Social Media: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
|||
Line 151: | Line 151: | ||
|} | |} | ||
=Cybersecurity YouTube Channels= | |||
NEED TO INSPECT LINKS & EMBED THE TABLE BELOW INSIDE OF A COLLAPSABLE HEADING | |||
{| class="wikitable" | |||
|- | |||
! YouTube Channel Name | |||
! Description | |||
|- | |||
| [https://www.youtube.com/c/InsiderPHD InsiderPHD] | |||
| Videos on ethical hacking, security research, and technology tutorials. | |||
|- | |||
| [https://www.youtube.com/c/RanaKhalil Rana Khalil] | |||
| Covers various cybersecurity topics, including malware analysis and digital forensics. | |||
|- | |||
| [https://www.youtube.com/c/Spinthehack Spin the hack] | |||
| Focuses on hacking, cybersecurity, and digital privacy. | |||
|- | |||
| [https://www.youtube.com/c/PwnFunction PwnFunction] | |||
| Offers tutorials and demos on ethical hacking and penetration testing. | |||
|- | |||
| [https://www.youtube.com/c/CyberSecVillage Cyber Sec Village] | |||
| Provides talks and presentations from various cybersecurity events and conferences. | |||
|- | |||
| [https://www.youtube.com/c/FarahHawa Farah Hawa] | |||
| Discusses cybersecurity topics, privacy, and technology. | |||
|- | |||
| [https://www.youtube.com/c/StefanRows Stefan Rows] | |||
| Offers tutorials on web application security and ethical hacking. | |||
|- | |||
| [https://www.youtube.com/c/13cubed 13Cubed] | |||
| Focuses on digital forensics, incident response, and security analysis. | |||
|- | |||
| [https://www.youtube.com/c/ITSecurityLabs I.T Security Labs] | |||
| Provides tutorials and guides on cybersecurity and ethical hacking. | |||
|- | |||
| [https://www.youtube.com/c/CybrOfficial Cybr] | |||
| Offers cybersecurity tutorials, capture the flag (CTF) challenges, and more. | |||
|- | |||
| [https://www.youtube.com/c/TheXSSRat The XSS Rat] | |||
| Covers web application security, cross-site scripting (XSS), and ethical hacking. | |||
|- | |||
| [https://www.youtube.com/c/CristiVlad Cristi Vlad] | |||
| Discusses cybersecurity, bug bounty hunting, and security research. | |||
|- | |||
| [https://www.youtube.com/c/HackerOne HackerOne] | |||
| Features content related to bug bounty programs, vulnerability disclosure, and security. | |||
|- | |||
| [https://www.youtube.com/c/PinkDraconian PinkDraconian] | |||
| Focuses on security research, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/ElevateCyber Elevate Cyber] | |||
| Offers cybersecurity training, tutorials, and news updates. | |||
|- | |||
| [https://www.youtube.com/c/ForensicTech Forensic Tech] | |||
| Covers digital forensics, incident response, and malware analysis. | |||
|- | |||
| [https://www.youtube.com/c/Hak5 Hak5] | |||
| Features technology tutorials, hacking tools, and cybersecurity discussions. | |||
|- | |||
| [https://www.youtube.com/c/TheCyberMentor The cyber mentor] | |||
| Offers tutorials and guides on ethical hacking, penetration testing, and security. | |||
|- | |||
| [https://www.youtube.com/c/Nullbyte Null byte] | |||
| Provides tutorials and news related to hacking and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/HackerSploit Hackersploit] | |||
| Covers ethical hacking, penetration testing, and cybersecurity tutorials. | |||
|- | |||
| [https://www.youtube.com/c/STOK STOK] | |||
| Focuses on hacking tutorials, tools, and technology. | |||
|- | |||
| [https://www.youtube.com/c/ippsec IppSec] | |||
| Offers walkthroughs of capture the flag (CTF) challenges and vulnerable machines. | |||
|- | |||
| [https://www.youtube.com/c/ScriptKiddieHubTadi ScriptKiddieHub - Tadi] | |||
| Discusses cybersecurity, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/zSecurity zSecurity] | |||
| Provides tutorials, guides, and demos on ethical hacking and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/JonGood Jon Good] | |||
| Covers various cybersecurity topics, including hacking and penetration testing. | |||
|- | |||
| [https://www.youtube.com/c/AnkitChauhan1 Ankit Chauhan] | |||
| Offers tutorials and guides on ethical hacking, penetration testing, and security. | |||
