Youtube channel on Security Tutorial

viktik

Level 25
Thread author
Verified
Well-known
Sep 17, 2013
1,492
This youtube channel has many tutorial videos on security

  1. The Life of Binaries : www.youtube.com/playlist?list=PLUFkSN0XLZ-n_Na6jwqopTt1Ki57vMIc3
  2. Intro Reverse Engineering Software : www.youtube.com/playlist?list=PLUFkSN0XLZ-nXcDG89jS9iqKBnNHmz7Qw
  3. Reverse Engineering Malware : www.youtube.com/playlist?list=PLUFkSN0XLZ-kwukmQOAgCZ08C5REoZElt
  4. Dynamic Malware Analysis : www.youtube.com/playlist?list=PLUFkSN0XLZ-kqYbGpY4Gt_VATd4ytQg-Z
  5. Computer security : www.youtube.com/playlist?list=PLY4JwKk_5ONOugM-RlATNW3oYIhjgiBux
  6. Assembly language : www.youtube.com/playlist?list=PLue5IPmkmZ-P1pDbF3vSQtuNquX0SZHpB
  7. Cryptography : www.youtube.com/playlist?list=PLR3oBa3l1hEmwrXz2uJO3qm5-Mte6Nj53
  8. Virtual memory : www.youtube.com/playlist?list=PLiwt1iVUib9s2Uo5BeYmwkDFUh70fJPxX
  9. Operating system concepts : www.youtube.com/playlist?list=PL6C72CD051CC18D40
  10. Operating systems : www.youtube.com/playlist?list=PLhwVAYxlh5dsX6aOfVMZXS8MwKwBmwVM6
  11. Operating systems : www.youtube.com/playlist?list=PL-XXv-cvA_iB_5Q8G8kW5idSwNmXypmQE
  12. Operating systems lectures : www.youtube.com/playlist?list=PL-XXv-cvA_iBDyz-ba4yDskqMDY6A1w_c
  13. Machine Structures : www.youtube.com/playlist?list=PL-XXv-cvA_iDHtKXLFJbDG-i6L9oDr5X9
  14. Machine Structures : www.youtube.com/playlist?list=PL-XXv-cvA_iCl2-D-FS5mk0jFF6cYSJs_
  15. Reverse Engineering and Malware Analysis : www.youtube.com/playlist?list=PLFS09dmzTiewykD0P6Hd6pSsvY3ILxNKW
  16. Computer Security Lectures : www.youtube.com/playlist?list=PLUhmDd3hiISm4-EEFVsPIXRq0C20je7Ek
  17. Ethical Hacking and Computer Security Concepts : www.youtube.com/playlist?list=PLUhmDd3hiISnPBcdcpUy-l4rBRPB_nvF2
  18. Buffer Overflow Primer : www.youtube.com/playlist?list=PLFS09dmzTiewOGPzeN7JntZVs1dnTu_JL
  19. Computer Architecture Lectures -- Carnegie Mellon : www.youtube.com/playlist?list=PL5PHm2jkkXmi5CxxI7b3JCL1TWybTDtKq
  20. Wireless networks : www.youtube.com/playlist?list=PLoCUlAGhY8dJe1ou5wSiqmXJcXLOefIT9
  21. Network Security : www.youtube.com/playlist?list=PLoCUlAGhY8dLx944y8bzkA4Sztd8hNh7a
  22. Introduction to Computer Networks : www.youtube.com/playlist?list=PLoCUlAGhY8dL_glrT5IEORrcEIkuXk3vL
  23. Computer Networks : www.youtube.com/playlist?list=PLkHsKoi6eZnzJl1qTzmvBwTxrSJW4D2Jj
  24. Security for Wireless Networks : www.youtube.com/playlist?list=PLoCUlAGhY8dIPoLhxNbe4BTVgmAyBeqZl
  25. Algorithms : www.youtube.com/playlist?list=PLoCUlAGhY8dJuQKpTGOUU5bpeMyf2sF3N
  26. Algorithms adn data structure : www.youtube.com/playlist?list=PLoCUlAGhY8dJppsNLp9Df1tfL2k_yB4Je
  27. Algorithms : www.youtube.com/playlist?list=PLoCUlAGhY8dL8JS_rMn2tu1DOSLiTXL4j
  28. Computer networks : www.youtube.com/playlist?list=PLoCUlAGhY8dL33hF2rNRoKlLxPS-F9-7X
