David Bombal

David Bombal

Want to learn about IT? Want to get ahead in your career? Well, this is the right place! On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics. This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content. David’s details: Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com YouTube: https://www.youtube.com/davidbombal All the best! David

  1. #538: Official Cisco Ethical Hacking Course Is FREE

    23M AGO

    #538: Official Cisco Ethical Hacking Course Is FREE

    Cisco just announced massive changes for 2026, including free AI training, a new Ethical Hacking certificate, and the return of the Wireless track. In this video, I sit down with Ryan and Lacey from Cisco to break down the biggest updates to the certification portfolio since 2020. Whether you are looking to break into Red Teaming with the new Ethical Hacker track, recertify your CCNA/CCNP using free CE credits, or master the new AI infrastructure, this guide covers everything you need to know to level up your career for free. What's Inside: • Free AI Training: How to get 16+ CE credits through the new RevUp program. • Ethical Hacking: Details on the new "Red Team" certificate and where to find the free course. • Wireless is Back: The return of the CCNP and CCIE Wireless tracks. • Cybersecurity Overhaul: CyberOps is evolving into CCNA/CCNP Cybersecurity. • Recertification Hack: How to use these free courses to renew your existing certifications without paying for exams. Big thank you to Cisco for sponsoring my trip to Cisco Live Amsterdam // FREE courses // Cisco AI Technical Practitioner | AITECH: https://u.cisco.com/paths/cisco-ai-te... Cisco AI Business Practitioner | AIBIZ: https://u.cisco.com/paths/cisco-ai-bu... Free Ethical Hacking Course: https://www.cisco.com/site/us/en/lear... Understanding Cisco Network Automation Essentials (DEVNAE): https://learningnetwork.cisco.com/s/f... Blog entry about Rev Up: https://learningnetwork.cisco.com/s/q... // Other courses - NOT free // Cisco Silicon One for AI Networking | DCSOAI: https://u.cisco.com/paths/cisco-silic... Enhancing Cisco Security Solutions with Splunk | ECSS: https://u.cisco.com/paths/cisco-splun... Cisco Silicon One for AI Networking | DCSOAI: https://u.cisco.com/paths/enhancing-c... CCNA Automation: https://www.cisco.com/site/us/en/lear... Programming for Network Engineers | PRNE: https://u.cisco.com/paths/programming... // Ryan Rose’s SOCIAL // LinkedIn: / ryanrose3 Cisco Blogs: https://blogs.cisco.com/author/ryanrose X: https://x.com/RyanRose // Lacey Senko SOCIAL // LinkedIn: / laceycsenko // Websites and YouTube Channel links // Career Map / Path: https://www.cisco.com/c/dam/en_us/tra... Learn Cisco: / @ciscoutube Cisco U: https://u.cisco.com/ Cisco Networking Academy: https://www.cisco.com/site/us/en/lear... Cisco Learning Network: https://learningnetwork.cisco.com/s/ Netacad: https://www.netacad.com Cisco Learning Community: https://learningnetwork.cisco.com/s/ Free Ethical Hacking Course: https://www.cisco.com/site/us/en/lear... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:36 - Introduction 0:48 - Rev Up Updates 02:36 - What are CE Credits? 03:27 - Cisco Learning Network Community 06:14 - How Cisco CCNA Changes Lives 07:06 - Cisco Live Announcements Training 12:04 - Navigating Cisco Learning Network Site 14:25 - CiscoU Free Account 14:49 - Cyber & AI Security Learning Track 17:16 - Ethical Hacker Certificate 19:16 - Everything under the Learn with Cisco Brand 21:20 - Passing of Knowledge through Cisco 23:13 - Where Does a Person Start? 24:35 - Parting Words Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #ciscolive #ciscoemea

