Instructional Video17:28
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through ajax.googleapis.com

Higher Ed
This video explains and demonstrates bypassing CSP through ajax.googleapis.com.
<
br/>
This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack...
Instructional Video4:24
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 2

Higher Ed
This is the second of the two-part video that demonstrates how to be prevented from the account takeover through Clickjacking.
<
br/>
This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web...
Instructional Video2:36
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Subdomain Takeover – Part 2

Higher Ed
This is the second of the two-part video that recaps what steps you have followed to take the control of the Subdomain.
<
br/>
This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking...
Instructional Video10:30
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Subdomain Takeover – Part 1

Higher Ed
This is the first of the two-part video that demonstrates the subdomain takeover by attacking the subdomain.
<
br/>
This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert ...
Instructional Video10:29
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - User Redirection through window.opener Tabnabbing – Part 1

Higher Ed
This is the first of the two-part video that talks about how to attack through link. You will work on the user redirection through window.opener tabnabbing.
<
br/>
This clip is from the chapter "Hacking Web Applications through...
Instructional Video10:43
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through Flash File

Higher Ed
This video demonstrates bypassing CSP through flash file.
<
br/>
This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This...
Instructional Video7:41
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Windows Firewall

Higher Ed
Like all operating systems, Windows comes with a built-in software firewall. Unlike the firewall on your router, this firewall only protects a single system. It's important for techs – and the users they support – to understand how to...
Instructional Video13:35
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Working with Active Directory

Higher Ed
More advanced Windows networks use Active Directory Domains instead of Workgroups. These Domains, especially Microsoft's Active Directory-enabled Domains, provide powerful services for larger networks.
<
br/>
This clip is from the...
Instructional Video5:59
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Windows Naming

Higher Ed
Microsoft introduced a series of naming protocols, some of which predate the Internet. Interestingly, these protocols (or at least their modern versions) are still alive and well not only on Windows systems but on Linux and macOS...
Instructional Video10:54
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Understanding DNS

Higher Ed
Individual hosts use IP addresses, but humans are terrible at memorizing long strings of numbers. To make our lives easier, most TCP/IP networks (and certainly the Internet) use the Domain Name System (DNS) to apply more human-friendly...
Instructional Video7:39
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Advanced Windows Commands

Higher Ed
The Windows command line also provides hundreds of tools, and many have nothing to do with managing files, folders, and drives. A good tech should understand commands for manipulating processes and group policies.
<
br/>
This clip...
Instructional Video4:05
Curated Video

React JS Masterclass - Go From Zero To Job Ready - Assignment Deployment

Higher Ed
In this video, you will learn to create basket icons, implement them individually, and test them for functionality.
Instructional Video5:55
Curated Video

React JS Masterclass - Go From Zero To Job Ready - Project Deployment

Higher Ed
In this video, you will learn how to deploy our project on an online server. The first method involves pushing our project from the local system to a GitHub repository to Netlify or any other server we choose. The second way is to push...
Instructional Video6:53
Curated Video

React JS Masterclass - Go From Zero To Job Ready - Project Deployment / 172

Higher Ed
In this final video, we will focus on the deployment process. We will get into the gitignore file and add the .env file. We will then create a new repository on GitHub called WriteNode and place the entire project folder structures here....
Instructional Video11:03
Curated Video

PowerShell for Automating Administration - Code Changes to be able to execute Scripts Centrally

Higher Ed
In this video, you will see what changes we can make in our application and system validation scripts to be able to put the scripts on a remote server; and we never have to login into the remote server at all, be it for executing the...
Instructional Video10:53
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Understanding DNS

Higher Ed
Individual hosts use IP addresses, but humans are terrible at memorizing long strings of numbers. To make our lives easier, most TCP/IP networks (and certainly the Internet) use the Domain Name System (DNS) to apply more human-friendly...
Instructional Video1:55
Curated Video

Social Media Automation using Python - Introduction to Instructor

Higher Ed
This video introduces the author/instructor and his experience in this online-course content discipline and discusses the AI Sciences group of instructors.
<
br/>
This clip is from the chapter "Introduction" of the series "Social...
Instructional Video3:40
Curated Video

Linux Operating System: A Complete Linux Guide for Beginners - Networking - Introduction

Higher Ed
In this video, we will get introduced to some basic network commands such as hostname, ping, host.
<
br/>
This clip is from the chapter "Networking" of the series "Linux Operating System: A Complete Linux Guide for Beginners".In...
Instructional Video6:54
Curated Video

CISSP Crash Course - Federated Identities

Higher Ed
This video explains centralized versus decentralized identities.
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and...
Instructional Video3:07
Curated Video

CISSP Crash Course - Understand and Comply with Investigations

Higher Ed
This video explains evidence collection, forensics, and handling investigations.
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
Instructional Video3:04
Curated Video

CISSP Crash Course - Control Physical and Logical Access

Higher Ed
This video explains control physical and logical access as well as type of assets that are part of a system.
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section...
Instructional Video8:39
Curated Video

CISSP Crash Course - Information Assets

Higher Ed
This video explains information assets and data classification.
<
br/>
This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and...
Instructional Video4:24
Curated Video

CISSP Crash Course - Policy, Standards, Procedures, and Guidelines

Higher Ed
This video explains policy, standards, procedures, and guidelines.
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and...
Instructional Video8:14
Curated Video

CISSP Crash Course - Security Concepts

Higher Ed
This video explains some basic security topics.<br<br/>/>

This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.