- Sep 17, 2013
- 1,492
This youtube channel has many tutorial videos on security
- The Life of Binaries : www.youtube.com/playlist?list=PLUFkSN0XLZ-n_Na6jwqopTt1Ki57vMIc3
- Intro Reverse Engineering Software : www.youtube.com/playlist?list=PLUFkSN0XLZ-nXcDG89jS9iqKBnNHmz7Qw
- Reverse Engineering Malware : www.youtube.com/playlist?list=PLUFkSN0XLZ-kwukmQOAgCZ08C5REoZElt
- Dynamic Malware Analysis : www.youtube.com/playlist?list=PLUFkSN0XLZ-kqYbGpY4Gt_VATd4ytQg-Z
- Computer security : www.youtube.com/playlist?list=PLY4JwKk_5ONOugM-RlATNW3oYIhjgiBux
- Assembly language : www.youtube.com/playlist?list=PLue5IPmkmZ-P1pDbF3vSQtuNquX0SZHpB
- Cryptography : www.youtube.com/playlist?list=PLR3oBa3l1hEmwrXz2uJO3qm5-Mte6Nj53
- Virtual memory : www.youtube.com/playlist?list=PLiwt1iVUib9s2Uo5BeYmwkDFUh70fJPxX
- Operating system concepts : www.youtube.com/playlist?list=PL6C72CD051CC18D40
- Operating systems : www.youtube.com/playlist?list=PLhwVAYxlh5dsX6aOfVMZXS8MwKwBmwVM6
- Operating systems : www.youtube.com/playlist?list=PL-XXv-cvA_iB_5Q8G8kW5idSwNmXypmQE
- Operating systems lectures : www.youtube.com/playlist?list=PL-XXv-cvA_iBDyz-ba4yDskqMDY6A1w_c
- Machine Structures : www.youtube.com/playlist?list=PL-XXv-cvA_iDHtKXLFJbDG-i6L9oDr5X9
- Machine Structures : www.youtube.com/playlist?list=PL-XXv-cvA_iCl2-D-FS5mk0jFF6cYSJs_
- Reverse Engineering and Malware Analysis : www.youtube.com/playlist?list=PLFS09dmzTiewykD0P6Hd6pSsvY3ILxNKW
- Computer Security Lectures : www.youtube.com/playlist?list=PLUhmDd3hiISm4-EEFVsPIXRq0C20je7Ek
- Ethical Hacking and Computer Security Concepts : www.youtube.com/playlist?list=PLUhmDd3hiISnPBcdcpUy-l4rBRPB_nvF2
- Buffer Overflow Primer : www.youtube.com/playlist?list=PLFS09dmzTiewOGPzeN7JntZVs1dnTu_JL
- Computer Architecture Lectures -- Carnegie Mellon : www.youtube.com/playlist?list=PL5PHm2jkkXmi5CxxI7b3JCL1TWybTDtKq
- Wireless networks : www.youtube.com/playlist?list=PLoCUlAGhY8dJe1ou5wSiqmXJcXLOefIT9
- Network Security : www.youtube.com/playlist?list=PLoCUlAGhY8dLx944y8bzkA4Sztd8hNh7a
- Introduction to Computer Networks : www.youtube.com/playlist?list=PLoCUlAGhY8dL_glrT5IEORrcEIkuXk3vL
- Computer Networks : www.youtube.com/playlist?list=PLkHsKoi6eZnzJl1qTzmvBwTxrSJW4D2Jj
- Security for Wireless Networks : www.youtube.com/playlist?list=PLoCUlAGhY8dIPoLhxNbe4BTVgmAyBeqZl
- Algorithms : www.youtube.com/playlist?list=PLoCUlAGhY8dJuQKpTGOUU5bpeMyf2sF3N
- Algorithms adn data structure : www.youtube.com/playlist?list=PLoCUlAGhY8dJppsNLp9Df1tfL2k_yB4Je
- Algorithms : www.youtube.com/playlist?list=PLoCUlAGhY8dL8JS_rMn2tu1DOSLiTXL4j
- Computer networks : www.youtube.com/playlist?list=PLoCUlAGhY8dL33hF2rNRoKlLxPS-F9-7X
