Social Media: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
(40 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
= | __NOTOC__ | ||
<div style="display: flex;"> | |||
= | <div style="flex: 0 0 150px; background-color: transparent;">[[File:Swarming monarch butterflies 2.png|frameless|190px|link=]]</div> | ||
==[[Cybersecurity | <div style="flex: 1;"> | ||
<table style="border: none; background-color: transparent; text-align: center; width: 100%;"> | |||
{| style="border: none; text-align: center; width: 100%;" | |||
| style="background-color: #EBEBEB"| | |||
{| class="wikitable mw-collapsible mw-collapsed" style="border: none; background-color: transparent; text-align: center; width: 100%;" | |||
|+ <div style="font-weight:bold;">Cybersecurity Podcasts<br>[[File:Podcast-icon.svg|frameless|55px|link=]]</div> | |||
|- | |||
! Podcast Link | |||
! Description | |||
|- | |||
| [https://www.smashingsecurity.com/ Smashing Security] | |||
| Two hosts discuss cybersecurity news, breaches, and offer practical tips for staying safe online. | |||
|- | |||
| [https://darknetdiaries.com/ Darknet Diaries] | |||
| Real stories from the dark side of the internet, exploring hacking, cybercrime, and digital espionage. | |||
|- | |||
| [https://www.vice.com/en/topic/cyber CYBER] | |||
| A podcast by VICE News, exploring the latest trends and issues in the world of cybersecurity. | |||
|- | |||
| [https://thecyberwire.com/podcasts/daily-podcast CyberWire Daily] | |||
| Daily news briefings, interviews, and analysis of cybersecurity trends and events. | |||
|- | |||
| [https://www.grc.com/securitynow.htm Security Now] | |||
| Hosted by Steve Gibson and Leo Laporte, this podcast covers a wide range of security topics, including news and in-depth discussions. | |||
|- | |||
| [https://www.thecyberwire.com/podcasts/hacking-humans.html Hacking Humans] | |||
| Examines social engineering and how humans are targeted in cyberattacks. | |||
|- | |||
| [https://omny.fm/shows/unsupervised-learning Unsupervised Learning] | |||
| Hosted by Daniel Miessler, covers a variety of security and technology-related topics. | |||
|- | |||
| [https://podcasts.apple.com/ca/podcast/down-the-security-rabbithole-podcast-dtsr/id466659176 Down the Security Rabbithole Podcast (DtSR)] | |||
| Engages in conversations about information security and its role in business, leadership, and everyday life. | |||
|- | |||
| [https://sharedsecurity.net/category/podcast-episodes/ Shared Security] | |||
| Focuses on information security, privacy, and the protection of personal data. | |||
|- | |||
| [https://malicious.life/ Malicious Life] | |||
| Explores the history of cybersecurity and notable incidents, featuring interviews with experts. | |||
|- | |||
| [https://barcodesecurity.com/ BarCode] | |||
| Discusses the intersection of technology, society, and law, exploring ethical and legal implications. | |||
|- | |||
| [https://inteltechniques.com/podcast.html The Privacy, Security, & OSINT Show] | |||
| Focuses on online privacy, security, and open-source intelligence techniques. | |||
|- | |||
| [https://www.metisstrategy.com/technovation-podcast/ Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)] | |||
| Interviews with technology leaders about their career journeys and insights into the tech industry. | |||
|- | |||
| [https://www.social-engineer.org/podcasts/ The Social-Engineer Podcast] | |||
| Explores the art and science of social engineering, featuring experts in the field. | |||
|- | |||
| [https://humanfactorsecurity.co.uk/podcast-2/ Human Factor Security] | |||
| Discusses the human element of cybersecurity, including psychology, behavior, and awareness. | |||
|- | |||
| [https://gettingintoinfosec.com/ Getting Into Infosec] | |||
| Features interviews with professionals who share their journeys into the field of information security. | |||
|- | |||
| [https://cybersecurityventures.com/podcasts/ Cyber Security Headlines] | |||
| Provides a daily roundup of the latest cybersecurity news headlines and stories. | |||
|- | |||
| [https://hackervalley.com/podcast Hacker Valley Studio] | |||
| Explores the human side of cybersecurity, sharing stories and insights from experts. | |||
