🐉 neospace ~
Search
Search
Dark mode
Light mode
Explorer
CYBVU 23.2
References
Man-in-the-Middle Attack MITM
Monoalphabetic Substitution Cipher - A Detailed Explanation
XSS vs HTML
Spring 24' Y1S2
Computer Architecture
🔗 Computer Architecture - CYBVU 23.2
Computer Organization
Introduction to Computer Architecture
Data Communications and Network
🔗 Data Communications and Networks
Lecture 1 - Introduction
Lecture 2 - Email Services
Lecture 3 - Data and Signals
Lecture 4 - Communication Medium
Lecture 5 - Wireless Medium
OOP with JAVA
🔗 Java - CYBVU 23.2
22 Aug Lecture Note
30th Aug Assignment Submission
Arithmetic Expressions
Data Types
Hello World, Escape Sequences, Comments
Introduction to Java
Java Full RECAP
String args
User input (Scanner)
Variables
Operating Systems
🔗 Operating Systems
Introduction to Operating Systems
Lec 2 Process Management
Lec 3 Process Control Management
Lec 4 Memory Management
Lec 5 Virtual Memory Management
Web Application Development
🔗 Web Application Development - CYBVU 23.2
All CSS Concepts at once (module related)
Client-Server Model
Essential JavaScript Concepts for This Module Pt.1
HTTP vs HTTPS
Introduction to HTML Part A
Introduction to HTML Part B
JavaScript Form Validation Pt. 3
JavaScript Pt. 2
PHP Pt. 1
PHP Pt. 2
Static vs Dynamic Pages
Website vs WebApp
What is the INTERNET?
World Wide Web (WWW)
Spring 24' Y1S2
Winter 24' Y2S1
NIT2102 Cybersec Essesntials
🔗 Cybersec Essentials
Lab 1 CSES
Lab 2 CSES
Lab 3 CSES
Lab 4 CSES
Lab 5 CSES
Lab 6 CSES
Lab 7 CSES
Week 1 - Introduction to Security
Week 2 - Malware and Social Engineering Attacks
Week 3 - Application and Networking-Based Attacks
Week 4 - Cryptography
Week 5 - Cryptography Part-II
NIT2122 Server Administration and Management
🔗 Server Administration and Management
Lab 1 SAAM
Lab 3 SAAM
Presentation Case Study
Week 1 Introduction to Windows Server
NIT2141 Digital Forensics and Ethical Hacking
🔗 Digital Forensics and Ethical Hacking
Lab 1 DFEH
Lab 2 DFEH
Lab 3 DFEH
Lab 4 DFEH
Lab 6 DFEH
Lab 7 DFEH
Lab 8 DFEH
Lab 9 DFEH
Research About Hashing
Week 1 - Intro to Digital Forensics and its Processes
Week 1 DFEH Before Class Activities
Week 2 - Computer Forensics
Week 3 - Mobile Forensics
Week 3 DFEH Before Class
Week 5 - Investigative Reports and Legal Acceptance
NIT2171 Introduction to Ict Management
🔗 Introduction to Ict Management
NIT2171 ICT Management Test 1
Week 1 - ICT trends and challengers
Winter 24' Y2S1
自学
Coursera
Google Cybersecurity Professional Certificate
1 - Foundations of Cybersecurity
Module 1
🔗 Module 1 Foundations of Cybersecurity
Common CyberSec Terminology
Core skills for cybersec professionals
Course 1 Overview
Google Cybersecurity Certificate Overview
Helpful resources and tips
Importance of CyberSecurity
Introduction to Cybersecurity
My Path to CyberSecurity
Nikki A day in the life of a security engineer
Responsibilities of an entry-level cybersecurity analyst
Transferable and technical cybersecurity skills
Veronica My path to working in cybersecurity
Welcome to the Google Cybersecurity Certificate
Wrap-up Module 01
Module 2
🔗 Module 2 Foundations of Cybersecurity
Attacks in the digital age
Common attacks and their effectiveness
Determine the type of attack
Glossary terms from module 2