- Cryptography course : www.youtube.com/playlist?list=PL9oqNDMzcMClAPkwrn5dm7IndYjjWiSYJ
- Open Security channel : www.youtube.com/user/OpenSecurityIN/videos
- Flow Analysis & Network Hunting : www.youtube.com/playlist?list=PLUFkSN0XLZ-kPylwy-nZc1DeXH838-hca
- Intro Trusted Computing : www.youtube.com/playlist?list=PLUFkSN0XLZ-kBgdLhorJD6BR66D5kGoUV
- Introduction to ARM : www.youtube.com/playlist?list=PLUFkSN0XLZ-n91t_AX5zO007Giz1INwPd
- Introduction to Software Exploits : www.youtube.com/playlist?list=PL96AB65DFCE02EE3E
- Exploits in the Windows Environment : www.youtube.com/playlist?list=PL9F9E52502327B1CA
- Introductory Intel x86: Architecture, Assembly, Applications : www.youtube.com/playlist?list=PL038BE01D3BAEFDB0
- Intermediate Intel X86: Architecture, Assembly, & Applications : www.youtube.com/playlist?list=PL8F8D45D6C1FFD177
- Rootkits: What they are, and how to find them : www.youtube.com/playlist?list=PLF58FB7BCB20ED11A
- Offensive computer security lectures : www.youtube.com/user/gtg051x/videos
- Introduction to Security and Network Forensics : www.youtube.com/playlist?list=PL345237ABC8FA67FE
- Network Forensics : www.youtube.com/playlist?list=PLqhpVxkBo1dMCcfBElL8nHF4o6PLEawd4
- DefCon 22 : www.youtube.com/playlist?list=PLStO1VqVBvmGyghpuCaosPGtrwVy5Fbqi
- Defcon 21 : www.youtube.com/playlist?list=PLiq_fDYFoqMoL452Jvcb7Ip9gFe813Jqz
- DEFCON 20 : www.youtube.com/playlist?list=PLRTVG-Gu-BlSBrd-4O79I0RgmgI64Y5hD
- DEFCON 19 : www.youtube.com/playlist?list=PLRTVG-Gu-BlQ-YYWb2WirO-GpcQh_jZoi
- DEFCON 18 : www.youtube.com/playlist?list=PLRTVG-Gu-BlSqCzF1MqqGFQa8jMRSw7fa
- Blackhat USA 2012 : www.youtube.com/playlist?list=PLRTVG-Gu-BlQqX6KXmz9gpmluV5ijSjs-
- Black Hat USA 2013 : www.youtube.com/playlist?list=PLH15HpR5qRsUtTv7IQKftKGOcRLGtwuoF
- Black Hat Asia 2014 : www.youtube.com/playlist?list=PLH15HpR5qRsVBA1YZ9xKtk_pu34S5swsO
- Black Hat USA 2014 : www.youtube.com/playlist?list=PLH15HpR5qRsUBgeytB_T4xnKzr4Iv3upj
- Black Hat Europe 2014 : www.youtube.com/playlist?list=PLH15HpR5qRsV5pwkY4cpDpCyKKz_HpGbp
- ShmooCon 2015 : www.youtube.com/playlist?list=PLStO1VqVBvmHyVc71QLOCBKugWQyyM7WE
- SharkFest13 : www.youtube.com/playlist?list=PLStO1VqVBvmF3OuVuPjjhksdLV1IifgF2
- Intro to Wireshark : www.youtube.com/playlist?list=PLrUFyg1unBb8B5iqIap4s3jDstej3wvJp
- Wireshark Network Analyst : www.youtube.com/playlist?list=PLR3oBa3l1hEn0AJEDmSe4EkIq3qdUlNxP
- Introduction to Wireshark : www.youtube.com/playlist?list=PL_yWypNx3Y8DjpeSYPowD_Q4drIHkXe2q
- SecurityTubeCons : www.youtube.com/user/SecurityTubeCons/videos
- Christiaan008 channel : www.youtube.com/user/ChRiStIaAn008/playlists
