@mosseinstitute - 505 本の動画
チャンネル登録者数 9820人
MCSI equips cyber operators and warriors with the knowledge and abilities they need to maintain operational superiority in the cyber domain. The certificatio...
Damien Manuel and Mike Trovato share AISA's 10-year history with professionalisation
Writing a Python program that interacts with Windows APIs
Writing a C program that interacts with Windows APIs
Categories of Windows APIs
What are Windows APIs?
Windows APIs and System Calls
Remote Procedure Calls
Access Tokens
Elevation
Registry
Objects and Handles
Jobs
Virtual Memory
Drivers
Shared Memory
Users and Groups
What Sets Mossé Cyber Security Institute Apart From Other Training Platforms? #shorts
How Does Mossé Cyber Security Institute Help Students Achieve Their Goals? #shorts
What Support Does Mossé Cyber Security Institute Offer? #shorts
What Content Does Mossé Cyber Security Institute Offer? #shorts
How Can Students Use Mossé Cyber Security Institute To Improve Their Portfolio? #shorts
How Does Mossé Cyber Security Institute Benefit Organizations And Individuals? #shorts
How Do You Ensure Mossé Cyber Security Institute Is The Correct Solution For Organizations? #shorts
How Can Mossé Cyber Security Institute Help Organizations Grow Their Team? #shorts
How Does Mossé Cyber Security Institute Emphasize Real-World Mission Simulations? #shorts
How Do other platforms Fall Short on Practical Mission Simulations? #shorts
How Do Other Platforms Fall Short Of Meeting Cyber Security Training Needs? #shorts
What Does A Real World Mission Look Like? #shorts
How Do Students Become Cyber Security Experts? #shorts
Which Cyber Domain Would Be The Best For A Student To Study? #shorts
Why Did You Decide To Use AI When Creating Videos? #shorts
Does Mossé Cyber Security Institute Supply Any Theory Other Than The Library? #shorts
Access Control Lists (ACLs)
What is the Mossé Cyber Security Institute Library? #shorts
How Can Mossé Cyber Security Institute Revolutionize Talent Vetting? #shorts
How Does Mossé Cyber Security Institute Help Reduce The Cost Of Learning? #shorts
What Are Students Saying About Mossé Cyber Security Institute? #shorts
How Did You Achieve Mossé Cyber Security Institute's Success Without Marketing? #shorts
How Does Mossé Cyber Security Institute Keep Up To Date With Current Trends? #shorts
How Does Mossé Cyber Security Institute Compliment Real-world Engagements? #shorts
How Did Mossé Cyber Security Institute Get Started? #shorts
How Was The User Experience When You First Built Mossé Cyber Security Institute? #shorts
What Issues Did You Face Building Mossé Cyber Security Institute? #shorts
How Did You Begin Building Mossé Cyber Security Institute? #shorts
Is Self-Taught the Key to Landing Your Dream Job? #shorts
How Does Mossé Cyber Security Institute Compare To Other Training Methods? #shorts
Why did you decide to build Mossé Cyber Security Institute? #shorts
Windows Services
Windows Threads
Windows Processes
User mode vs Kernel Mode
How to Perform Compliance Management in an Organization
What is Compliance Management and Why is it Important?
Validating and Monitoring Security Controls
Selecting Security Controls
Control Implementation Methods
Types of Internal Controls
What is a Control Objective and Control Measure?
What are Internal Controls?
Steps Involved in Business Continuity Planning
What is Disaster Recovery Planning?
What is Business Continuity Planning?
Performing Risk Reporting
Monitoring and Analyzing KRIs
Developing KRIs for Risk Monitoring
Updating the Risk Register
What is a Risk Register?
Extracting and analyzing strings from a malware sample
Decompiling .NET code using ILSpy
Using Sysmon to analyze a malware sample
Analyzing malware samples with ProcMon
Automated malware analysis with Cuckoo Sandbox
Introduction to Dynamic Analysis
Using YARA to identify and classify malware samples
Using file hashes to identify and classify malware samples
Using PEStudio to analyze malware
Using the Linux 'file' utility to recover file types
Using Resource Hacker to retrieve a malware's resources
Common IOCs to retrieve from malware reverse engineering
Protocol for safely handling and sharing malware samples
Setting up a lab for Malware Reverse Engineering
What is Systematic Approach to Malware Analysis (SAMA)?
How does malware work?
What knowledge do I need to have to be a reverse engineer?
What are the main categories of tools we use for SRE?
Establishing Ownership and Accountability
Different Ways of Treating Risk
The Risk Treatment Process
Plagiarism detected
Why do we reverse engineer software?
Risk Criteria and Risk Evaluation
Specialized Techniques for Risk Analysis
Introduction to Reverse Engineering
How to use Discord and ask good IT questions
Methods for Risk Analysis
Performing a Gap Analysis
The Risk Assessment Process
The importance of creating personalized content
Presentation tips for a professional video submission
How can I show off my progress?
Damien Manuel and Mike Trovato share AISA's 10-year history with professionalisation
52 回視聴 - 12 日前