How to use the deep web as a force for good: Internet 2.0, Hyperreality and net neutrality
Introduction The deep web houses the dark web’s illegal and provocative material, this paper will attempt to use the deep …
"I've observed a prevailing misconception surrounding the Dark Web" - Interview with Goce Stevanoski
How did you first become aware of the dark web, and what sparked your interest in it? My interest in …
The Social dangers of the dark web
Introduction Using the deep web takes a lot of responsibility, maturity and discipline, as it contains all sorts of malice …
How to protect yourself on the deep web: Tools, evaluation, legality and expectations
This article will provide a comprehensive view in relation to using the deep web. Introduction The deep web can be …

Slicing the Onion: An introduction to the Onion Routing
When you first searched for information about terms like “Tor network”, “deep web” or “dark web” you probably ended up …
The Social dangers of the dark web
Introduction Using the deep web takes a lot of responsibility, maturity and discipline, as it contains all sorts of malice …
Authenticity Verification of Findings in OSINT: Tools to Ensure Data Credibility
This is a continuation of the article: OSINT: A THOUGHTFULNESS ABOUT THE ADVANTAGES AND DISADVANTAGES OF THIS TECHNIQUE INTRODUCTION: As …
Introduction to Defensive and Offensive AI in Cybersecurity
In the ever-changing landscape of cybersecurity, the conflict between criminal actors seeking to exploit vulnerabilities and defenders working on protecting …
How to protect yourself on the deep web: Tools, evaluation, legality and expectations
This article will provide a comprehensive view in relation to using the deep web. Introduction The deep web can be …
The Bring Your Own Device (BYOD) Dilemma
The use of personal mobile devices like smartphones and tablets in the workplace, known as “bring your own device” (BYOD), …
AI and the War on Trust
The AI Revolution A revolution of Artificial Intelligence has occurred in the past few years, leapfrogging previous machine learning systems, …
"I've observed a prevailing misconception surrounding the Dark Web" - Interview with Goce Stevanoski
How did you first become aware of the dark web, and what sparked your interest in it? My interest in …
How to use the deep web as a force for good: Internet 2.0, Hyperreality and net neutrality
Introduction The deep web houses the dark web’s illegal and provocative material, this paper will attempt to use the deep …
Exploring the Dark Web: Unveiling its Dual Nature of Good and Evil
Freedom of speech is one of the fundamental human rights. It took a long time in human history to be …
Cyberattacks with the use of AI
Overview Artificial intelligence (AI)-based technologies are actively used for cyber defense purposes. With the continuous development and decreasing complexity in …
How to use the deep web as a force for good: Internet 2.0, Hyperreality and net neutrality
Introduction The deep web houses the dark web’s illegal and provocative material, this paper will attempt to use the deep …
"I've observed a prevailing misconception surrounding the Dark Web" - Interview with Goce Stevanoski
How did you first become aware of the dark web, and what sparked your interest in it? My interest in …
The Social dangers of the dark web
Introduction Using the deep web takes a lot of responsibility, maturity and discipline, as it contains all sorts of malice …
How to protect yourself on the deep web: Tools, evaluation, legality and expectations
This article will provide a comprehensive view in relation to using the deep web. Introduction The deep web can be …

Kismet Wireless: Network Monitoring and Analysis (W72)
Welcome to the In-Depth Course on Kismet Wireless! This comprehensive course is designed to provide you with a deep understanding …
Web Application Penetration Testing (W71)
Enter a short description of the course.
Mastering ChatGPT for Security Applications (W70)
Enter a short description of the course.
Hacking Blockchain based APIs (W69)
Have you ever wondered what the mysterious world of Blockchain is all about? Maybe you have only heard about it in regards to Bitcoin. Blockchain is much more than just a cryptocurrency financial system. With Blockchain, we can push the boundaries of what is possible within the realm of networking and cybersecurity. Join me as we launch a digital adventure into the world of Blockchain based APIs.