|- | |||
| [https://www.youtube.com/c/CybersecurityWeb Cybersecurity Web] | |||
| Provides cybersecurity news, tutorials, and insights. | |||
|- | |||
| [https://www.youtube.com/c/247CTF 247CTF] | |||
| Offers capture the flag (CTF) challenges and tutorials on cybersecurity concepts. | |||
|- | |||
| [https://www.youtube.com/c/MotasemHamdan Motasem Hamdan] | |||
| Discusses cybersecurity, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/ITCareerQuestions I.T. Career Questions] | |||
| Provides career advice and guidance in the field of IT and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/Hacksplained Hacksplained] | |||
| Offers cybersecurity tutorials, demos, and explanations. | |||
|- | |||
| [https://www.youtube.com/c/BugBountyReportsExplained Bug Bounty Reports Explained] | |||
| Analyzes and explains bug bounty reports and vulnerabilities. | |||
|- | |||
| [https://www.youtube.com/c/TechChip TechChip] | |||
| Provides technology and cybersecurity tutorials. | |||
|- | |||
| [https://www.youtube.com/c/TechnicalNavigator Technical Navigator] | |||
| Covers technology, cybersecurity, and networking topics. | |||
|- | |||
| [https://www.youtube.com/c/BeauKnowsTechStuff Beau Knows Tech... Stuff] | |||
| Discusses technology, privacy, and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/CyberSecurityTV CyberSecurityTV] | |||
| Offers cybersecurity news, tutorials, and discussions. | |||
|- | |||
| [https://www.youtube.com/c/CYBEREVOLUTION CYBER EVOLUTION] | |||
| Covers various cybersecurity topics, including hacking and technology. | |||
|- | |||
| [https://www.youtube.com/c/DavidBombal David Bombal] | |||
| Provides networking and cybersecurity tutorials. | |||
|- | |||
| [https://www.youtube.com/c/Nahamsec Nahamsec] | |||
| Focuses on hacking, bug bounty hunting, and security. | |||
|- | |||
| [https://www.youtube.com/c/TheCyberExpert The cyber expert] | |||
| Offers cybersecurity tutorials and analysis. | |||
|- | |||
| [https://www.youtube.com/c/LoiLiangYang Loi Liang Yang] | |||
| Covers technology, hacking, and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/ProfessorMesser Professor Messer] | |||
| Provides technology and IT certification training. | |||
|- | |||
| [https://www.youtube.com/c/NetworkChuck NetworkChuck] | |||
| Offers networking and cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/JohnHammond010 John Hammond] | |||
| Covers cybersecurity, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/DarkSec DarkSec] | |||
| Provides cybersecurity tutorials and demos. | |||
|- | |||
| [https://www.youtube.com/c/superhero1 superhero1] | |||
| Focuses on hacking, security, and technology. | |||
|- | |||
| [https://www.youtube.com/c/CrytoCar CrytoCar] | |||
| Discusses technology, cybersecurity, and hacking. | |||
|- | |||
| [https://www.youtube.com/c/Cybercdh Cybercdh] | |||
| Offers cybersecurity tutorials, CTF challenges, and discussions. | |||
|- | |||
| [https://www.youtube.com/c/Zanidd Zanidd] | |||
| Covers cybersecurity, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/Seytonic Seytonic] | |||
| Provides tutorials on ethical hacking and technology. | |||
|- | |||
| [https://www.youtube.com/c/LiveOverflow LiveOverflow] | |||
| Offers videos on reverse engineering, exploitation, and hacking. | |||
|- | |||
| [https://www.youtube.com/c/SecurityFWD SecurityFWD] | |||
| Focuses on cybersecurity and privacy discussions. | |||
|- | |||
| [https://www.youtube.com/c/CryptoKnight CryptoKnight] | |||
| Discusses cryptocurrency and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/Computerphile Computerphile] | |||
| Explains various computer science and cybersecurity concepts. | |||
|- | |||
| [https://www.youtube.com/c/FindingUrPasswd FindingUrPasswd] | |||
| Offers cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/BittenTech Bitten tech] | |||
| Covers technology, cybersecurity, and ethical hacking. | |||
|- | |||
| [https://www.youtube.com/c/BusraDemir Busra Demir] | |||