    25 min
  2. #537: Best OSINT Tools 2026: What Pros Use Daily

    30M AGO

    #537: Best OSINT Tools 2026: What Pros Use Daily

    Are you ready to see the 7 digital investigation tools that completely changed how I look at the internet? In this video, I’m REVEALING a powerful stack of OSINT (Open Source Intelligence) and research tools that most people have zero clue exist. These are absolute game-changers. Subscribe for more cutting-edge tech and security tools: The internet is vast, but finding the right information, or knowing what information about you is out there, requires the right toolkit. I was genuinely shocked by the advanced capabilities of some of these applications. Whether you are a cybersecurity researcher, a journalist, a private investigator, or just someone who wants to master digital reconnaissance and protect their privacy, this list of 7 secret tools will upgrade your skillset immediately. We are breaking down tools for deep email searching, uncovering hidden data in PDFs, mapping global networks, and analyzing trends that standard search engines completely miss. // MJ Banias’ SOCIALS // LinkedIn: / mjbanias Cloak and Dagger Podcast (Spotify): https://open.spotify.com/show/6mT8zDM... The Debrief: https://thedebrief.org/podcasts/ Instagram: / mjbanias X: https://x.com/mjbanias Website: https://www.bullshithunting.com/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:36 - Introduction 01:17 - Who is MJ Banias? 03:55 - MJ Banias’ Favourite OSINT Tools 04:28 - Bullsh*t Hunting 06:10 - Tool 1 - WhatsMyName Web 09:47 - Tool 2 - DorkGPT and Dork Search Pro 14:30 - Tool 3 - OD Crawler 16:59 - Tool 4 - Kagi Browser 21:55 - Tool 5 - Ubikron 26:35 - Tool 6 - newspapers.com and Judy Records 34:56 - Tool 7 - OSINT Industries 40:15 - Maltego 42:54 - Darkside and Breach Data 49:03 - Privacy Laws in America and beyond 50:57 - Plugs From MJ Banias 51:35 - MJ Banias Socials 52:25 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #osint #osinttools #privacy

    53 min
  3. #536: Inside the Cisco 8000: 100Tbps Capacity

    34M AGO

    #536: Inside the Cisco 8000: 100Tbps Capacity

    Is this the most powerful network switch ever built? In this interview from Cisco Live, we look at the new generation of Cisco 8000 and Nexus switches capable of routing 100 Terabits per second. We break down why AI data centers are forced to move from air cooling to liquid cooling, and how a single switch chassis can now handle the equivalent mobile traffic of 100 million people. AI models are growing faster than the infrastructure can keep up. To solve this, the network switch had to evolve. In this video, I talk to Will from Cisco about the engineering challenges of building the "G300" generation of switches, hardware so dense that air cooling is no longer enough. We discuss the massive architectural shift occurring in data centers, where Liquid Cooled Switches are becoming the new standard to support 1.6T Ethernet ports and massive GPU clusters. Key Hardware Topics: • The 100 Terabit Chassis: How Cisco architecture handles massive throughput. • Liquid Cooling: Why switches are adopting "direct-to-chip" cooling just like gaming rigs. • Scale-Out Networking: How these switches manage congestion for AI training jobs (Job Completion Time). • Career Insights: Will manages 5,000 engineers and explains why understanding the physical layer and hardware constraints is a superpower for modern developers. Big thanks to Cisco for sponsoring my trip to Cisco Live EMEA and for changing my life and the lives of many other people. // Will Eatherton SOCIAL // LinkedIn:   / willeatherton Newsroom: https://newsroom.cisco.com/c/r/newsro... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:49 - Will Eatherton introduction and projects // Hyperscale, neocloud & enterprises 08:03 - New Cisco hardware // Silicon One G300 13:18 - Data centers + AI + GPUs 16:27 - G300 use case & Cisco Nexus 21:56 - Liquid-cooled switches 24:12 - Networking as a career path 28:41 - Development and opportunities in networking 30:14 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #ciscolive #ciscoemea

    32 min
  4. #535: Encryption vs Hashing: What's the real difference?

    FEB 2

    #535: Encryption vs Hashing: What's the real difference?

