[ Videos ]
Security Research & Technical Demonstrations

Network Forensics Part 2: Advanced Protocol Analysis and Anonymity
Part 2 of Professor Talia Q’s network forensics series, covering DNS manipulation, TCP spoofing, traceroute-based correlation, and Tor anonymity — directly relevant to threat modeling and architecture in HarrisonSec’s Secured VLAN design.
Watch Video
Network Forensics Part 1: Foundational Techniques
Part 1 of Professor Talia Q’s timeless lecture series laying the foundation of network forensics, including TCP/IP analysis, Telnet exploration, log-based evidence gathering, and the philosophy behind digital investigations. This classic directly informs design choices in HarrisonSec’s Secured VLAN architecture.
Watch Video
HarrisonSec Lab Tour | A Journey Through Computing Evolution
Join me on a tour of my security lab, where I explore the evolution of operating systems from FreeDOS to modern AI-driven security research.
Watch Video
StegoSafe: Hiding Secrets in Images with Encryption and Secret Sharing
A quick demo of StegoSafe's web version, showing how to encrypt, split, and hide secrets inside images using advanced steganography.
Watch Video
Complete Secure Company Network Design
A comprehensive 3-hour demonstration of how to design and implement a secure enterprise network with multiple security zones, VLANs, and proper firewall configuration
Watch Video
Buffer Overflow Attack Explained
This is one of the clearest demonstrations of a buffer overflow attack I've seen, where Dr. Mike Pound not only explains the theory but shows the complete attack process, invaluable for security learners
Watch Video