logo  ONESTOPCYBERSHOP

  Media & Socials

Cyber Defence Videos | Offensive Cyber Videos | Threat Intelligence Videos | Channels & Playlists | Webcasts & Podcasts | Keynotes & Speeches | Social Media | Images & Diagrams



    Videos & Tutorials

    Cyber Defence (Blue Team) Videos
Put your SOC to the Test
DFIR 101
IR Playbooks
EZTools/KAPE
Hunting Cobalt Strike
Investigating WMI Attacks
The State of
Incident Response
Windows Cred. Attacks
& Mitigations
Windows Command Line
Obfuscation
Making Memories:
Faster Response
Installing Zeek
from Scratch
Building a
Malware Lab
Needles in Needlestacks
Threat Hunting via Sysmon
Threat Hunting via DNS
Post Exploitation Hunting
Unconventional Logging
Cyber Deception
Atomic Red Team:
Hands-On
How to Investigate
Phishing Campaigns
Investigating Malware
Using Memory Forensics
Build a Home Lab
Open SOC
SOAR with Shuffle



    Offensive Cyber (Red Team)
Become an Ethical Hacker for $0
Hacker's Physical Pentest Toolkit
How to get a Scammer's Location
Bug Bounty Basics
Bug Hunters Methodology



    Threat Intelligence
Diving into The Dark Web
Weaponizing the Deep Web
Anonymize Kali with Whonix



    Channels & Playlists

SANS Cyber Defense

13Cubed

OALabs

Didier Stevens: dist67

Colin Hardy

Chris Greer

Offensive Security

Joe Helle

HackerSploit

The XSS Rat

SheHacksPurple




    Webcasts & Podcasts

2 Cyber Chicks

401 Access Denied

8th Layer Insights

Absolute AppSec

Adopting Zero Trust

Breach

Click Here

Crypto-Gram Security

Cyber Security Sauna

Cyberside Chats

CyberWire Daily

Cyber Work

Cyber Security
Headlines

Cybersecurity Today
by ITWC

Humans of
InfoSec

Identity at
the Center

Open Source
Security

Purple Squad
Security

Defrag This

H4unt3d Hacker

Life of a CISO

Malicious Life

Naked Security

Hacker Valley Studio

Hacking Humans

Monica Talks Cyber

OWASP

Privacy Advisor

Privacy

Risky Business

Security in Five

Security Now

Security Weekly

Simply Cyber

Smashing Security

The Cyberlaw

SANS Internet
Stormcenter Daily

Task Force 7
Cyber Security Radio

The 443 Security
Simplified

The Cyber Tap
(cyberTAP)

The Shared
Security Show

The Virtual
CISO Moment

The Secure Developer

The Shellsharks

The Social-Engineer

Troy Hunt

Unsupervised Learning

The Unfair Fight

SANS

BHIS

Blueprint

Brakeing Down
Security

Defensive Security

Ubuntu Security

Offensive Security

Darknet Diaries

7 Minute Security

Adventures of Alice and Bob

The Hacker Chronicles

The Hacker Mind

What The Shell?

Layer 8

InfoSec & OSINT Show

OSINT Bunker

OSINT Curious

IntelTechniques

Janes




    Keynotes & Speeches

Three types of online attacks
Cracking Stuxnet
What is Cybercrime?
Defining Cyberwarfare
The security mirage
30 Years of History
Fighting viruses,
defending the net
NSA betrayed the
World's Trust
Everyday cybercrime, and
what you can do about it
Tracking our
online trackers
How Russia hacked
the US Election
How cyberattacks
threaten real-world
All your devices can be hacked
How we take back the Internet
NSA responds to Snowdon
When you reply to SPAM



    Social Media

BHIS

The Cyber Mentor

SANS Offensive Ops

Offensive Security

HackTheBox

TryHackMe

BHIS

SANS DFIR

TCM

Dr. Eric Cole

Mikko Hypponen

Kevin Mitnick

Brian Krebs

James Lyne

Graham Cluley

John Strand

Rob Lee

Lenny Zeltser

Sarah Edwards

Ed Skoudis

Eric Conrad

Alissa Torres

Heath Adams

Steve Armstrong

Robert Lee

Florian Roth

Joff Thyer

Jake Williams

Heather Mahalik

Jason Fossen

Phil Hagen

Mark Baggett




    Images & Diagrams

NIST IR Framework
Download 
OSI Mapping
Download 
Cyber Crime Process
Download 
Phishing
Download 
USB Insertion
Download 
Anatomy of Botnet Attack
Download 
Common Attacks/Defences
Download 
WMI Remoting
Download 
Endpoint Security Measures
Download 
Focusing Security
Download 
Dr. Cole Challenge
Download 
What Rebels Want
Download 



  With great power, comes great responsibility; this material has been collated to encourage learning and development, and not to be leveraged for unethical and/or illegal behaviour.
  By visiting any of these sites, you are doing so at your own risk.

  I would like to thank all of the authors, instructors, publishers, developers (and others) - both individuals and teams - for the content collated on this site. I must stress that none of the content referenced/linked on this site is my own.
  If you have any suggestions and/or content you feel is missing or would like included, please email me at oscybershop [at] gmail [dot] com