Hi, what do you want to do?
IDG TECHtalk
How to disable basic or legacy authentication to set up MFA in Office 365
Microsoft recommends setting up multi-factor authentication in Windows 10 for better security, but you have to disable basic or legacy authentication first.
Packt
CompTIA Network+ Certification N10-007: The Total Course - Authenticating, Authorizing, and Accounting (AAA)
This video explains how RADIUS and TACACS+ protocol is used to provide network AAA. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA Network+ Certification N10-007:...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Access Control "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)"
This video dives into access control lists, describing the three levels of control commonly used in computing. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - SQL Basics
In this video, you'll learn the basics of SQL needed for SQL injection.
r/>
This clip is from the chapter "Web Application Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
r/>
This clip is from the chapter "Web Application Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Curated Video
Mastering MEAN Web Development Expert Full Stack JavaScript (Video 21)
Web development is moving fast and to keep up to mark, you need a technology stack that is . The MEAN stack includes MongoDb, Express, Angular, and Node.js. These tools provide a rich environment to build advanced web...
Curated Video
Django3- Creating a User
In this video, we will look at creating a user.
r/>
This clip is from the chapter "Site 3 - Todo Woo" of the series "Django 3 - Full Stack Websites with Python Web Development".In this section, we will be working on our project...
r/>
This clip is from the chapter "Site 3 - Todo Woo" of the series "Django 3 - Full Stack Websites with Python Web Development".In this section, we will be working on our project...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Password Management
In this video, you will understand the major (and sometimes annoying) issues around password management. This includes how to keep track of all of your passwords in a secure manner, and why sharing weak passwords across multiple...
Next Animation Studio
Thousands of Disney+ accounts stolen by hackers
Hackers started targeting Disney’s new streaming service just hours after it was launched on November 12.
<br/>
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - What is Multifactor Authentication
In this video, we will cover multifactor authentication.
r/>
This clip is from the chapter "Identity" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section introduces identities and Azure Active...
r/>
This clip is from the chapter "Identity" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section introduces identities and Azure Active...
Curated Video
Apache Maven Beginner to Guru - Configuring the Maven Master Password
This video demonstrates how to configure the Maven master password.<br/<br/>>
This clip is from the chapter "Maven Repositories" of the series "Apache Maven: Beginner to Guru".This section provides an explanation of Maven repositories.
This clip is from the chapter "Maven Repositories" of the series "Apache Maven: Beginner to Guru".This section provides an explanation of Maven repositories.
Curated Video
The Full Stack Web Development - JavaScript Form Validation - Form Project
Basic JavaScript Concepts: JavaScript Form Validation - Form Project
r/>
This clip is from the chapter "Basic JavaScript Concepts" of the series "The Full Stack Web Development".In this section, we learn the basics of...
r/>
This clip is from the chapter "Basic JavaScript Concepts" of the series "The Full Stack Web Development".In this section, we learn the basics of...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - All about passwords - Strength, Use and Transit
Credentials Management: All about passwords - Strength, Use and Transit
r/>
This clip is from the chapter "Credentials Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, very...
r/>
This clip is from the chapter "Credentials Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, very...
Curated Video
Bash Shell Scripting- Shell Script to execute different commands on different servers
This video shows how to write shell scripts to execute different commands on different servers.
r/>
This clip is from the chapter "Working with remote servers" of the series "Complete Bash Shell Scripting".This section shows...
r/>
This clip is from the chapter "Working with remote servers" of the series "Complete Bash Shell Scripting".This section shows...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Hardening Devices
This video shows how to perform hardening to eliminate the attack on the device. This clip is from the chapter "Protecting Your Network" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - What is a session?
Session Management: What is a session?
r/>
This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into security threats like session...
r/>
This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into security threats like session...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - 2-Factor Authentication Part I
In this 2-part eye-opening video module, you will learn all about wonderful 2-factor authentication: an excellent solution for preventing hackers hijacking your account! The term ‘2FA’ will be explained in simple terms, and then...
Curated Video
The Full Stack Web Development - Password Encryption
Backend programming with Node.js: Password Encryption
r/>
This clip is from the chapter "Backend programming with Node.js" of the series "The Full Stack Web Development".In this section, we work with the backend technology like...
r/>
This clip is from the chapter "Backend programming with Node.js" of the series "The Full Stack Web Development".In this section, we work with the backend technology like...
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Managing Linux Instances in Azure
In this video, we will look at managing Linux instances.
r/>
This clip is from the chapter "Azure Virtual machines" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains Azure compute and...
r/>
This clip is from the chapter "Azure Virtual machines" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains Azure compute and...
Globalive Media
Beyond Innovation: Episode 22
Clothing becomes digitally connected, robots serve drinks and medical scanners spot diseases. Plus, Michael and Anthony speak with a professor developing brainwave-activated passwords.
Hosted by venture capitalist Anthony...
Hosted by venture capitalist Anthony...
IDG TECHtalk
R tip: Keep passwords and tokens secure with the keyring package
Learn how to store credentials in an encrypted, secure keyring within R. Leave a comment and let us know what tips you’d like to see in a future Do More With R video.
Curated Video
AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - Password Policies in Amazon Web Services (AWS)
This video demonstrates how to use and implement password policies in AWS.
r/>
This clip is from the chapter "Solutions Architect Chapter 8 – Identity and Access Management (IAM) Best Practices" of the series "AWS Solutions...
r/>
This clip is from the chapter "Solutions Architect Chapter 8 – Identity and Access Management (IAM) Best Practices" of the series "AWS Solutions...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Rainbow Tables - 1
In this video, you'll learn to use rainbow tables to derive passwords.
r/>
This clip is from the chapter "Wireless Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
r/>
This clip is from the chapter "Wireless Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Exploiting Apache Tomcat with Metasploit
In this video, you'll learn how to use Apache Tomcat with Metasploit.
r/>
This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
r/>
This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...