    Big thank you to DeleteMe for sponsoring this video. Use my link http://joindeleteme.com/Bombal to receive a 20% discount or use the QR Code in the video. In this interview, David Bombal sits down with Dr. Mike Pound (Computerphile) to clear up one of the biggest crypto misconceptions on the Internet: hashing is not encryption, and hash functions are not reversible. In this video you’ll learn what a hash function actually does (a deterministic, fixed-length, “random-looking” summary of data) and why the whole point is that you cannot take a hash and reconstruct the original file. Dr Mike explains the key properties of secure hashing, including the avalanche effect (tiny input change, massive output change), and why older algorithms like MD5 and SHA-1 became unsafe due to collisions. We also cover what “collisions” really mean, why they must exist in theory (the pigeonhole principle) and why they can appear sooner than expected (the birthday paradox). Then we tackle the YouTube-comments classic: rainbow tables. If hashes are one-way, how do attackers “crack” passwords? The answer: they don’t reverse hashes. They guess passwords, hash them forward, and match the results. Mike breaks down how rainbow tables speed this up with precomputed hashes, and why salting makes those precomputations far less effective by forcing attackers to redo work per user. Finally, we zoom out into modern cryptography: why SHA-2 is widely used today, why SHA-3 exists as a structurally different backup option, what length extension attacks are, and what quantum computing changes (and doesn’t change) for hashing and encryption. We also touch on how hashes power digital signatures, file integrity checks (like verifying an ISO download), and why AES dominates symmetric encryption. // Mike's SOCIAL // X: / _mikepound // YouTube Video REFERENCE // SHA: Secure Hashing Algorithm: • SHA: Secure Hashing Algorithm - Computerphile Birthday Paradox: • Hash Collisions & The Birthday Paradox - C... The Next Big SHA? SHA3 Sponge Function Explained: • The Next Big SHA? SHA3 Sponge Function Exp... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:09 - DeleteMe sponsored segment 02:54 - Hashing is not Encryption // Encryption and Hashing explained 09:47 - Hash functions are irreversible 15:22 - How hashing works 17:23 - Why MD5 is bad 20:09 - Recommended hashing function 21:47 - Birthday paradox explained 23:39 - Rainbow table explained 29:44 - Salting explained 33:35 - Pigeon Hole principle explained 36:35 - SHA-2 is the answer 37:17 - SHA-3 vs SHA-2 40:42 - The effect of quantum computing 42:47 - Quick summary 43:52 - Sign-In with private key 45:21 - Avalanche effect explained 49:10 - Where to learn more about hash functions 50:27 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cryptography #hashing #encryption

    51 min
  5. #534: How Dark Web Market Owners Get CAUGHT

    JAN 25

    #534: How Dark Web Market Owners Get CAUGHT

    Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal to start your 30 day free trial or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription Stephen Sims joins David Bombal to discuss Operational Security (OpSec) through the lens of the "Darknet Marketplace Bible" (DNM Bible). While this document is originally designed to help criminals evade law enforcement while buying illegal goods, Stephen argues it is an excellent resource for cybersecurity professionals, journalists, and privacy advocates to learn high-level anonymity and encryption techniques. Disclaimer: Both David and Stephen repeatedly emphasize that this content is for educational, privacy, and cybersecurity research purposes only. They do not advocate illegal activity. // Stephen's Social // Twitter: / steph3nsims YouTube: / @offbyonesecurity // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:08 - Brilliant sponsored segment 03:04 - Disclaimer 03:07 - The Dark Web 07:44 - What is the Dark Web? 09:14 - The Dark Net Marketplace Bible 11:42 - DOs and DON'Ts 22:49 - Dark Net Directory 26:09 - Dread walkthrough 31:04 - Recommended Operating systems 42:07 - VPNs, Tor & PGP 53:23 - PGP // Creating key pairs 01:03:53 - How to access Dark Net Marketplaces // Black Ops marketplace 01:12 :39 - Recommended cryptocurrency for the Dark Web 01:18:43 - Shipping 01:21:12 - Communication methods 01:27:28 - JavaScript warnings 01:28:13 - Never trust external links 01:29:29 - DNM Bible summary 01:31:01 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #darkweb #opsec #tor

