Facebook
Twitter
Google+
LinkedIn
Email
Join Cybrary

S3SS10N Wednesdays are weekly cyber security whiteboard lessons, around 15 minutes long, by Cybrary Instructors and SME’s. They are designed to provide you a midweek, byte-sized deep dive into technical cyber security content.
 
New episodes are published every Wednesday morning at 8:30 AM EST.


Invite a Friend

See all the S3SS10N Wednesdays

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here
Published: February 8, 2017 | By: John Foster | Views: 1440

This lesson teaches participants how to create a simple Python implant. An implant is a program on a computer which connects back to a command or control. There are many types of implants and numbers of meth ... Read More >

Published: February 8, 2017 | By: Timber Wolfe | Views: 410

This lesson covers Base64 Encoding. Base 64 Encoding is used so that information being passed up and down a wire doesn’t choke or confuse the wire during the transmission process. Base64 uses a limited cha ... Read More >

Published: February 1, 2017 | By: Timber Wolfe | Views: 819

XOR (Exclusive or) is an operation that outputs “true” only when inputs differ from one another. In the lesson above, Timber goes over the XOR “truth table” which explains this concep ... Read More >

Published: January 25, 2017 | By: Steven E. | Views: 1905

Join @infosec_eskimo as he gives a very light introduction into the world of SQL Injection.

Read More >
Published: January 18, 2017 | By: Andrew McNicol | Views: 6883

In this Session, Andrew McNicol challenges us to think outside the box when it comes to pentesting. Many beginning pentesters feel that tool suites such as Nexus and Metasploit are all they need in order to ... Read More >

Published: January 11, 2017 | By: Kelly Handerhan | Views: 1358

This is the second part in the Session Wednesday series on Network Services presented by Kelly Handerhan. To recap: part 1 covered DNS and DHCP with an overview of the DORA process which is short for Discove ... Read More >

Published: January 4, 2017 | By: Kelly Handerhan | Views: 1713

In this Session Wednesday video, Kelly Handerhan gives us an overview of common network services. The basics she covers will prepare you for the Network Infrastructure exam. Kelly introduces the four main se ... Read More >

Published: December 28, 2016 | By: Zack Meyers | Views: 4344

In this Session Wednesday video, Zack Meyers takes us on a tour of Burp Suite. If you’re unfamiliar with Burp, then you’re in for a real treat! Burp is a soup-to-nuts penetration testing tool for sniffin ... Read More >

Published: December 21, 2016 | By: John Foster | Views: 1789

In this Sessions Wednesday video, our host, John Foster, takes us on a fascinating exploration of debugging the infamous and dreaded Blue Screen of Death otherwise fondly known as simply the “BSOD.” John ... Read More >

Published: December 14, 2016 | By: Kelly Handerhan | Views: 1624

The first two sessions on DNS covered foundational topics including name resolution, records, and the evolution of the DNS system. In Part 3 of this Session Wednesday series, Kelly takes us on a deeper dive ... Read More >

Published: December 7, 2016 | By: Kelly Handerhan | Views: 2066

This lesson continues where the last left off with Domain Naming System (DNS). Essentially, DNS is a database which has information on the systems and services within an organization and is a collection of r ... Read More >

Published: November 30, 2016 | By: Kelly Handerhan | Views: 2893

Networks, Servers, Databases – OH MY!

This session offers an introductory look into Domain Naming System (DNS) and offers a look into the history of DNS.   Participants learn about:

Published: November 23, 2016 | By: Claude Williams | Views: 1065

This session covers cyber compliance and modern trends in the field. Today, the trend is to make cyber security a requirement for each and every organization. The roots of cyber security come from Informatio ... Read More >

Published: November 16, 2016 | By: Kelly Handerhan | Views: 3141

This session offers participants tips on how to pass the CISSP Exam. It bears iterating that while this exam is difficult, examinees who do not pass often find their knowledge fell short in one of the follow ... Read More >

Published: November 2, 2016 | By: Kelly Handerhan | Views: 6785
Published: October 26, 2016 | By: Infosec_Eskimo | Views: 2473

Join @infosec_eskimo has he gives a very light introduction into the quickly growing PowerShell post exploitation framework known as PowerShell. With support for Mimikatz, the Metasploit framework, privilege ... Read More >

Published: October 19, 2016 | By: Steven E | Views: 4612
Published: October 12, 2016 | By: John Foster | Views: 1274

This session covers symbolic execution and adds to information covered in a previous session covering P-trace. Symbolic execution is the method of processing a binary in order to discover what the normal wou ... Read More >

Published: October 5, 2016 | By: John Foster | Views: 3459

This session covers network programming which revolves around sockets and protocols. A socket is a computer’s physical connection point. Every socket has an address and protocol, which is the agreed upon c ... Read More >

Published: September 28, 2016 | By: Steven E | Views: 3787

PowerShell provides access to Win32 API, and is part of Windows Vista and higher.  It is popular on Windows and can be used to automate tedious tasks. Find out more about it and Empire.

