11:04 Exploring LoRA 17:57 Attacking Bluetooth 20:07 Surveying Tools for Bluetooth Monitoring 24:50 Understanding NFC Vulnerabilities 28:04 Exploring NFC Attacks and Case Studies 34:39 Introducing Cloud Computing Concepts 44:22 Exploring Container Technology 50:17 Understanding Serverless Computing 51:41 Surveying Cloud Computing Threats 59:17 Understanding Cloud Hacking and Cloud Security Implementations 1:06:53 Introducing the Different Cloud Deployment and Service Models 1:10:43 Surveying Patch Management in the Cloud 1:13:50 Performing Security Assessments in Cloud Environments 1:17:06 Introducing Agile, DevOps, and CICD Pipelines 1:25:23 Understanding Container Orchestration and an Introduction to Kubernetes 1:26:59 Exploring the Concepts of DevSecOps 1:31:08 Introducing Social Engineering Concepts 1:37:21 Exploring Social Engineering Techniques 1:44:45 Understanding the Insider Threat 1:47:23 Impersonation on Social Networking Sites 1:53:21 Understanding Identity Theft 1:57:48 Understanding Social Engineering Countermeasures 2:00:26 The Complete Cybersecurity Bootcamp Summary
Hide player controls
Hide resume playing