    1h 32m
  6. #533: Best Hacking Tools for 2026: From Linux to DragonOS

    JAN 19

    #533: Best Hacking Tools for 2026: From Linux to DragonOS

    In this video, I sit down with OTW (author of Linux Basics for Hackers) to reveal the definitive list of top hacking and cybersecurity tools for 2026. We cover everything from the essential foundations like Linux and Python to the "state of the art" in wireless hacking with DragonOS and SDRs. // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:00 - Top hacking tools for 2026 04:07 - Hacking tool #1: The hacking OS 07:10 - Hacking tool #2: Discovering systems on the network 08:31 - Hacking tool #3: Monitoring network traffic 10:25 - Hacking tool #4: Web app hacking 11:24 - Hacking tool #5: Vulnerability scanner 16:35 - Hacking tool #6: Basic hacking 18:11 - Hacking tool #7: The cybersecurity scripting language 19:38 - Hacking tool #8: Hacking wireless signals 25:27 - Hacking tool #9: Virtual machines 27:38 - Hacking tool #10: IDS (Intrusion Detection System) 32:08 - Hacking tool #11: Learning firewalls 37:07 - Hacking tool #12: Using AI 42:45 - Hacking tools summary 43:25 - The era of AI 45:34 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

    47 min
  7. #532: Cybersecurity 2026 WARNING: AI Makes Every System Riskier

    JAN 19

    #532: Cybersecurity 2026 WARNING: AI Makes Every System Riskier

    In this interview David and Dr Mike Pound discuss Agentic AI and how powerful it is powerful, but prompt injection and untrusted PDFs can leak data or alter records. Learn least privilege, input and output filtering, and model trust risks. // Sponsored SEGMENT // Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 40% discount // Mike SOCIAL // X: / _mikepound // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:56 - Proton Pass sponsored segment 02:15 - AI & cybersecurity // Vulnerabilities of AI 12:56 - Direct & Indirect Prompt Injection explained 17:52 - Input & Output Filtering explained 20:20 - AI having access to private data 25:24 - Reactions to AI & cybersecurity 27:06 - Risks of downloading open-source AI models 36:02 - The good and bad of AI models 40:23 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cybersecurity #ai #promptinjection

    42 min
  8. #531: Critical 10/10 n8n Vulnerability EXPLOITED

    JAN 19

    #531: Critical 10/10 n8n Vulnerability EXPLOITED

    Security researchers Dor Attias and Ofek Itach demonstrate a critical CVSS 10.0 n8n vulnerability (CVE-2026-21858). Watch the full RCE exploit demo using type confusion to bypass authentication and read sensitive local files. // Dor Attias SOCIAL // LinkedIn: / dor-attias-740758155 // Ofek Itach SOCIAL // LinkedIn: / ofek-it // N8N Hack Blog https://www.cyera.com/research-labs/n... // Cyera Blog // https://www.cyera.com/blog // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:56 - n8n vulnerability explained 02:33 - n8n hacking demo // How the vulnerability works 09:13 - How bad is it? 11:51 - Vulnerability summary 13:28 - More explained on Cyera blog // Webhooks 16:59 - Webhooks explained 18:09 - Formidable 19:18 - Formidable explained 20:01 - Handling uploaded files in n8n 22:32 - The form webhook node 24:28 - How to exploit 25:54 - Exploit summary 26:46 - How to mitigate 27:37 - How to become a security researcher 32:36 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

    34 min
5
out of 5
24 Ratings

About

Want to learn about IT? Want to get ahead in your career? Well, this is the right place! On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics. This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content. David’s details: Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com YouTube: https://www.youtube.com/davidbombal All the best! David

You Might Also Like