| Provides cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/CyberAcademy Cyber Academy] | |||
| Focuses on cybersecurity education and training. | |||
|- | |||
| [https://www.youtube.com/c/Cyberspatial Cyberspatial] | |||
| Offers tutorials and discussions on cybersecurity topics. | |||
|- | |||
| [https://www.youtube.com/c/Techlore Techlore] | |||
| Discusses privacy, security, and technology. | |||
|- | |||
| [https://www.youtube.com/c/DerekRook Derek Rook] | |||
| Covers technology, cybersecurity, and ethical hacking. | |||
|- | |||
| [https://www.youtube.com/c/GynvaelEN GynvaelEN] | |||
| Offers reverse engineering, hacking, and technology tutorials. | |||
|- | |||
| [https://www.youtube.com/c/EthicalHackingSchool Ethical Hacking School] | |||
| Provides tutorials on ethical hacking and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/PratikDabhi Pratik Dabhi] | |||
| Focuses on cybersecurity, hacking, and technology. | |||
|- | |||
| [https://www.youtube.com/c/MrTurvey MrTurvey] | |||
| Offers cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/BugCrowd BugCrowd] | |||
| Features content related to bug bounty programs and security research. | |||
|- | |||
| [https://www.youtube.com/c/BlackPerl BlackPerl] | |||
| Provides cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/MurmusCTF MurmusCTF] | |||
| Offers capture the flag (CTF) challenges and tutorials. | |||
|- | |||
| [https://www.youtube.com/c/ECCouncil EC Council] | |||
| Covers cybersecurity and ethical hacking topics. | |||
|- | |||
| [https://www.youtube.com/c/PentestToolsCom Pentest-Tools Com] | |||
| Offers tutorials and discussions on penetration testing tools. | |||
|- | |||
| [https://www.youtube.com/c/TheHackersWorld The Hackers World] | |||
| Focuses on hacking, cybersecurity, and technology. | |||
|- | |||
| [https://www.youtube.com/c/GrantCollins Grant Collins] | |||
| Provides cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/BlackHat Black Hat] | |||
| Features talks and presentations from Black Hat security conferences. | |||
|- | |||
| [https://www.youtube.com/c/InfiniteLogins Infinite Logins] | |||
| Offers tutorials on ethical hacking and cybersecurity. | |||
|- | |||
| [https://www.youtube.com/c/HackingSimplified Hacking Simplified] | |||
| Focuses on hacking tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/CalleSvensson Calle Svensson] | |||
| Provides tutorials on ethical hacking and technology. | |||
|- | |||
| [https://www.youtube.com/c/ehacking ehacking] | |||
| Covers various cybersecurity topics and tutorials. | |||
|- | |||
| [https://www.youtube.com/c/MastersinIT Masters in I.T] | |||
| Discusses technology and IT-related topics. | |||
|- | |||
| [https://www.youtube.com/c/InfoCK Info CK] | |||
| Offers tutorials and discussions on cybersecurity concepts. | |||
|- | |||
| [https://www.youtube.com/c/PhDSecurity PhD Security] | |||
| Focuses on cybersecurity tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/CyberInsecurity Cyber Insecurity] | |||
| Provides cybersecurity news and discussions. | |||
|- | |||
| [https://www.youtube.com/c/TroyHunt Troy Hunt] | |||
| Covers cybersecurity, privacy, and technology. | |||
|- | |||
| [https://www.youtube.com/c/Tech69 Tech69] | |||
| Offers technology tutorials and discussions. | |||
|- | |||
| [https://www.youtube.com/c/CloudSecurityPodcast Cloud Security Podcast] | |||
| Discusses cloud security challenges and best practices. | |||
|- | |||
| [https://www.youtube.com/c/HusseinNasser Hussein Nasser] | |||
| Provides technology and programming tutorials. | |||
|} | |||
==[[Cybersecurity Linked-In Groups|Linked-In Groups - COMING SOON]]== | ==[[Cybersecurity Linked-In Groups|Linked-In Groups - COMING SOON]]== |
Revision as of 00:33, 18 August 2023
Cybersecurity Podcasts
NEED TO INSPECT LINKS & EMBED THIS TABLE INSIDE OF A COLLAPSABLE HEADING
Podcast Link | Description |
---|---|
Smashing Security | Two hosts discuss cybersecurity news, breaches, and offer practical tips for staying safe online. |
Darknet Diaries | Real stories from the dark side of the internet, exploring hacking, cybercrime, and digital espionage. |