|- | |||
| [https://www.cisecurity.org/resources/podcasts/defense-in-depth/ Defense in Depth] | |||
| Focuses on multiple layers of defense in the cybersecurity landscape, with insights and best practices. | |||
|- | |||
| [https://www.secplicity.org/category/podcast/ "The 443 - Security Simplified" Podcast | Secplicity] | |||
| Simplifies cybersecurity concepts and provides insights on the latest security trends. | |||
|- | |||
| [https://cybersecuritytoday.com/ Cybersecurity Today] | |||
| Offers a daily dose of cybersecurity news, insights, and stories from around the world. | |||
|- | |||
| [https://www.accessdeniedpodcast.com/ Access Denied] | |||
| Hosted by cybersecurity professionals, discussing various aspects of information security. | |||
|- | |||
| [https://www.infosecinstitute.com/cyberwork/ Cyber Work] | |||
| Provides insights into careers in cybersecurity, job roles, and industry trends. | |||
|- | |||
| [https://www.steptoe.com/podcasts/TheCyberlawPodcast/ The Cyberlaw Podcast] | |||
| Explores legal issues related to cybersecurity, privacy, and technology, featuring experts and analysis. | |||
|- | |||
| [https://defensivesecurity.org/podcast/ Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec] | |||
| Discusses security strategies, malware analysis, and incident response. | |||
|- | |||
| [https://www.cybrary.it/cybrary-podcast/ The Cybrary Podcast] | |||
| Discusses cybersecurity skills, career development, and industry trends. | |||
|- | |||
| [https://brakeingsecurity.com/ Brakeing Down Security Podcast] | |||
| Provides insights into various cybersecurity concepts, with a focus on learning and education. | |||
|- | |||
| [https://www.f-secure.com/en/business/podcasts/cyber-security-sauna Cyber Security Sauna] | |||
| Discusses cybersecurity topics, from threat hunting to incident response. | |||
|- | |||
| [https://cybersecurityinterviews.com/ Cyber Security Interviews] | |||
| Interviews with leading cybersecurity experts, discussing their experiences and insights. | |||
|- | |||
| [https://www.microsoft.com/security/blog/ Microsoft Security Insights Show] | |||
| Explores Microsoft's perspectives on cybersecurity, threat landscape, and industry insights. | |||
|- | |||
| [https://cisoseries.com/podcast/ CISO Series Podcast] | |||
| Focuses on cybersecurity leadership and CISO perspectives, covering a range of industry topics. | |||
|- | |||
| [https://www.databreachtoday.com/podcasts Data Breach Today Podcast] | |||
| Discusses data breaches, incident response, and best practices for data protection. | |||
|- | |||
| [https://nakedsecurity.sophos.com/category/podcasts/ Naked Security Podcast] | |||
| A podcast by Sophos, covers the latest in cybersecurity news, trends, and insights. | |||
|- | |||
| [https://cloudsecuritypodcast.tv/ Cloud Security Podcast] | |||
| Explores cloud security challenges, best practices, and strategies for protecting cloud environments. | |||
|- | |||
| [https://www.schneier.com/crypto-gram.html Crypto-Gram Security Podcast] | |||
| Hosted by Bruce Schneier, covers security news, trends, and insights. | |||
|- | |||
| [https://www.barbouille.com/ The Other Side Of The Firewall] | |||
| Offers insights into the world of cybersecurity and privacy, from both technical and human perspectives. | |||
|- | |||
| [https://7ms.us/podcast/ 7 Minute Security] | |||
| Focuses on security tips and best practices, delivered in short, easily digestible episodes. | |||
|- | |||
| [https://securityinfive.com/ Security In Five] | |||
| Short, focused episodes offering cybersecurity tips and best practices in just five minutes. | |||
|- | |||
| [https://cybersecuritymagazine.com/podcasts/ Cybercrime Magazine Podcast] | |||
| Features discussions on cybercrime, cybersecurity, and related topics, with insights from industry experts. | |||
|- | |||
| [https://securityweekly.com/podcasts/ Security Weekly News (Audio)] | |||
| Weekly news roundup covering the latest cybersecurity stories, vulnerabilities, and trends. | |||
|- | |||
| [https://www.speakeasysecurity.com/ Speakeasy Security] | |||
| Covers various cybersecurity topics, including threat analysis, malware research, and industry news. | |||
