Social Media: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
|||
(38 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
= | __NOTOC__ | ||
<div style="display: flex;"> | |||
{| class="wikitable" | |||
<div style="flex: 0 0 150px; background-color: transparent;">[[File:Swarming monarch butterflies 2.png|frameless|190px|link=]]</div> | |||
<div style="flex: 1;"> | |||
<table style="border: none; background-color: transparent; text-align: center; width: 100%;"> | |||
{| style="border: none; text-align: center; width: 100%;" | |||
| style="background-color: #EBEBEB"| | |||
{| class="wikitable mw-collapsible mw-collapsed" style="border: none; background-color: transparent; text-align: center; width: 100%;" | |||
|+ <div style="font-weight:bold;">Cybersecurity Podcasts<br>[[File:Podcast-icon.svg|frameless|55px|link=]]</div> | |||
|- | |- | ||
! Podcast Link | ! Podcast Link | ||
Line 15: | Line 25: | ||
| A podcast by VICE News, exploring the latest trends and issues in the world of cybersecurity. | | A podcast by VICE News, exploring the latest trends and issues in the world of cybersecurity. | ||
|- | |- | ||
| [https:// | | [https://thecyberwire.com/podcasts/daily-podcast CyberWire Daily] | ||
| Daily news briefings, interviews, and analysis of cybersecurity trends and events. | | Daily news briefings, interviews, and analysis of cybersecurity trends and events. | ||
|- | |- | ||
| [https://www.grc.com/securitynow.htm Security Now] | | [https://www.grc.com/securitynow.htm Security Now] | ||
Line 33: | Line 34: | ||
| Examines social engineering and how humans are targeted in cyberattacks. | | Examines social engineering and how humans are targeted in cyberattacks. | ||
|- | |- | ||
| [https:// | | [https://omny.fm/shows/unsupervised-learning Unsupervised Learning] | ||
| Hosted by Daniel Miessler, covers a variety of security and technology-related topics. | | Hosted by Daniel Miessler, covers a variety of security and technology-related topics. | ||
|- | |- | ||
| [https://podcasts.apple.com/ | | [https://podcasts.apple.com/ca/podcast/down-the-security-rabbithole-podcast-dtsr/id466659176 Down the Security Rabbithole Podcast (DtSR)] | ||
| Engages in conversations about information security and its role in business, leadership, and everyday life. | | Engages in conversations about information security and its role in business, leadership, and everyday life. | ||
|- | |- | ||
| [https://sharedsecurity.net/podcast/ Shared Security] | | [https://sharedsecurity.net/category/podcast-episodes/ Shared Security] | ||
| Focuses on information security, privacy, and the protection of personal data. | | Focuses on information security, privacy, and the protection of personal data. | ||
|- | |- | ||
Line 45: | Line 46: | ||
| Explores the history of cybersecurity and notable incidents, featuring interviews with experts. | | Explores the history of cybersecurity and notable incidents, featuring interviews with experts. | ||
|- | |- | ||
| [https:// | | [https://barcodesecurity.com/ BarCode] | ||
| Discusses the intersection of technology, society, and law, exploring ethical and legal implications. | | Discusses the intersection of technology, society, and law, exploring ethical and legal implications. | ||
|- | |- | ||
| [https://inteltechniques.com/podcast.html The Privacy, Security, & OSINT Show] | | [https://inteltechniques.com/podcast.html The Privacy, Security, & OSINT Show] | ||
| Focuses on online privacy, security, and open-source intelligence techniques. | | Focuses on online privacy, security, and open-source intelligence techniques. | ||
|- | |- | ||
| [https://www.metisstrategy.com/technovation-podcast/ Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)] | | [https://www.metisstrategy.com/technovation-podcast/ Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)] | ||
| Interviews with technology leaders about their career journeys and insights into the tech industry. | | Interviews with technology leaders about their career journeys and insights into the tech industry. | ||
|- | |- | ||
| [https://www.social-engineer.org/ | | [https://www.social-engineer.org/podcasts/ The Social-Engineer Podcast] | ||
| Explores the art and science of social engineering, featuring experts in the field. | | Explores the art and science of social engineering, featuring experts in the field. | ||
|- | |- | ||
| [https://humanfactorsecurity.co.uk/ Human Factor Security] | | [https://humanfactorsecurity.co.uk/podcast-2/ Human Factor Security] | ||
| Discusses the human element of cybersecurity, including psychology, behavior, and awareness. | | Discusses the human element of cybersecurity, including psychology, behavior, and awareness. | ||