CYBER | A podcast by VICE News, exploring the latest trends and issues in the world of cybersecurity. |
Information Security Podcasts | Discusses a variety of topics related to information security, including news, analysis, and insights. |
Top Cybersecurity Podcast | Offers insights and discussions on the top cybersecurity concerns and trends in the industry. |
CyberWire Daily | Daily news briefings, interviews, and analysis of cybersecurity trends and events. |
Risky Business | A weekly podcast discussing the latest in security news, threats, and vulnerabilities. |
Security Now | Hosted by Steve Gibson and Leo Laporte, this podcast covers a wide range of security topics, including news and in-depth discussions. |
Hacking Humans | Examines social engineering and how humans are targeted in cyberattacks. |
Unsupervised Learning | Hosted by Daniel Miessler, covers a variety of security and technology-related topics. |
Down the Security Rabbithole Podcast (DtSR) | Engages in conversations about information security and its role in business, leadership, and everyday life. |
Shared Security | Focuses on information security, privacy, and the protection of personal data. |
Malicious Life | Explores the history of cybersecurity and notable incidents, featuring interviews with experts. |
BarCode | Discusses the intersection of technology, society, and law, exploring ethical and legal implications. |
The Privacy, Security, & OSINT Show | Focuses on online privacy, security, and open-source intelligence techniques. |
Tom Eston, Author at Security Boulevard | Offers insights into the world of cybersecurity, privacy, and industry trends. |
Technovation with Peter High (CIO, CTO, CDO, CXO Interviews) | Interviews with technology leaders about their career journeys and insights into the tech industry. |
The Social-Engineer Podcast | Explores the art and science of social engineering, featuring experts in the field. |
Human Factor Security | Discusses the human element of cybersecurity, including psychology, behavior, and awareness. |
Getting Into Infosec | Features interviews with professionals who share their journeys into the field of information security. |
StormCast: The Official Warhammer Age of Sigmar Podcast | Delves into the world of Warhammer Age of Sigmar with a focus on tactics, stories, and more. |
Cloud Ace | Discusses cloud technology, best practices, and trends in the world of cloud computing. |
Cyber Security Headlines | Provides a daily roundup of the latest cybersecurity news headlines and stories. |
Hacker Valley Studio | Explores the human side of cybersecurity, sharing stories and insights from experts. |
Defense in Depth | Focuses on multiple layers of defense in the cybersecurity landscape, with insights and best practices. |
Secplicity] | Simplifies cybersecurity concepts and provides insights on the latest security trends. |
Cybersecurity Today | Offers a daily dose of cybersecurity news, insights, and stories from around the world. |
Access Denied | Hosted by cybersecurity professionals, discussing various aspects of information security. |
Cyber Work | Provides insights into careers in cybersecurity, job roles, and industry trends. |
The Cyberlaw Podcast | Explores legal issues related to cybersecurity, privacy, and technology, featuring experts and analysis. |
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec | Discusses security strategies, malware analysis, and incident response. |
The Cybrary Podcast | Discusses cybersecurity skills, career development, and industry trends. |
Brakeing Down Security Podcast | Provides insights into various cybersecurity concepts, with a focus on learning and education. |
Cyber Security Sauna | Discusses cybersecurity topics, from threat hunting to incident response. |
Cyber Security Interviews | Interviews with leading cybersecurity experts, discussing their experiences and insights. |
Microsoft Security Insights Show | Explores Microsoft's perspectives on cybersecurity, threat landscape, and industry insights. |