  29. Cryptography course : www.youtube.com/playlist?list=PL9oqNDMzcMClAPkwrn5dm7IndYjjWiSYJ
  30. Open Security channel : www.youtube.com/user/OpenSecurityIN/videos
  31. Flow Analysis & Network Hunting : www.youtube.com/playlist?list=PLUFkSN0XLZ-kPylwy-nZc1DeXH838-hca
  32. Intro Trusted Computing : www.youtube.com/playlist?list=PLUFkSN0XLZ-kBgdLhorJD6BR66D5kGoUV
  33. Introduction to ARM : www.youtube.com/playlist?list=PLUFkSN0XLZ-n91t_AX5zO007Giz1INwPd
  34. Introduction to Software Exploits : www.youtube.com/playlist?list=PL96AB65DFCE02EE3E
  35. Exploits in the Windows Environment : www.youtube.com/playlist?list=PL9F9E52502327B1CA
  36. Introductory Intel x86: Architecture, Assembly, Applications : www.youtube.com/playlist?list=PL038BE01D3BAEFDB0
  37. Intermediate Intel X86: Architecture, Assembly, & Applications : www.youtube.com/playlist?list=PL8F8D45D6C1FFD177
  38. Rootkits: What they are, and how to find them : www.youtube.com/playlist?list=PLF58FB7BCB20ED11A
  39. Offensive computer security lectures : www.youtube.com/user/gtg051x/videos
  40. Introduction to Security and Network Forensics : www.youtube.com/playlist?list=PL345237ABC8FA67FE
  41. Network Forensics : www.youtube.com/playlist?list=PLqhpVxkBo1dMCcfBElL8nHF4o6PLEawd4
  42. DefCon 22 : www.youtube.com/playlist?list=PLStO1VqVBvmGyghpuCaosPGtrwVy5Fbqi
  43. Defcon 21 : www.youtube.com/playlist?list=PLiq_fDYFoqMoL452Jvcb7Ip9gFe813Jqz
  44. DEFCON 20 : www.youtube.com/playlist?list=PLRTVG-Gu-BlSBrd-4O79I0RgmgI64Y5hD
  45. DEFCON 19 : www.youtube.com/playlist?list=PLRTVG-Gu-BlQ-YYWb2WirO-GpcQh_jZoi
  46. DEFCON 18 : www.youtube.com/playlist?list=PLRTVG-Gu-BlSqCzF1MqqGFQa8jMRSw7fa
  47. Blackhat USA 2012 : www.youtube.com/playlist?list=PLRTVG-Gu-BlQqX6KXmz9gpmluV5ijSjs-
  48. Black Hat USA 2013 : www.youtube.com/playlist?list=PLH15HpR5qRsUtTv7IQKftKGOcRLGtwuoF
  49. Black Hat Asia 2014 : www.youtube.com/playlist?list=PLH15HpR5qRsVBA1YZ9xKtk_pu34S5swsO
  50. Black Hat USA 2014 : www.youtube.com/playlist?list=PLH15HpR5qRsUBgeytB_T4xnKzr4Iv3upj
  51. Black Hat Europe 2014 : www.youtube.com/playlist?list=PLH15HpR5qRsV5pwkY4cpDpCyKKz_HpGbp
  52. ShmooCon 2015 : www.youtube.com/playlist?list=PLStO1VqVBvmHyVc71QLOCBKugWQyyM7WE
  53. SharkFest13 : www.youtube.com/playlist?list=PLStO1VqVBvmF3OuVuPjjhksdLV1IifgF2
  54. Intro to Wireshark : www.youtube.com/playlist?list=PLrUFyg1unBb8B5iqIap4s3jDstej3wvJp
  55. Wireshark Network Analyst : www.youtube.com/playlist?list=PLR3oBa3l1hEn0AJEDmSe4EkIq3qdUlNxP
  56. Introduction to Wireshark : www.youtube.com/playlist?list=PL_yWypNx3Y8DjpeSYPowD_Q4drIHkXe2q
  57. SecurityTubeCons : www.youtube.com/user/SecurityTubeCons/videos
  58. Christiaan008 channel : www.youtube.com/user/ChRiStIaAn008/playlists