|- | |||
| [https://isc.sans.edu/podcast.html SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)] | |||
| Provides daily cybersecurity news and analysis from the SANS Internet Stormcenter. | |||
|} | |||
! | |||
{| class="wikitable mw-collapsible mw-collapsed" style="border: none; text-align: center; width: 100%; background-color: #EBEBEB;" | |||
|+ <div style="font-weight:bold;">Cybersecurity YouTube Channels<br>[[File:Youtube-icon.svg|frameless|55px|link=]]</div> | |||
|- | |||
! YouTube Channel Name | |||
! Description | |||
|- | |||
| [https://www.youtube.com/c/InsiderPHD InsiderPHD] | |||
| Videos on ethical hacking, security research, and technology tutorials. | |||
|- | |||
| [https://www.youtube.com/c/RanaKhalil Rana Khalil] | |||
| Covers various cybersecurity topics, including malware analysis and digital forensics. | |||
|- | |||
| [https://www.youtube.com/c/Spinthehack Spin the hack] | |||
| Focuses on hacking, cybersecurity, and digital privacy. | |||
|- | |||
| [https://www.youtube.com/c/PwnFunction PwnFunction] | |||
| Offers tutorials and demos on ethical hacking and penetration testing. | |||
|- | |||
| [https://www.youtube.com/c/CyberSecVillage Cyber Sec Village] | |||
| Provides talks and presentations from various cybersecurity events and conferences. | |||
|- | |||
| [https://www.youtube.com/c/FarahHawa Farah Hawa] | |||
| Discusses cybersecurity topics, privacy, and technology. | |||
|- | |||
| [https://www.youtube.com/c/StefanRows Stefan Rows] | |||
| Offers tutorials on web application security and ethical hacking. | |||
|- | |||
| [https://www.youtube.com/c/13cubed 13Cubed] | |||
| Focuses on digital forensics, incident response, and security analysis. | |||
|- | |||
| [https://www.youtube.com/c/ITSecurityLabs I.T Security Labs] | |||
| Provides tutorials and guides on cybersecurity and ethical hacking. | |||
|- | |||
| [https://www.youtube.com/c/CybrOfficial Cybr] | |||
| Offers cybersecurity tutorials, capture the flag (CTF) challenges, and more. | |||
|- | |||
| [https://www.youtube.com/c/TheXSSRat The XSS Rat] | |||
| Covers web application security, cross-site scripting (XSS), and ethical hacking. | |||
|- | |||
| [https://www.youtube.com/c/CristiVlad Cristi Vlad] | |||
| Discusses cybersecurity, bug bounty hunting, and security research. | |||
|- | |||
| [https://www.youtube.com/c/HackerOne HackerOne] | |||
| Features content related to bug bounty programs, vulnerability disclosure, and security. | |||
|- | |||
| [https://www.youtube.com/c/PinkDraconian PinkDraconian] | |||
| Focuses on security research, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/ElevateCyber Elevate Cyber] | |||
| Offers cybersecurity training, tutorials, and news updates. | |||
|- | |||
| [https://www.youtube.com/c/ForensicTech Forensic Tech] | |||
| Covers digital forensics, incident response, and malware analysis. | |||
|- | |||
| [https://www.youtube.com/c/Hak5 Hak5] | |||
| Features technology tutorials, hacking tools, and cybersecurity discussions. | |||
|- | |||
| [https://www.youtube.com/c/TheCyberMentor The cyber mentor] | |||
| Offers tutorials and guides on ethical hacking, penetration testing, and security. | |||
|- | |||
| [https://www.youtube.com/c/Nullbyte Null byte] | |||
| Provides tutorials and news related to hacking and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/HackerSploit Hackersploit] | |||
| Covers ethical hacking, penetration testing, and cybersecurity tutorials. | |||
|- | |||
| [https://www.youtube.com/c/STOK STOK] | |||
| Focuses on hacking tutorials, tools, and technology. | |||
|- | |||
| [https://www.youtube.com/c/ippsec IppSec] | |||
| Offers walkthroughs of capture the flag (CTF) challenges and vulnerable machines. | |||
|- | |||
| [https://www.youtube.com/c/ScriptKiddieHubTadi ScriptKiddieHub - Tadi] | |||
| Discusses cybersecurity, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/zSecurity zSecurity] | |||
| Provides tutorials, guides, and demos on ethical hacking and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/JonGood Jon Good] | |||
| Covers various cybersecurity topics, including hacking and penetration testing. | |||
|- | |||