Introduction to the eight CISSP security domains Part 1
Introduction to the eight CISSP security domains Part 2
Keep Your Cool during a data breach
Past CyberSecurity Attacks
Understand attackers
Welcome to module 2
Wrap-up Module 02
Foundations of Cybersecurity
🔗 Google Cybersecurity Professional Certificate
HackTheBox CTF
🔗 HackTheBox CTF
Low Logic
HTB Academy
🔗 HTB Academy
Introduction to Active Directory
Introduction to Networking
Networking Overview
Linkedin Learning
Career Essentials in GitHub Professional Certificate
1. Read YAML data - Python to process YAML with Codespaces
Career Essentials in GitHub Professional Certificate
Docker
How Actions Works
Python to process YAML with Codespaces
Prepare for the GitHub Foundations Certification
🔗 Prepare for the GitHub Foundations Certification
Branches
Changing History
Deleting and renaming files
git diff
Git stash and clean
Github Options
Ignore Files - gitignore
Manage Conflicts
Pushing to Github
Setting up Git
Understanding Environments
What is Git
What is Github
What is Version Control
Misc
IP Addressing and Subnetting
More about -sV and -sC
More About Alternate Data Stream
More About JQ
Understanding `$0` in awk
Understanding 2>&1 in Unix-like Shells
O'Reilly
Ethereum Fundamentals
🔐 Ethereum Fundamentals
Blockchain and Hashing
Blockchain Benefits and Disadvantages
Blockchain Operations
Ethereum Basics
The New Blockchain - Blockchain 2.0
PicoCTF
🔗 PicoGym
Big Zip
Binhexa
Blame Game
Bookmarklet
CanYouSee
Collaborative Development
Commitment Issues
Cookies
dont-you-love-banners
endianness
First Find
Glory of the garden
Includes
Information
Inspect HTML
Inspector
interencdec
Local Authority
runme.py
SansAlpha
Scan Surprise
Scavenger Hunt
Secret of the Polyglot
Super SSH
Time Machine
Unminify
Verify
WebDecode
Where are the robots
Raspberry Pi
Pi Metasploitable
Raspberry Pi Kali-Linux Headless Setup
TryHackMe
Advent of Cyber 2024
Advent of Cyber 2024 ⛄️❄️
Day 1 Maybe SOC-mas music, he thought, doesn't come from a store?
Day 2 One man's false positive is another man's potpourri
Day 3 Even if I wanted to go, their vulnerabilities wouldn't allow it
Day 4 I'm all atomic inside!
Day 5 SOC-mas XX-what-ee
Day 6 If I can't find a nice malware to use, I'm not going
Day 7 Oh, no. I'M SPEAKING IN CLOUDTRAIL!
CTFs
Blue
Light
Modules
Command Line
Cryptography
Networking
Networking Fundamentals
Windows and AD Fundamentals
Paths
CyberSecurity 101
Walkthroughs
Active Directory Basics
Cryptography Basics
Defensive Security Intro
Intro to LAN
Linux Shells
Metasploit Introduction
Networking Concepts
Offensive Security Intro
Public Key Cryptography Basics
Search Skills
Summary - Active Directory Basics
What is Networking
Windows Command Line
Windows Fundamentals 1
Windows Fundamentals 2
Windows Fundamentals 3
Windows PowerShell
🐧 TryHackMe
TryHackMe TODO List
Youtube
100+ Docker Concepts you Need to Know
before you code, learn how computers work
Docker in 100 Seconds
Kerberos Authentication
Kubernetes 101
Youtube Learnings
About Me
Blog Posts 📚
Home
❯
自学
❯
HTB Academy
Folder: 自学/HTB-Academy
4 items under this folder.
Feb 13, 2025
Introduction to Active Directory
HTB-Academy
TIER0
Feb 13, 2025
Introduction to Networking
Feb 13, 2025
Networking Overview
Networking
Feb 13, 2025
🔗 HTB Academy