11:04 Exploring LoRA
17:57 Attacking Bluetooth
20:07 Surveying Tools for Bluetooth Monitoring
24:50 Understanding NFC Vulnerabilities
28:04 Exploring NFC Attacks and Case Studies
34:39 Introducing Cloud Computing Concepts
44:22 Exploring Container Technology
50:17 Understanding Serverless Computing
51:41 Surveying Cloud Computing Threats
59:17 Understanding Cloud Hacking and Cloud Security Implementations
1:06:53 Introducing the Different Cloud Deployment and Service Models
1:10:43 Surveying Patch Management in the Cloud
1:13:50 Performing Security Assessments in Cloud Environments
1:17:06 Introducing Agile, DevOps, and CICD Pipelines
1:25:23 Understanding Container Orchestration and an Introduction to Kubernetes
1:26:59 Exploring the Concepts of DevSecOps
1:31:08 Introducing Social Engineering Concepts
1:37:21 Exploring Social Engineering Techniques
1:44:45 Understanding the Insider Threat
1:47:23 Impersonation on Social Networking Sites
1:53:21 Understanding Identity Theft
1:57:48 Understanding Social Engineering Countermeasures
2:00:26 The Complete Cybersecurity Bootcamp Summary