| [https://www.youtube.com/c/AnkitChauhan1 Ankit Chauhan] | |||
| Offers tutorials and guides on ethical hacking, penetration testing, and security. | |||
|- | |||
| [https://www.youtube.com/c/CybersecurityWeb Cybersecurity Web] | |||
| Provides cybersecurity news, tutorials, and insights. | |||
|- | |||
| [https://www.youtube.com/c/247CTF 247CTF] | |||
| Offers capture the flag (CTF) challenges and tutorials on cybersecurity concepts. | |||
|- | |||
| [https://www.youtube.com/c/MotasemHamdan Motasem Hamdan] | |||
| Discusses cybersecurity, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/ITCareerQuestions I.T. Career Questions] | |||
| Provides career advice and guidance in the field of IT and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/Hacksplained Hacksplained] | |||
| Offers cybersecurity tutorials, demos, and explanations. | |||
|- | |||
| [https://www.youtube.com/c/BugBountyReportsExplained Bug Bounty Reports Explained] | |||
| Analyzes and explains bug bounty reports and vulnerabilities. | |||
|- | |||
| [https://www.youtube.com/c/TechChip TechChip] | |||
| Provides technology and cybersecurity tutorials. | |||
|- | |||
| [https://www.youtube.com/c/TechnicalNavigator Technical Navigator] | |||
| Covers technology, cybersecurity, and networking topics. | |||
|- | |||
| [https://www.youtube.com/c/BeauKnowsTechStuff Beau Knows Tech... Stuff] | |||
| Discusses technology, privacy, and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/CyberSecurityTV CyberSecurityTV] | |||
| Offers cybersecurity news, tutorials, and discussions. | |||
|- | |||
| [https://www.youtube.com/c/CYBEREVOLUTION CYBER EVOLUTION] | |||
| Covers various cybersecurity topics, including hacking and technology. | |||
|- | |||
| [https://www.youtube.com/c/DavidBombal David Bombal] | |||
| Provides networking and cybersecurity tutorials. | |||
|- | |||
| [https://www.youtube.com/c/Nahamsec Nahamsec] | |||
| Focuses on hacking, bug bounty hunting, and security. | |||
|- | |||
| [https://www.youtube.com/c/TheCyberExpert The cyber expert] | |||
| Offers cybersecurity tutorials and analysis. | |||
|- | |||
| [https://www.youtube.com/c/LoiLiangYang Loi Liang Yang] | |||
| Covers technology, hacking, and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/ProfessorMesser Professor Messer] | |||
| Provides technology and IT certification training. | |||
|- | |||
| [https://www.youtube.com/c/NetworkChuck NetworkChuck] | |||
| Offers networking and cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/JohnHammond010 John Hammond] | |||
| Covers cybersecurity, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/DarkSec DarkSec] | |||
| Provides cybersecurity tutorials and demos. | |||
|- | |||
| [https://www.youtube.com/c/superhero1 superhero1] | |||
| Focuses on hacking, security, and technology. | |||
|- | |||
| [https://www.youtube.com/c/CrytoCar CrytoCar] | |||
| Discusses technology, cybersecurity, and hacking. | |||
|- | |||
| [https://www.youtube.com/c/Cybercdh Cybercdh] | |||
| Offers cybersecurity tutorials, CTF challenges, and discussions. | |||
|- | |||
| [https://www.youtube.com/c/Zanidd Zanidd] | |||
| Covers cybersecurity, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/Seytonic Seytonic] | |||
| Provides tutorials on ethical hacking and technology. | |||
|- | |||
| [https://www.youtube.com/c/LiveOverflow LiveOverflow] | |||
| Offers videos on reverse engineering, exploitation, and hacking. | |||
|- | |||
| [https://www.youtube.com/c/SecurityFWD SecurityFWD] | |||
| Focuses on cybersecurity and privacy discussions. | |||
|- | |||
| [https://www.youtube.com/c/CryptoKnight CryptoKnight] | |||
| Discusses cryptocurrency and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/Computerphile Computerphile] | |||
| Explains various computer science and cybersecurity concepts. | |||
|- | |||
| [https://www.youtube.com/c/FindingUrPasswd FindingUrPasswd] | |||
| Offers cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/BittenTech Bitten tech] | |||
| Covers technology, cybersecurity, and ethical hacking. | |||
|- | |||
| [https://www.youtube.com/c/BusraDemir Busra Demir] | |||
| Provides cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/CyberAcademy Cyber Academy] | |||
