Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Have I Been Pwned?
In this video, the author introduces you to a web tool called “have I been pwnedâ€; this is a website where you can check whether your email address or password has been compromised. This clip is from the chapter "Personal Security" of...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Introduction to Password Managers
In this video, you will be introduced to password manager tools such as LastPass or dashlane. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Password Management
In this video, you will learn about password management and the need for using strong passwords to keep your system safe. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023...
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Credential Rotation
An additional factor is credential rotation. You will learn about this process and how to configure password rotation policies in this video.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Password Policies
With your user accounts, you will want to have strong passwords. AWS can help you with this through the implementation of password policies and you will learn how to use them in this video.
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Sensitive Data in URLs
This video talks about how to find sensitive data in URLs using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Password Hashing with Bcrypt
In this video, we will explore how to securely hash and store user passwords using Bcrypt.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Security Policies
NTFS permissions control files and folders, but there are plenty of other resources that need control. Security policies control factors such as login attempts, printer access, and password length/complexity. This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Why Windows?
In this video, we will look at why Microsoft Windows is so dominant on desktop systems. This clip is from the chapter "The Visible Computer" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section explains the common...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Passwords and Authentication
Password security can be compromised by many attack types, such as brute force, dictionary, and rainbow tables. This video explores options for creating very secure passwords and using multifactor authentication. This clip is from the...
Curated Video
Learning GitHub Actions for DevOps CI/CD - GitHub Actions Store Your Secrets and Passwords Securely
This video demonstrates how GitHub Actions store your secrets and passwords securely. This clip is from the chapter "GitHub Actions: Exploring the Features" of the series "Learning GitHub Actions for DevOps CI/CD".This section focuses on...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Mobile Security Troubleshooting
A lot of symptoms point to potential attacks on a mobile device, such as connection loss, power drain, slow data speeds, high resource utilization, and unintended connections. Others point at attacks that have already happened, such as...
Curated Video
CISSP Crash Course - Managed Identification
This video explains managed identification and authentication. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access management.
Curated Video
Oracle Database Administration from Zero to Hero - Introducing Oracle Database Architecture (Part 2 of 2)
In this video, you will learn about the major Oracle database files, including their purpose, types, and locations. This clip is from the chapter "Database Architecture" of the series "Oracle Database Administration from Zero to Hero".In...
Curated Video
Oracle Database Administration from Zero to Hero - Using Password File Authentication
In this video, you will learn about password file authentication. You will understand the concept, create a password file, set the REMOTE_LOGIN_PASSWORDFILE parameter, explore the relationship between OS authentication and password file...
Curated Video
Oracle Database Administration from Zero to Hero - Managing User Profiles (Part 2 of 2)
In this video, we will continue our exploration of managing user profiles. You will learn how to enable password complexity verification functions, obtain information about user passwords and profiles, implement gradual password rollover...
Curated Video
Real-World DevOps Project From Start to Finish - Installing and Configuring MariaDB, Ansible Vault
In this video, you will learn how to install and set up MariaDB on your server. You will explore the configuration options, including securing the database with user authentication and access control. Additionally, you will discover how...
Curated Video
PHISH: Practicing Good Email and Sign-in Hygiene
Explore the daily routines that create a resilient barrier against cyber threats. This video covers best practices such as crafting strong and unique passwords, enabling two-factor authentication, and logging out when accounts are not in...
Curated Video
SkillSprints: Creating Secure Passwords
In this video you will learn to create secure passwords that are difficult to guess or hack.
Vlogbrothers
They Hacked Me
Thank you to Sherri Davidoff from LMG Security for helping me both with this video and also with recovering from my hack. If you're thinking "I won't get hacked, I'm not a public person like Hank," that does NOT protect you. Most hacks...
Curated Video
LAB 2: Google Hacking
I will show you the basics of Google hacking without any prior technical knowledge
Curated Video
No Password !! No Issue, You Can Still Hack
No Password !! No Issue, You Can Still Hack
Curated Video
Takeover a Database Server
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully. Use this technique ethically.