Instructional Video7:40
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Security Policies

Higher Ed
NTFS permissions control files and folders, but there are plenty of other resources that need control. Security policies control factors such as login attempts, printer access, and password length/complexity. This clip is from the...
Instructional Video12:02
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Managing Users and Groups

Higher Ed
Every version of Windows has some utility to create, maintain, and remove users and groups from a system. Local Users and Groups give the most granular settings, but for quick setup, you can always add and edit accounts in the User...
Instructional Video4:43
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Windows 11 Editions and Features

Higher Ed
There are important differences between Windows 11 Home, Pro, Pro for Workstations, and Enterprise. This video reviews the versions and feature differences. This clip is from the chapter "Installing and Upgrading Operating Systems" of...
Instructional Video7:38
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Why Windows?

Higher Ed
In this video, we will look at why Microsoft Windows is so dominant on desktop systems. This clip is from the chapter "The Visible Computer" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section explains the common...
Instructional Video24:09
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 1

Higher Ed
This is the first of the two-part video that demonstrates the actual attack where you would take control of the account with the help of Clickjacking. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the...
Instructional Video18:13
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - AngularJS: Template Injection and $scope Hacking – Part 2

Higher Ed
This is the second of the two-part video that demonstrates Template Injection and $scope Hacking that uses AngularJS. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack...
Instructional Video16:39
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through Polyglot File

Higher Ed
This video explains bypassing CSP through polyglot file. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses...
Instructional Video17:28
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through ajax.googleapis.com

Higher Ed
This video explains and demonstrates bypassing CSP through ajax.googleapis.com. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation...
Instructional Video4:24
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 2

Higher Ed
This is the second of the two-part video that demonstrates how to be prevented from the account takeover through Clickjacking. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking...
Instructional Video2:36
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Subdomain Takeover – Part 2

Higher Ed
This is the second of the two-part video that recaps what steps you have followed to take the control of the Subdomain. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert...
Instructional Video10:30
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Subdomain Takeover – Part 1

Higher Ed
This is the first of the two-part video that demonstrates the subdomain takeover by attacking the subdomain. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert Full-Stack...
Instructional Video10:29
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - User Redirection through window.opener Tabnabbing – Part 1

Higher Ed
This is the first of the two-part video that talks about how to attack through link. You will work on the user redirection through window.opener tabnabbing. This clip is from the chapter "Hacking Web Applications through PDFs, Images,...
Instructional Video10:43
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through Flash File

Higher Ed
This video demonstrates bypassing CSP through flash file. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section...
Instructional Video7:41
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Windows Firewall

Higher Ed
Like all operating systems, Windows comes with a built-in software firewall. Unlike the firewall on your router, this firewall only protects a single system. It's important for techs – and the users they support – to understand how to...
Instructional Video13:35
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Working with Active Directory

Higher Ed
More advanced Windows networks use Active Directory Domains instead of Workgroups. These Domains, especially Microsoft's Active Directory-enabled Domains, provide powerful services for larger networks. This clip is from the chapter...
Instructional Video5:59
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Windows Naming

Higher Ed
Microsoft introduced a series of naming protocols, some of which predate the Internet. Interestingly, these protocols (or at least their modern versions) are still alive and well not only on Windows systems but on Linux and macOS systems...
Instructional Video10:54
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Understanding DNS

Higher Ed
Individual hosts use IP addresses, but humans are terrible at memorizing long strings of numbers. To make our lives easier, most TCP/IP networks (and certainly the Internet) use the Domain Name System (DNS) to apply more human-friendly...
Instructional Video7:39
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Advanced Windows Commands

Higher Ed
The Windows command line also provides hundreds of tools, and many have nothing to do with managing files, folders, and drives. A good tech should understand commands for manipulating processes and group policies. This clip is from the...
Instructional Video4:05
Curated Video

React JS Masterclass - Go From Zero To Job Ready - Assignment Deployment

Higher Ed
In this video, you will learn to create basket icons, implement them individually, and test them for functionality.
Instructional Video5:55
Curated Video

React JS Masterclass - Go From Zero To Job Ready - Project Deployment

Higher Ed
In this video, you will learn how to deploy our project on an online server. The first method involves pushing our project from the local system to a GitHub repository to Netlify or any other server we choose. The second way is to push...
Instructional Video6:53
Curated Video

React JS Masterclass - Go From Zero To Job Ready - Project Deployment / 172

Higher Ed
In this final video, we will focus on the deployment process. We will get into the gitignore file and add the .env file. We will then create a new repository on GitHub called WriteNode and place the entire project folder structures here....
Instructional Video11:03
Curated Video

PowerShell for Automating Administration - Code Changes to be able to execute Scripts Centrally

Higher Ed
In this video, you will see what changes we can make in our application and system validation scripts to be able to put the scripts on a remote server; and we never have to login into the remote server at all, be it for executing the...
Instructional Video10:53
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Understanding DNS

Higher Ed
Individual hosts use IP addresses, but humans are terrible at memorizing long strings of numbers. To make our lives easier, most TCP/IP networks (and certainly the Internet) use the Domain Name System (DNS) to apply more human-friendly...
Instructional Video1:55
Curated Video

Social Media Automation using Python - Introduction to Instructor

Higher Ed
This video introduces the author/instructor and his experience in this online-course content discipline and discusses the AI Sciences group of instructors. This clip is from the chapter "Introduction" of the series "Social Media...