[ Videos ]

Security Research & Technical Demonstrations

Network Forensics Part 2: Advanced Protocol Analysis and Anonymity

Network Forensics Part 2: Advanced Protocol Analysis and Anonymity

Part 2 of Professor Talia Q’s network forensics series, covering DNS manipulation, TCP spoofing, traceroute-based correlation, and Tor anonymity — directly relevant to threat modeling and architecture in HarrisonSec’s Secured VLAN design.

May 21, 2025
Network Forensics TCP Spoofing Tor DNS Cybercrime Attribution HarrisonSec
Watch Video
Network Forensics Part 1: Foundational Techniques

Network Forensics Part 1: Foundational Techniques

Part 1 of Professor Talia Q’s timeless lecture series laying the foundation of network forensics, including TCP/IP analysis, Telnet exploration, log-based evidence gathering, and the philosophy behind digital investigations. This classic directly informs design choices in HarrisonSec’s Secured VLAN architecture.

May 20, 2025
Network Forensics Digital Evidence Log Analysis TCP/IP Cybercrime Investigation HarrisonSec
Watch Video
HarrisonSec Lab Tour | A Journey Through Computing Evolution

HarrisonSec Lab Tour | A Journey Through Computing Evolution

Join me on a tour of my security lab, where I explore the evolution of operating systems from FreeDOS to modern AI-driven security research.

May 17, 2025
Security Lab Operating Systems Windows History Security Research
Watch Video
StegoSafe: Hiding Secrets in Images with Encryption and Secret Sharing

StegoSafe: Hiding Secrets in Images with Encryption and Secret Sharing

A quick demo of StegoSafe's web version, showing how to encrypt, split, and hide secrets inside images using advanced steganography.

May 13, 2025
Steganography Data Hiding Encryption Secret Sharing Privacy Tools
Watch Video
Complete Secure Company Network Design

Complete Secure Company Network Design

A comprehensive 3-hour demonstration of how to design and implement a secure enterprise network with multiple security zones, VLANs, and proper firewall configuration

May 12, 2025
Network Security VLAN Segmentation Firewall Configuration DMZ Enterprise Architecture
Watch Video
Buffer Overflow Attack Explained

Buffer Overflow Attack Explained

This is one of the clearest demonstrations of a buffer overflow attack I've seen, where Dr. Mike Pound not only explains the theory but shows the complete attack process, invaluable for security learners

May 10, 2025
Buffer Overflow Memory Security Exploit Linux Security
Watch Video