|- | |- | ||
| [https://gettingintoinfosec.com/ Getting Into Infosec] | | [https://gettingintoinfosec.com/ Getting Into Infosec] | ||
| Features interviews with professionals who share their journeys into the field of information security. | | Features interviews with professionals who share their journeys into the field of information security. | ||
|- | |- | ||
| [https://cybersecurityventures.com/podcasts/ Cyber Security Headlines] | | [https://cybersecurityventures.com/podcasts/ Cyber Security Headlines] | ||
Line 144: | Line 136: | ||
| Weekly news roundup covering the latest cybersecurity stories, vulnerabilities, and trends. | | Weekly news roundup covering the latest cybersecurity stories, vulnerabilities, and trends. | ||
|- | |- | ||
| [https://www. | | [https://www.speakeasysecurity.com/ Speakeasy Security] | ||
| Covers various cybersecurity topics, including threat analysis, malware research, and industry news. | | Covers various cybersecurity topics, including threat analysis, malware research, and industry news. | ||
|- | |- | ||
| [https://isc.sans.edu/podcast.html SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)] | | [https://isc.sans.edu/podcast.html SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)] | ||
| Provides daily cybersecurity news and analysis from the SANS Internet Stormcenter. | | Provides daily cybersecurity news and analysis from the SANS Internet Stormcenter. | ||
|} | |||
! | |||
{| class="wikitable mw-collapsible mw-collapsed" style="border: none; text-align: center; width: 100%; background-color: #EBEBEB;" | |||
|+ <div style="font-weight:bold;">Cybersecurity YouTube Channels<br>[[File:Youtube-icon.svg|frameless|55px|link=]]</div> | |||
|- | |||
! YouTube Channel Name | |||
! Description | |||
|- | |||
| [https://www.youtube.com/c/InsiderPHD InsiderPHD] | |||
| Videos on ethical hacking, security research, and technology tutorials. | |||
|- | |||
| [https://www.youtube.com/c/RanaKhalil Rana Khalil] | |||
| Covers various cybersecurity topics, including malware analysis and digital forensics. | |||
|- | |||
| [https://www.youtube.com/c/Spinthehack Spin the hack] | |||
| Focuses on hacking, cybersecurity, and digital privacy. | |||
|- | |||
| [https://www.youtube.com/c/PwnFunction PwnFunction] | |||
| Offers tutorials and demos on ethical hacking and penetration testing. | |||
|- | |||
| [https://www.youtube.com/c/CyberSecVillage Cyber Sec Village] | |||
| Provides talks and presentations from various cybersecurity events and conferences. | |||
|- | |||
| [https://www.youtube.com/c/FarahHawa Farah Hawa] | |||
| Discusses cybersecurity topics, privacy, and technology. | |||
|- | |||
| [https://www.youtube.com/c/StefanRows Stefan Rows] | |||
| Offers tutorials on web application security and ethical hacking. | |||
|- | |||
| [https://www.youtube.com/c/13cubed 13Cubed] | |||
| Focuses on digital forensics, incident response, and security analysis. | |||
|- | |||
| [https://www.youtube.com/c/ITSecurityLabs I.T Security Labs] | |||
| Provides tutorials and guides on cybersecurity and ethical hacking. | |||
|- | |||
| [https://www.youtube.com/c/CybrOfficial Cybr] | |||
| Offers cybersecurity tutorials, capture the flag (CTF) challenges, and more. | |||
|- | |||
| [https://www.youtube.com/c/TheXSSRat The XSS Rat] | |||
| Covers web application security, cross-site scripting (XSS), and ethical hacking. | |||
|- | |||
| [https://www.youtube.com/c/CristiVlad Cristi Vlad] | |||
| Discusses cybersecurity, bug bounty hunting, and security research. | |||
|- | |||
| [https://www.youtube.com/c/HackerOne HackerOne] | |||
| Features content related to bug bounty programs, vulnerability disclosure, and security. | |||
|- | |||
| [https://www.youtube.com/c/PinkDraconian PinkDraconian] | |||
| Focuses on security research, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/ElevateCyber Elevate Cyber] | |||
| Offers cybersecurity training, tutorials, and news updates. | |||
|- | |||
| [https://www.youtube.com/c/ForensicTech Forensic Tech] | |||
| Covers digital forensics, incident response, and malware analysis. | |||
|- | |||
| [https://www.youtube.com/c/Hak5 Hak5] | |||
| Features technology tutorials, hacking tools, and cybersecurity discussions. | |||
|- | |||
| [https://www.youtube.com/c/TheCyberMentor The cyber mentor] | |||
| Offers tutorials and guides on ethical hacking, penetration testing, and security. | |||
|- | |||
| [https://www.youtube.com/c/Nullbyte Null byte] | |||
| Provides tutorials and news related to hacking and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/HackerSploit Hackersploit] | |||