CISO Series Podcast | Focuses on cybersecurity leadership and CISO perspectives, covering a range of industry topics. |
Data Breach Today Podcast | Discusses data breaches, incident response, and best practices for data protection. |
Naked Security Podcast | A podcast by Sophos, covers the latest in cybersecurity news, trends, and insights. |
Cloud Security Podcast | Explores cloud security challenges, best practices, and strategies for protecting cloud environments. |
Crypto-Gram Security Podcast | Hosted by Bruce Schneier, covers security news, trends, and insights. |
The Other Side Of The Firewall | Offers insights into the world of cybersecurity and privacy, from both technical and human perspectives. |
7 Minute Security | Focuses on security tips and best practices, delivered in short, easily digestible episodes. |
Security In Five | Short, focused episodes offering cybersecurity tips and best practices in just five minutes. |
Cybercrime Magazine Podcast | Features discussions on cybercrime, cybersecurity, and related topics, with insights from industry experts. |
Security Weekly News (Audio) | Weekly news roundup covering the latest cybersecurity stories, vulnerabilities, and trends. |
Speakeasy Security | Covers various cybersecurity topics, including threat analysis, malware research, and industry news. |
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) | Provides daily cybersecurity news and analysis from the SANS Internet Stormcenter. |
Cybersecurity YouTube Channels
NEED TO INSPECT LINKS & EMBED THE TABLE BELOW INSIDE OF A COLLAPSABLE HEADING
YouTube Channel Name | Description |
---|---|
InsiderPHD | Videos on ethical hacking, security research, and technology tutorials. |
Rana Khalil | Covers various cybersecurity topics, including malware analysis and digital forensics. |
Spin the hack | Focuses on hacking, cybersecurity, and digital privacy. |
PwnFunction | Offers tutorials and demos on ethical hacking and penetration testing. |
Cyber Sec Village | Provides talks and presentations from various cybersecurity events and conferences. |
Farah Hawa | Discusses cybersecurity topics, privacy, and technology. |
Stefan Rows | Offers tutorials on web application security and ethical hacking. |
13Cubed | Focuses on digital forensics, incident response, and security analysis. |
I.T Security Labs | Provides tutorials and guides on cybersecurity and ethical hacking. |
Cybr | Offers cybersecurity tutorials, capture the flag (CTF) challenges, and more. |
The XSS Rat | Covers web application security, cross-site scripting (XSS), and ethical hacking. |
Cristi Vlad | Discusses cybersecurity, bug bounty hunting, and security research. |
HackerOne | Features content related to bug bounty programs, vulnerability disclosure, and security. |
PinkDraconian | Focuses on security research, hacking, and technology. |
Elevate Cyber | Offers cybersecurity training, tutorials, and news updates. |
Forensic Tech | Covers digital forensics, incident response, and malware analysis. |
Hak5 | Features technology tutorials, hacking tools, and cybersecurity discussions. |
The cyber mentor | Offers tutorials and guides on ethical hacking, penetration testing, and security. |
Null byte | Provides tutorials and news related to hacking and cybersecurity. |
Hackersploit | Covers ethical hacking, penetration testing, and cybersecurity tutorials. |
STOK | Focuses on hacking tutorials, tools, and technology. |
IppSec | Offers walkthroughs of capture the flag (CTF) challenges and vulnerable machines. |
ScriptKiddieHub - Tadi | Discusses cybersecurity, hacking, and technology. |
zSecurity | Provides tutorials, guides, and demos on ethical hacking and cybersecurity. |
Jon Good | Covers various cybersecurity topics, including hacking and penetration testing. |
Ankit Chauhan | Offers tutorials and guides on ethical hacking, penetration testing, and security. |
Cybersecurity Web | Provides cybersecurity news, tutorials, and insights. |
247CTF | Offers capture the flag (CTF) challenges and tutorials on cybersecurity concepts. |
