Hi, what do you want to do?
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through ajax.googleapis.com
This video explains and demonstrates bypassing CSP through ajax.googleapis.com.
<
br/>
This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack...
<
br/>
This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 2
This is the second of the two-part video that demonstrates how to be prevented from the account takeover through Clickjacking.
<
br/>
This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web...
<
br/>
This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Subdomain Takeover – Part 2
This is the second of the two-part video that recaps what steps you have followed to take the control of the Subdomain.
<
br/>
This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking...
<
br/>
This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Subdomain Takeover – Part 1
This is the first of the two-part video that demonstrates the subdomain takeover by attacking the subdomain.
<
br/>
This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert ...
<
br/>
This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert ...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - User Redirection through window.opener Tabnabbing – Part 1
This is the first of the two-part video that talks about how to attack through link. You will work on the user redirection through window.opener tabnabbing.
<
br/>
This clip is from the chapter "Hacking Web Applications through...
<
br/>
This clip is from the chapter "Hacking Web Applications through...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through Flash File
This video demonstrates bypassing CSP through flash file.
<
br/>
This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This...
<
br/>
This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Windows Firewall
Like all operating systems, Windows comes with a built-in software firewall. Unlike the firewall on your router, this firewall only protects a single system. It's important for techs – and the users they support – to understand how to...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Working with Active Directory
More advanced Windows networks use Active Directory Domains instead of Workgroups. These Domains, especially Microsoft's Active Directory-enabled Domains, provide powerful services for larger networks.
<
br/>
This clip is from the...
<
br/>
This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Windows Naming
Microsoft introduced a series of naming protocols, some of which predate the Internet. Interestingly, these protocols (or at least their modern versions) are still alive and well not only on Windows systems but on Linux and macOS...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Understanding DNS
Individual hosts use IP addresses, but humans are terrible at memorizing long strings of numbers. To make our lives easier, most TCP/IP networks (and certainly the Internet) use the Domain Name System (DNS) to apply more human-friendly...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Advanced Windows Commands
The Windows command line also provides hundreds of tools, and many have nothing to do with managing files, folders, and drives. A good tech should understand commands for manipulating processes and group policies.
<
br/>
This clip...
<
br/>
This clip...
Curated Video
React JS Masterclass - Go From Zero To Job Ready - Assignment Deployment
In this video, you will learn to create basket icons, implement them individually, and test them for functionality.
Curated Video
React JS Masterclass - Go From Zero To Job Ready - Project Deployment
In this video, you will learn how to deploy our project on an online server. The first method involves pushing our project from the local system to a GitHub repository to Netlify or any other server we choose. The second way is to push...
Curated Video
React JS Masterclass - Go From Zero To Job Ready - Project Deployment / 172
In this final video, we will focus on the deployment process. We will get into the gitignore file and add the .env file. We will then create a new repository on GitHub called WriteNode and place the entire project folder structures here....
Curated Video
PowerShell for Automating Administration - Code Changes to be able to execute Scripts Centrally
In this video, you will see what changes we can make in our application and system validation scripts to be able to put the scripts on a remote server; and we never have to login into the remote server at all, be it for executing the...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Understanding DNS
Individual hosts use IP addresses, but humans are terrible at memorizing long strings of numbers. To make our lives easier, most TCP/IP networks (and certainly the Internet) use the Domain Name System (DNS) to apply more human-friendly...
Curated Video
Social Media Automation using Python - Introduction to Instructor
This video introduces the author/instructor and his experience in this online-course content discipline and discusses the AI Sciences group of instructors.
<
br/>
This clip is from the chapter "Introduction" of the series "Social...
<
br/>
This clip is from the chapter "Introduction" of the series "Social...
Curated Video
Linux Operating System: A Complete Linux Guide for Beginners - Networking - Introduction
In this video, we will get introduced to some basic network commands such as hostname, ping, host.
<
br/>
This clip is from the chapter "Networking" of the series "Linux Operating System: A Complete Linux Guide for Beginners".In...
<
br/>
This clip is from the chapter "Networking" of the series "Linux Operating System: A Complete Linux Guide for Beginners".In...
Curated Video
CISSP Crash Course - Federated Identities
This video explains centralized versus decentralized identities.
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and...
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and...
Curated Video
CISSP Crash Course - Understand and Comply with Investigations
This video explains evidence collection, forensics, and handling investigations.
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
Curated Video
CISSP Crash Course - Control Physical and Logical Access
This video explains control physical and logical access as well as type of assets that are part of a system.
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section...
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section...
Curated Video
CISSP Crash Course - Information Assets
This video explains information assets and data classification.
<
br/>
This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and...
<
br/>
This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and...
Curated Video
CISSP Crash Course - Policy, Standards, Procedures, and Guidelines
This video explains policy, standards, procedures, and guidelines.
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and...
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and...
Curated Video
CISSP Crash Course - Security Concepts
This video explains some basic security topics.<br<br/>/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.