- 3G & 4G Wireless Mobile Communications : www.youtube.com/playlist?list=PLbMVogVj5nJSi8FUsvglRxLtN1TN9y4nx
- Cryptography and Network Security : www.youtube.com/playlist?list=PL71FE85723FD414D7
- CCNA Routing and Switching : www.youtube.com/playlist?list=PLmdYg02XJt6QRQfYjyQcMPfS3mrSnFbRC
- CCNA Routing and Switching : www.youtube.com/playlist?list=PL4EC323C8EBA0C111
- Introduction to Data Communications : www.youtube.com/playlist?list=PLvifRcqOOwF-_GSNzxRQQPwstar0hygul
- Basic Linux Permissions : www.youtube.com/playlist?list=PLAD72B282C6081B9A
- Security and Cryptography 2014: www.youtube.com/playlist?list=PLvifRcqOOwF9yDamCOXtD5O3fA085X6mP
- Security and Cryptography 2013 : www.youtube.com/playlist?list=PLvifRcqOOwF-OW60agF2PPqgF2r4xrkTe
- IT Security 2014 : www.youtube.com/playlist?list=PLvifRcqOOwF-AWyq03Cgg3NOyklA9CjeR
- Linux Command Line : www.youtube.com/playlist?list=PLvifRcqOOwF9aMGjMNODfYsds-5jnMnwU
- Internet Privacy with Proxies, VPNs and Tor : www.youtube.com/playlist?list=PLvifRcqOOwF_jIjjh-l6Qt3aNXnvCAaPj
- Packets in Networking : www.youtube.com/playlist?list=PLvifRcqOOwF_OtVV7fu4iQmYCZIY8BRdQ
- Internet Technologies and Applications 2012 : www.youtube.com/playlist?list=PLvifRcqOOwF9cfLMTE-42fiBsWvBsOEkS
- Fundamentals of Computer : www.youtube.com/channel/UCb1OiccPJ0wbMZMOleCvhWQ/videos
- Data Compression : www.youtube.com/playlist?list=PLe-ggMe31CTciifRRo6yY0Yt0mzgIXXVZ
- Stacks and Queues : www.youtube.com/playlist?list=PLe-ggMe31CTe-9jhnj3P_3mmrCh0A7iHh
- Hash Tables : www.youtube.com/playlist?list=PLe-ggMe31CTcKxIRGqqThMts2eHtSrf11
- Information Theory, Pattern Recognition, and Neural Networks : www.youtube.com/playlist?list=PLruBu5BI5n4aFpG32iMbdWoRVAA-Vcso6
- More networking tutorial : https://www.youtube.com/playlist?list=PLR3oBa3l1hEnXgBTDu9H7av2RI6hs0mXS
- Essentials of IPv6 : https://www.youtube.com/playlist?list=PLyXzwEGobTKoygttF-wYCXmJP0Xm39_he
- Linux Command Line : www.youtube.com/playlist?list=PL7hgvWUGJtUuBTwRgMhGMjXEBs8pawy1_
- Metasploit : https://www.youtube.com/playlist?list=PL7hgvWUGJtUtoZWDHltNbu5_ExbQ9TPyH
- Wireshark tutorial 1 : https://www.youtube.com/playlist?list=PL7hgvWUGJtUtbjxYfGIS1lhC2F4cj5yFk
- Wireshark tutorial 2 : https://www.youtube.com/playlist?list=PL7hgvWUGJtUt4M2P7NT6eEnZNWpehV5xx
- Powershell 3.0 Strengths : https://www.youtube.com/playlist?list=PL7hgvWUGJtUsYCXsbtzXXDE9i3hPQ5ysF
- Hacking Windows 8.1 Security : https://www.youtube.com/playlist?list=PL7hgvWUGJtUuhitHdf-wIDs8t0VMpfpw4
- Networking Fundamentals : https://www.youtube.com/playlist?list=PL7hgvWUGJtUs25I_57Aq9KvI4_L8HJ57o
- Fundamentals of Computer Networking : https://www.youtube.com/playlist?list=PLR3oBa3l1hEndl3Hvzkx1dQvVCNAW7uvM
Last edited: