Instructional Video3:33
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Have I Been Pwned?

Higher Ed
In this video, the author introduces you to a web tool called “have I been pwnedâ€; this is a website where you can check whether your email address or password has been compromised. This clip is from the chapter "Personal Security" of...
Instructional Video4:25
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Introduction to Password Managers

Higher Ed
In this video, you will be introduced to password manager tools such as LastPass or dashlane. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section...
Instructional Video12:13
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Password Management

Higher Ed
In this video, you will learn about password management and the need for using strong passwords to keep your system safe. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023...
Instructional Video5:38
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Credential Rotation

Higher Ed
An additional factor is credential rotation. You will learn about this process and how to configure password rotation policies in this video.
Instructional Video8:52
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Password Policies

Higher Ed
With your user accounts, you will want to have strong passwords. AWS can help you with this through the implementation of password policies and you will learn how to use them in this video.
Instructional Video3:16
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Sensitive Data in URLs

Higher Ed
This video talks about how to find sensitive data in URLs using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Instructional Video8:44
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Password Hashing with Bcrypt

Higher Ed
In this video, we will explore how to securely hash and store user passwords using Bcrypt.
Instructional Video7:40
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Security Policies

Higher Ed
NTFS permissions control files and folders, but there are plenty of other resources that need control. Security policies control factors such as login attempts, printer access, and password length/complexity. This clip is from the...
Instructional Video7:38
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Why Windows?

Higher Ed
In this video, we will look at why Microsoft Windows is so dominant on desktop systems. This clip is from the chapter "The Visible Computer" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section explains the common...
Instructional Video13:36
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Passwords and Authentication

Higher Ed
Password security can be compromised by many attack types, such as brute force, dictionary, and rainbow tables. This video explores options for creating very secure passwords and using multifactor authentication. This clip is from the...
Instructional Video6:21
Curated Video

Learning GitHub Actions for DevOps CI/CD - GitHub Actions Store Your Secrets and Passwords Securely

Higher Ed
This video demonstrates how GitHub Actions store your secrets and passwords securely. This clip is from the chapter "GitHub Actions: Exploring the Features" of the series "Learning GitHub Actions for DevOps CI/CD".This section focuses on...
Instructional Video5:36
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Mobile Security Troubleshooting

Higher Ed
A lot of symptoms point to potential attacks on a mobile device, such as connection loss, power drain, slow data speeds, high resource utilization, and unintended connections. Others point at attacks that have already happened, such as...
Instructional Video9:41
Curated Video

CISSP Crash Course - Managed Identification

Higher Ed
This video explains managed identification and authentication. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access management.
Instructional Video6:49
Curated Video

Oracle Database Administration from Zero to Hero - Introducing Oracle Database Architecture (Part 2 of 2)

Higher Ed
In this video, you will learn about the major Oracle database files, including their purpose, types, and locations. This clip is from the chapter "Database Architecture" of the series "Oracle Database Administration from Zero to Hero".In...
Instructional Video14:07
Curated Video

Oracle Database Administration from Zero to Hero - Using Password File Authentication

Higher Ed
In this video, you will learn about password file authentication. You will understand the concept, create a password file, set the REMOTE_LOGIN_PASSWORDFILE parameter, explore the relationship between OS authentication and password file...
Instructional Video9:32
Curated Video

Oracle Database Administration from Zero to Hero - Managing User Profiles (Part 2 of 2)

Higher Ed
In this video, we will continue our exploration of managing user profiles. You will learn how to enable password complexity verification functions, obtain information about user passwords and profiles, implement gradual password rollover...
Instructional Video15:25
Curated Video

Real-World DevOps Project From Start to Finish - Installing and Configuring MariaDB, Ansible Vault

Higher Ed
In this video, you will learn how to install and set up MariaDB on your server. You will explore the configuration options, including securing the database with user authentication and access control. Additionally, you will discover how...
Instructional Video1:23
Curated Video

PHISH: Practicing Good Email and Sign-in Hygiene

Pre-K - Higher Ed
Explore the daily routines that create a resilient barrier against cyber threats. This video covers best practices such as crafting strong and unique passwords, enabling two-factor authentication, and logging out when accounts are not in...
Instructional Video2:56
Curated Video

SkillSprints: Creating Secure Passwords

Pre-K - Higher Ed
In this video you will learn to create secure passwords that are difficult to guess or hack.
Instructional Video3:46
Vlogbrothers

They Hacked Me

6th - 11th
Thank you to Sherri Davidoff from LMG Security for helping me both with this video and also with recovering from my hack. If you're thinking "I won't get hacked, I'm not a public person like Hank," that does NOT protect you. Most hacks...
Instructional Video1:29
Curated Video

Password Tools and Tips

Higher Ed
General tips and tools for password generation and storage
Instructional Video5:03
Curated Video

LAB 2: Google Hacking

Higher Ed
I will show you the basics of Google hacking without any prior technical knowledge
Instructional Video5:43
Curated Video

No Password !! No Issue, You Can Still Hack

Higher Ed
No Password !! No Issue, You Can Still Hack
Instructional Video8:26
Curated Video

Takeover a Database Server

Higher Ed
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully. Use this technique ethically.