Read More >
Published: September 21, 2016 | By: Dean Pompilio | Views: 1849

This lesson continues where the last one left off and covers NIST SP 800-30 and continues discussing different adversarial threat, considered malicious events such as malware, exploring and compromising, exp ... Read More >

Published: September 14, 2016 | By: Dean Pompilio | Views: 3268

This session covers the National Institute of Standards and Technology’s (NIST) guide for conducting risk assessments. This document gives an in-depth explanation about the best-practices according to the ... Read More >

Published: September 7, 2016 | By: Kelly Handerhan | Views: 3187

This session picks up where the previous session left off and layers upon the information that was previously given about network devices. The last section specifically discussed hubs, switches and routers. ... Read More >

Published: August 30, 2016 | By: Kelly Handerhan | Views: 7451
You must be a Cybrary member to view this S3SS10N Wednesday Video. Read More >
Published: August 15, 2016 | By: Kelly Handerhan | Views: 2765

This session covers implementing custom subnet masks and offers participants a quick and efficient shortcut to achieve this. By assigning a number, you subtract to get an increment which shows the network br ... Read More >

Published: August 15, 2016 | By: Kelly Handerhan | Views: 5505

This video covers sub netting. To be able to subnet, first it is important to understand binary to decimal conversion. Sub netting helps to create new IP addresses and this is especially important to know as ... Read More >

Published: August 10, 2016 | By: Kelly Handerhan | Views: 3642

This lesson covers decimal to binary to hexadecimal conversion. This knowledge is very handy to know prior to going into something such as sub netting. Hexadecimal conversion is also a good skill to have as ... Read More >

Published: August 3, 2016 | By: Max Alexander | Views: 2421
You must be a Cybrary member to view this S3SS10N Wednesday Video. L ... Read More >
Published: July 27, 2016 | By: StevenE | Views: 5327
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: July 20, 2016 | By: StevenE | Views: 2560
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: July 13, 2016 | By: StevenE | Views: 8510
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: July 6, 2016 | By: | Views: 9375

You must be a Cybrary member to view this S3SS10N Wednesday video. Join for free.

Read More >

Published: June 29, 2016 | By: Kelly Handerhan | Views: 3838

You must be a Cybrary member to view this S3SS10N Wednesday video. Join for free.

Read More >

Published: June 21, 2016 | By: John Foster | Views: 3198
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: June 13, 2016 | By: Kelly Handerhan | Views: 2631
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: June 7, 2016 | By: Kelly Handerhan | Views: 3375
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: June 1, 2016 | By: Joshua Marpet | Views: 3837
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: May 25, 2016 | By: Andrew McNicol | Views: 5576
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: May 18, 2016 | By: Kelly Handerhan | Views: 2314
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: May 11, 2016 | By: Andrew McNicol | Views: 7207
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: May 4, 2016 | By: Kelly Handerhan | Views: 2683
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: April 27, 2016 | By: Kelly Handerhan | Views: 2682
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: April 20, 2016 | By: Joshua Marpet | Views: 1397
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: April 13, 2016 | By: Kyle Hanslovan & Chris Bisnett | Views: 1923
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: April 6, 2016 | By: Max Alexander | Views: 2504
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: March 30, 2016 | By: George Schu | Views: 2434
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: March 23, 2016 | By: Kelly Handerhan | Views: 687

You must be a Cybrary member to view this S3SS10N Wednesday video. Join for free.

Read More >

Published: March 15, 2016 | By: Joshua Marpet | Views: 825
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: March 8, 2016 | By: George Schu | Views: 1556
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: March 2, 2016 | By: Dean Pompilio | Views: 7126
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: February 24, 2016 | By: Kelly Handerhan | Views: 2139
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: February 10, 2016 | By: Max Alexander | Views: 1021
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >
Published: February 3, 2016 | By: Kelly Handerhan | Views: 2316
You must be a Cybrary member to view this S3SS10N Wednesday Video .. Read More >

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Watering Hole Attack
Views: 126 / February 27, 2017
Ethical Hacking – Kali Linux 2.0 Tutorials
Views: 158 / February 27, 2017
Raw Log Anatomy: Understanding my SIEM System
Views: 2446 / February 26, 2017
Kali Linux – Hacking OS Tutorial Series
Views: 4714 / February 25, 2017
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel