September 25, 2024
What is a hacker and how do they think? Why should you learn to hack?
October 2, 2024
We break down how SQL injection works, how it's abused in real attacks, and what developers can do to stop it.
October 9, 2024
An introduction to Burp Suite and how it's used to inspect, modify, and test web traffic.
October 11, 2024
How do you protect yourself online? We go over a few ways to prevent your data from getting leaked online.
October 16, 2024
How cross-site scripting attacks work, why they're common, and how attackers use them to target users.
October 23, 2024
Jeff Cochran (Staff Software Engineer, Security) from ASAPP talks about threat modeling and the real world implications of modern generative AI driven systems.
October 30, 2024
Josh Benaloh, a Senior Principal Cryptographer at Microsoft Research presents verifiable election technologies and how voters can know their votes have been counted.
November 8, 2024
We cover how Tor works, why people use it, and what it does (and doesn't) protect you from.
November 20, 2024
An overview of CTFs, the kinds of challenges you'll see, and how to start competing.
November 22, 2024
A look at the history and impact of the Anonymous hacker collective.
December 4, 2024
A practical look at encryption, hashing, and other crypto basics, with examples of where they show up in everyday tech.
January 8, 2025
Hands-on introduction to lockpicking techniques and physical security.
January 10, 2025
Advanced cryptographic concepts building on Crypto 101.
January 15, 2025
HTTP Request Smuggling, CSRF, Same Origin Policy, Directory Traversal, Cookies, and SSRF vulnerabilities.
January 24, 2025
Introduction to computer hardware and setting up your own homelab environment.
January 31, 2025
Skillset from Hell: Introduction to Open Source Intelligence gathering techniques.
February 5, 2025
Understanding Active Directory architecture, exploitation, and security.
February 19, 2025
Introduction to side-channel attacks and unconventional attack vectors.
March 5, 2025
Understanding JWT structure, vulnerabilities, and security best practices.
March 7, 2025
Introduction to bug bounty programs and responsible disclosure.
April 2, 2025
Fundamentals of networking protocols and how the internet works.
April 9, 2025
Analysis of the Stuxnet malware and its impact on industrial control systems.
April 16, 2025
Introduction to VMs and Linux terminal basics.
April 18, 2025
Scripting basics for Windows PowerShell and Unix/Linux Bash.
April 23, 2025
Preparing for cybersecurity job interviews and technical questions.
April 30, 2025
Deep dive on Android operating system architecture and mobile security.
May 7, 2025
Best practices for maintaining operational security in the digital age, especially given the current times.
May 9, 2025
Understanding different types of malware and how they work.