Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Security Policies
NTFS permissions control files and folders, but there are plenty of other resources that need control. Security policies control factors such as login attempts, printer access, and password length/complexity. This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Managing Users and Groups
Every version of Windows has some utility to create, maintain, and remove users and groups from a system. Local Users and Groups give the most granular settings, but for quick setup, you can always add and edit accounts in the User...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Windows 11 Editions and Features
There are important differences between Windows 11 Home, Pro, Pro for Workstations, and Enterprise. This video reviews the versions and feature differences. This clip is from the chapter "Installing and Upgrading Operating Systems" of...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Why Windows?
In this video, we will look at why Microsoft Windows is so dominant on desktop systems. This clip is from the chapter "The Visible Computer" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section explains the common...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 1
This is the first of the two-part video that demonstrates the actual attack where you would take control of the account with the help of Clickjacking. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - AngularJS: Template Injection and $scope Hacking – Part 2
This is the second of the two-part video that demonstrates Template Injection and $scope Hacking that uses AngularJS. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through Polyglot File
This video explains bypassing CSP through polyglot file. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through ajax.googleapis.com
This video explains and demonstrates bypassing CSP through ajax.googleapis.com. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 2
This is the second of the two-part video that demonstrates how to be prevented from the account takeover through Clickjacking. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Subdomain Takeover – Part 2
This is the second of the two-part video that recaps what steps you have followed to take the control of the Subdomain. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Subdomain Takeover – Part 1
This is the first of the two-part video that demonstrates the subdomain takeover by attacking the subdomain. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert Full-Stack...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - User Redirection through window.opener Tabnabbing – Part 1
This is the first of the two-part video that talks about how to attack through link. You will work on the user redirection through window.opener tabnabbing. This clip is from the chapter "Hacking Web Applications through PDFs, Images,...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through Flash File
This video demonstrates bypassing CSP through flash file. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Windows Firewall
Like all operating systems, Windows comes with a built-in software firewall. Unlike the firewall on your router, this firewall only protects a single system. It's important for techs – and the users they support – to understand how to...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Working with Active Directory
More advanced Windows networks use Active Directory Domains instead of Workgroups. These Domains, especially Microsoft's Active Directory-enabled Domains, provide powerful services for larger networks. This clip is from the chapter...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Windows Naming
Microsoft introduced a series of naming protocols, some of which predate the Internet. Interestingly, these protocols (or at least their modern versions) are still alive and well not only on Windows systems but on Linux and macOS systems...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Understanding DNS
Individual hosts use IP addresses, but humans are terrible at memorizing long strings of numbers. To make our lives easier, most TCP/IP networks (and certainly the Internet) use the Domain Name System (DNS) to apply more human-friendly...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Advanced Windows Commands
The Windows command line also provides hundreds of tools, and many have nothing to do with managing files, folders, and drives. A good tech should understand commands for manipulating processes and group policies. This clip is from the...
Curated Video
React JS Masterclass - Go From Zero To Job Ready - Assignment Deployment
In this video, you will learn to create basket icons, implement them individually, and test them for functionality.
Curated Video
React JS Masterclass - Go From Zero To Job Ready - Project Deployment
In this video, you will learn how to deploy our project on an online server. The first method involves pushing our project from the local system to a GitHub repository to Netlify or any other server we choose. The second way is to push...
Curated Video
React JS Masterclass - Go From Zero To Job Ready - Project Deployment / 172
In this final video, we will focus on the deployment process. We will get into the gitignore file and add the .env file. We will then create a new repository on GitHub called WriteNode and place the entire project folder structures here....
Curated Video
PowerShell for Automating Administration - Code Changes to be able to execute Scripts Centrally
In this video, you will see what changes we can make in our application and system validation scripts to be able to put the scripts on a remote server; and we never have to login into the remote server at all, be it for executing the...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Understanding DNS
Individual hosts use IP addresses, but humans are terrible at memorizing long strings of numbers. To make our lives easier, most TCP/IP networks (and certainly the Internet) use the Domain Name System (DNS) to apply more human-friendly...
Curated Video
Social Media Automation using Python - Introduction to Instructor
This video introduces the author/instructor and his experience in this online-course content discipline and discusses the AI Sciences group of instructors. This clip is from the chapter "Introduction" of the series "Social Media...