Motasem Hamdan | Discusses cybersecurity, hacking, and technology. |
I.T. Career Questions | Provides career advice and guidance in the field of IT and cybersecurity. |
Hacksplained | Offers cybersecurity tutorials, demos, and explanations. |
Bug Bounty Reports Explained | Analyzes and explains bug bounty reports and vulnerabilities. |
TechChip | Provides technology and cybersecurity tutorials. |
Technical Navigator | Covers technology, cybersecurity, and networking topics. |
Beau Knows Tech... Stuff | Discusses technology, privacy, and cybersecurity. |
CyberSecurityTV | Offers cybersecurity news, tutorials, and discussions. |
CYBER EVOLUTION | Covers various cybersecurity topics, including hacking and technology. |
David Bombal | Provides networking and cybersecurity tutorials. |
Nahamsec | Focuses on hacking, bug bounty hunting, and security. |
The cyber expert | Offers cybersecurity tutorials and analysis. |
Loi Liang Yang | Covers technology, hacking, and cybersecurity. |
Professor Messer | Provides technology and IT certification training. |
NetworkChuck | Offers networking and cybersecurity tutorials and discussions. |
John Hammond | Covers cybersecurity, hacking, and technology. |
DarkSec | Provides cybersecurity tutorials and demos. |
superhero1 | Focuses on hacking, security, and technology. |
CrytoCar | Discusses technology, cybersecurity, and hacking. |
Cybercdh | Offers cybersecurity tutorials, CTF challenges, and discussions. |
Zanidd | Covers cybersecurity, hacking, and technology. |
Seytonic | Provides tutorials on ethical hacking and technology. |
LiveOverflow | Offers videos on reverse engineering, exploitation, and hacking. |
SecurityFWD | Focuses on cybersecurity and privacy discussions. |
CryptoKnight | Discusses cryptocurrency and cybersecurity. |
Computerphile | Explains various computer science and cybersecurity concepts. |
FindingUrPasswd | Offers cybersecurity tutorials and discussions. |
Bitten tech | Covers technology, cybersecurity, and ethical hacking. |
Busra Demir | Provides cybersecurity tutorials and discussions. |
Cyber Academy | Focuses on cybersecurity education and training. |
Cyberspatial | Offers tutorials and discussions on cybersecurity topics. |
Techlore | Discusses privacy, security, and technology. |
Derek Rook | Covers technology, cybersecurity, and ethical hacking. |
GynvaelEN | Offers reverse engineering, hacking, and technology tutorials. |
Ethical Hacking School | Provides tutorials on ethical hacking and cybersecurity. |
Pratik Dabhi | Focuses on cybersecurity, hacking, and technology. |
MrTurvey | Offers cybersecurity tutorials and discussions. |
BugCrowd | Features content related to bug bounty programs and security research. |
BlackPerl | Provides cybersecurity tutorials and discussions. |
MurmusCTF | Offers capture the flag (CTF) challenges and tutorials. |
EC Council | Covers cybersecurity and ethical hacking topics. |
Pentest-Tools Com | Offers tutorials and discussions on penetration testing tools. |
The Hackers World | Focuses on hacking, cybersecurity, and technology. |
Grant Collins | Provides cybersecurity tutorials and discussions. |
Black Hat | Features talks and presentations from Black Hat security conferences. |
Infinite Logins | Offers tutorials on ethical hacking and cybersecurity. |
Hacking Simplified | Focuses on hacking tutorials and discussions. |
Calle Svensson | Provides tutorials on ethical hacking and technology. |
ehacking | Covers various cybersecurity topics and tutorials. |
Masters in I.T | Discusses technology and IT-related topics. |
Info CK | Offers tutorials and discussions on cybersecurity concepts. |
PhD Security | Focuses on cybersecurity tutorials and discussions. |
Cyber Insecurity | Provides cybersecurity news and discussions. |
Troy Hunt | Covers cybersecurity, privacy, and technology. |
Tech69 | Offers technology tutorials and discussions. |
Cloud Security Podcast | Discusses cloud security challenges and best practices. |
Hussein Nasser | Provides technology and programming tutorials. |