| Covers ethical hacking, penetration testing, and cybersecurity tutorials. | |||
|- | |||
| [https://www.youtube.com/c/STOK STOK] | |||
| Focuses on hacking tutorials, tools, and technology. | |||
|- | |||
| [https://www.youtube.com/c/ippsec IppSec] | |||
| Offers walkthroughs of capture the flag (CTF) challenges and vulnerable machines. | |||
|- | |||
| [https://www.youtube.com/c/ScriptKiddieHubTadi ScriptKiddieHub - Tadi] | |||
| Discusses cybersecurity, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/zSecurity zSecurity] | |||
| Provides tutorials, guides, and demos on ethical hacking and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/JonGood Jon Good] | |||
| Covers various cybersecurity topics, including hacking and penetration testing. | |||
|- | |||
| [https://www.youtube.com/c/AnkitChauhan1 Ankit Chauhan] | |||
| Offers tutorials and guides on ethical hacking, penetration testing, and security. | |||
|- | |||
| [https://www.youtube.com/c/CybersecurityWeb Cybersecurity Web] | |||
| Provides cybersecurity news, tutorials, and insights. | |||
|- | |||
| [https://www.youtube.com/c/247CTF 247CTF] | |||
| Offers capture the flag (CTF) challenges and tutorials on cybersecurity concepts. | |||
|- | |||
| [https://www.youtube.com/c/MotasemHamdan Motasem Hamdan] | |||
| Discusses cybersecurity, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/ITCareerQuestions I.T. Career Questions] | |||
| Provides career advice and guidance in the field of IT and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/Hacksplained Hacksplained] | |||
| Offers cybersecurity tutorials, demos, and explanations. | |||
|- | |||
| [https://www.youtube.com/c/BugBountyReportsExplained Bug Bounty Reports Explained] | |||
| Analyzes and explains bug bounty reports and vulnerabilities. | |||
|- | |||
| [https://www.youtube.com/c/TechChip TechChip] | |||
| Provides technology and cybersecurity tutorials. | |||
|- | |||
| [https://www.youtube.com/c/TechnicalNavigator Technical Navigator] | |||
| Covers technology, cybersecurity, and networking topics. | |||
|- | |||
| [https://www.youtube.com/c/BeauKnowsTechStuff Beau Knows Tech... Stuff] | |||
| Discusses technology, privacy, and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/CyberSecurityTV CyberSecurityTV] | |||
| Offers cybersecurity news, tutorials, and discussions. | |||
|- | |||
| [https://www.youtube.com/c/CYBEREVOLUTION CYBER EVOLUTION] | |||
| Covers various cybersecurity topics, including hacking and technology. | |||
|- | |||
| [https://www.youtube.com/c/DavidBombal David Bombal] | |||
| Provides networking and cybersecurity tutorials. | |||
|- | |||
| [https://www.youtube.com/c/Nahamsec Nahamsec] | |||
| Focuses on hacking, bug bounty hunting, and security. | |||
|- | |||
| [https://www.youtube.com/c/TheCyberExpert The cyber expert] | |||
| Offers cybersecurity tutorials and analysis. | |||
|- | |||
| [https://www.youtube.com/c/LoiLiangYang Loi Liang Yang] | |||
| Covers technology, hacking, and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/ProfessorMesser Professor Messer] | |||
| Provides technology and IT certification training. | |||
|- | |||
| [https://www.youtube.com/c/NetworkChuck NetworkChuck] | |||
| Offers networking and cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/JohnHammond010 John Hammond] | |||
| Covers cybersecurity, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/DarkSec DarkSec] | |||
| Provides cybersecurity tutorials and demos. | |||
|- | |||
| [https://www.youtube.com/c/superhero1 superhero1] | |||
| Focuses on hacking, security, and technology. | |||
|- | |||
| [https://www.youtube.com/c/CrytoCar CrytoCar] | |||
| Discusses technology, cybersecurity, and hacking. | |||
|- | |||
| [https://www.youtube.com/c/Cybercdh Cybercdh] | |||
| Offers cybersecurity tutorials, CTF challenges, and discussions. | |||
|- | |||
| [https://www.youtube.com/c/Zanidd Zanidd] | |||
| Covers cybersecurity, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/Seytonic Seytonic] | |||
| Provides tutorials on ethical hacking and technology. | |||
|- | |||
| [https://www.youtube.com/c/LiveOverflow LiveOverflow] | |||
| Offers videos on reverse engineering, exploitation, and hacking. | |||
|- | |||
| [https://www.youtube.com/c/SecurityFWD SecurityFWD] | |||
| Focuses on cybersecurity and privacy discussions. | |||
|- | |||
| [https://www.youtube.com/c/CryptoKnight CryptoKnight] | |||
| Discusses cryptocurrency and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/Computerphile Computerphile] | |||