  59. 3G & 4G Wireless Mobile Communications : www.youtube.com/playlist?list=PLbMVogVj5nJSi8FUsvglRxLtN1TN9y4nx
  60. Cryptography and Network Security : www.youtube.com/playlist?list=PL71FE85723FD414D7
  61. CCNA Routing and Switching : www.youtube.com/playlist?list=PLmdYg02XJt6QRQfYjyQcMPfS3mrSnFbRC
  62. CCNA Routing and Switching : www.youtube.com/playlist?list=PL4EC323C8EBA0C111
  63. Introduction to Data Communications : www.youtube.com/playlist?list=PLvifRcqOOwF-_GSNzxRQQPwstar0hygul
  64. Basic Linux Permissions : www.youtube.com/playlist?list=PLAD72B282C6081B9A
  65. Security and Cryptography 2014: www.youtube.com/playlist?list=PLvifRcqOOwF9yDamCOXtD5O3fA085X6mP
  66. Security and Cryptography 2013 : www.youtube.com/playlist?list=PLvifRcqOOwF-OW60agF2PPqgF2r4xrkTe
  67. IT Security 2014 : www.youtube.com/playlist?list=PLvifRcqOOwF-AWyq03Cgg3NOyklA9CjeR
  68. Linux Command Line : www.youtube.com/playlist?list=PLvifRcqOOwF9aMGjMNODfYsds-5jnMnwU
  69. Internet Privacy with Proxies, VPNs and Tor : www.youtube.com/playlist?list=PLvifRcqOOwF_jIjjh-l6Qt3aNXnvCAaPj
  70. Packets in Networking : www.youtube.com/playlist?list=PLvifRcqOOwF_OtVV7fu4iQmYCZIY8BRdQ
  71. Internet Technologies and Applications 2012 : www.youtube.com/playlist?list=PLvifRcqOOwF9cfLMTE-42fiBsWvBsOEkS
  72. Fundamentals of Computer : www.youtube.com/channel/UCb1OiccPJ0wbMZMOleCvhWQ/videos
  73. Data Compression : www.youtube.com/playlist?list=PLe-ggMe31CTciifRRo6yY0Yt0mzgIXXVZ
  74. Stacks and Queues : www.youtube.com/playlist?list=PLe-ggMe31CTe-9jhnj3P_3mmrCh0A7iHh
  75. Hash Tables : www.youtube.com/playlist?list=PLe-ggMe31CTcKxIRGqqThMts2eHtSrf11
  76. Information Theory, Pattern Recognition, and Neural Networks : www.youtube.com/playlist?list=PLruBu5BI5n4aFpG32iMbdWoRVAA-Vcso6
  77. More networking tutorial : https://www.youtube.com/playlist?list=PLR3oBa3l1hEnXgBTDu9H7av2RI6hs0mXS
  78. Essentials of IPv6 : https://www.youtube.com/playlist?list=PLyXzwEGobTKoygttF-wYCXmJP0Xm39_he
  79. Linux Command Line : www.youtube.com/playlist?list=PL7hgvWUGJtUuBTwRgMhGMjXEBs8pawy1_
  80. Metasploit : https://www.youtube.com/playlist?list=PL7hgvWUGJtUtoZWDHltNbu5_ExbQ9TPyH
  81. Wireshark tutorial 1 : https://www.youtube.com/playlist?list=PL7hgvWUGJtUtbjxYfGIS1lhC2F4cj5yFk
  82. Wireshark tutorial 2 : https://www.youtube.com/playlist?list=PL7hgvWUGJtUt4M2P7NT6eEnZNWpehV5xx
  83. Powershell 3.0 Strengths : https://www.youtube.com/playlist?list=PL7hgvWUGJtUsYCXsbtzXXDE9i3hPQ5ysF
  84. Hacking Windows 8.1 Security : https://www.youtube.com/playlist?list=PL7hgvWUGJtUuhitHdf-wIDs8t0VMpfpw4
  85. Networking Fundamentals : https://www.youtube.com/playlist?list=PL7hgvWUGJtUs25I_57Aq9KvI4_L8HJ57o
  86. Fundamentals of Computer Networking : https://www.youtube.com/playlist?list=PLR3oBa3l1hEndl3Hvzkx1dQvVCNAW7uvM
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top