| Focuses on cybersecurity education and training. | |||
|- | |||
| [https://www.youtube.com/c/Cyberspatial Cyberspatial] | |||
| Offers tutorials and discussions on cybersecurity topics. | |||
|- | |||
| [https://www.youtube.com/c/Techlore Techlore] | |||
| Discusses privacy, security, and technology. | |||
|- | |||
| [https://www.youtube.com/c/DerekRook Derek Rook] | |||
| Covers technology, cybersecurity, and ethical hacking. | |||
|- | |||
| [https://www.youtube.com/c/GynvaelEN GynvaelEN] | |||
| Offers reverse engineering, hacking, and technology tutorials. | |||
|- | |||
| [https://www.youtube.com/c/EthicalHackingSchool Ethical Hacking School] | |||
| Provides tutorials on ethical hacking and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/PratikDabhi Pratik Dabhi] | |||
| Focuses on cybersecurity, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/MrTurvey MrTurvey] | |||
| Offers cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/BugCrowd BugCrowd] | |||
| Features content related to bug bounty programs and security research. | |||
|- | |||
| [https://www.youtube.com/c/BlackPerl BlackPerl] | |||
| Provides cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/MurmusCTF MurmusCTF] | |||
| Offers capture the flag (CTF) challenges and tutorials. | |||
|- | |||
| [https://www.youtube.com/c/ECCouncil EC Council] | |||
| Covers cybersecurity and ethical hacking topics. | |||
|- | |||
| [https://www.youtube.com/c/PentestToolsCom Pentest-Tools Com] | |||
| Offers tutorials and discussions on penetration testing tools. | |||
|- | |||
| [https://www.youtube.com/c/TheHackersWorld The Hackers World] | |||
| Focuses on hacking, cybersecurity, and technology. | |||
|- | |||
| [https://www.youtube.com/c/GrantCollins Grant Collins] | |||
| Provides cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/BlackHat Black Hat] | |||
| Features talks and presentations from Black Hat security conferences. | |||
|- | |||
| [https://www.youtube.com/c/InfiniteLogins Infinite Logins] | |||
| Offers tutorials on ethical hacking and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/HackingSimplified Hacking Simplified] | |||
| Focuses on hacking tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/CalleSvensson Calle Svensson] | |||
| Provides tutorials on ethical hacking and technology. | |||
|- | |||
| [https://www.youtube.com/c/ehacking ehacking] | |||
| Covers various cybersecurity topics and tutorials. | |||
|- | |||
| [https://www.youtube.com/c/MastersinIT Masters in I.T] | |||
| Discusses technology and IT-related topics. | |||
|- | |||
| [https://www.youtube.com/c/InfoCK Info CK] | |||
| Offers tutorials and discussions on cybersecurity concepts. | |||
|- | |||
| [https://www.youtube.com/c/PhDSecurity PhD Security] | |||
| Focuses on cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/CyberInsecurity Cyber Insecurity] | |||
| Provides cybersecurity news and discussions. | |||
|- | |||
| [https://www.youtube.com/c/TroyHunt Troy Hunt] | |||
| Covers cybersecurity, privacy, and technology. | |||
|- | |||
| [https://www.youtube.com/c/Tech69 Tech69] | |||
| Offers technology tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/CloudSecurityPodcast Cloud Security Podcast] | |||
| Discusses cloud security challenges and best practices. | |||
|- | |||
| [https://www.youtube.com/c/HusseinNasser Hussein Nasser] | |||
| Provides technology and programming tutorials. | |||
|} | |||
|- | |||
! | |||
{| class="" style="border: none; background-color: transparent; text-align: center; width: 100%;" | |||
|+ <div style="position:relative; font-weight:bold;">Cybersecurity Linked-In Groups<br> | |||
[[File:linkedin-icon.svg|frameless|45px|center|link=]]<br>...Coming Soon...</div> | |||
|} | |||
| style="background-color: #EBEBEB"| | |||
{| class="" style="border: none; text-align: center; width: 100%;" | |||
|+ <div style="position:relative; font-weight:bold;">Cybersecurity Instagrams<br>[[File:Instagram-icon.svg|frameless|50px|link=]]<br>...Coming Soon...</div> | |||
|} | |||
|} | |||
</table> | |||
</div> | |||
</div> |
Latest revision as of 20:01, 20 October 2023
|
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|