| Explains various computer science and cybersecurity concepts. | |||
|- | |||
| [https://www.youtube.com/c/FindingUrPasswd FindingUrPasswd] | |||
| Offers cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/BittenTech Bitten tech] | |||
| Covers technology, cybersecurity, and ethical hacking. | |||
|- | |||
| [https://www.youtube.com/c/BusraDemir Busra Demir] | |||
| Provides cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/CyberAcademy Cyber Academy] | |||
| Focuses on cybersecurity education and training. | |||
|- | |||
| [https://www.youtube.com/c/Cyberspatial Cyberspatial] | |||
| Offers tutorials and discussions on cybersecurity topics. | |||
|- | |||
| [https://www.youtube.com/c/Techlore Techlore] | |||
| Discusses privacy, security, and technology. | |||
|- | |||
| [https://www.youtube.com/c/DerekRook Derek Rook] | |||
| Covers technology, cybersecurity, and ethical hacking. | |||
|- | |||
| [https://www.youtube.com/c/GynvaelEN GynvaelEN] | |||
| Offers reverse engineering, hacking, and technology tutorials. | |||
|- | |||
| [https://www.youtube.com/c/EthicalHackingSchool Ethical Hacking School] | |||
| Provides tutorials on ethical hacking and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/PratikDabhi Pratik Dabhi] | |||
| Focuses on cybersecurity, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/MrTurvey MrTurvey] | |||
| Offers cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/BugCrowd BugCrowd] | |||
| Features content related to bug bounty programs and security research. | |||
|- | |||
| [https://www.youtube.com/c/BlackPerl BlackPerl] | |||
| Provides cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/MurmusCTF MurmusCTF] | |||
| Offers capture the flag (CTF) challenges and tutorials. | |||
|- | |||
| [https://www.youtube.com/c/ECCouncil EC Council] | |||
| Covers cybersecurity and ethical hacking topics. | |||
|- | |||
| [https://www.youtube.com/c/PentestToolsCom Pentest-Tools Com] | |||
| Offers tutorials and discussions on penetration testing tools. | |||
|- | |||
| [https://www.youtube.com/c/TheHackersWorld The Hackers World] | |||
| Focuses on hacking, cybersecurity, and technology. | |||
|- | |||
| [https://www.youtube.com/c/GrantCollins Grant Collins] | |||
| Provides cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/BlackHat Black Hat] | |||
| Features talks and presentations from Black Hat security conferences. | |||
|- | |||
| [https://www.youtube.com/c/InfiniteLogins Infinite Logins] | |||
| Offers tutorials on ethical hacking and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/HackingSimplified Hacking Simplified] | |||
| Focuses on hacking tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/CalleSvensson Calle Svensson] | |||
| Provides tutorials on ethical hacking and technology. | |||
|- | |||
| [https://www.youtube.com/c/ehacking ehacking] | |||
| Covers various cybersecurity topics and tutorials. | |||
|- | |||
| [https://www.youtube.com/c/MastersinIT Masters in I.T] | |||
| Discusses technology and IT-related topics. | |||
|- | |||
| [https://www.youtube.com/c/InfoCK Info CK] | |||
| Offers tutorials and discussions on cybersecurity concepts. | |||
|- | |||
| [https://www.youtube.com/c/PhDSecurity PhD Security] | |||
| Focuses on cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/CyberInsecurity Cyber Insecurity] | |||
| Provides cybersecurity news and discussions. | |||
|- | |||
| [https://www.youtube.com/c/TroyHunt Troy Hunt] | |||
| Covers cybersecurity, privacy, and technology. | |||
|- | |||
| [https://www.youtube.com/c/Tech69 Tech69] | |||
| Offers technology tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/CloudSecurityPodcast Cloud Security Podcast] | |||
| Discusses cloud security challenges and best practices. | |||
|- | |||
| [https://www.youtube.com/c/HusseinNasser Hussein Nasser] | |||
| Provides technology and programming tutorials. | |||
|} | |||
|- | |||
! | |||
{| class="" style="border: none; background-color: transparent; text-align: center; width: 100%;" | |||
|+ <div style="position:relative; font-weight:bold;">Cybersecurity Linked-In Groups<br> | |||
[[File:linkedin-icon.svg|frameless|45px|center|link=]]<br>...Coming Soon...</div> | |||
|} | |||
| style="background-color: #EBEBEB"| | |||
{| class="" style="border: none; text-align: center; width: 100%;" | |||
|+ <div style="position:relative; font-weight:bold;">Cybersecurity Instagrams<br>[[File:Instagram-icon.svg|frameless|50px|link=]]<br>...Coming Soon...</div> | |||
|} | |||
|} | |} | ||
</table> | |||
</div> | |||
</div> |
Latest revision as of 20:01, 20 October 2023
|
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|