts with Windows APIs 5:12

Writing a C program that interacts with Windows APIs

1925 回視聴 - 1 年前

Categories of Windows APIs 4:05

Categories of Windows APIs

994 回視聴 - 1 年前

What are Windows APIs? 4:22

What are Windows APIs?

3187 回視聴 - 1 年前

Windows APIs and System Calls 3:20

Windows APIs and System Calls

2431 回視聴 - 1 年前

Remote Procedure Calls 3:56

Remote Procedure Calls

2447 回視聴 - 1 年前

Access Tokens 5:02

Access Tokens

1225 回視聴 - 1 年前

Elevation 3:20

Elevation

603 回視聴 - 1 年前

Registry 6:21

Registry

1368 回視聴 - 1 年前

Objects and Handles 3:52

Objects and Handles

1525 回視聴 - 1 年前

Jobs 4:00

Jobs

788 回視聴 - 1 年前