Curated Video
Bug Bounty Program Certification 8.4: Database Attack Using Manual Techniques
This video focuses on manual database attack. • Explore manual database attack • Understand various injection commands to exploit database • Explanation of the manual commands
Curated Video
Bug Bounty Program Certification 7.5: Install Acunetix Web Vulnerability Scanner
This video will help you understand web scanning using Acunetix web vulnerability scanner. • Download Acunetix web vulnerability scanner • Installation of web scanner • Reporting of vulnerabilities
Curated Video
Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Curated Video
Bug Bounty Program Certification 5.5: Perform Brute Force Attack on File Transfer Protocol
This video will help you perform brute force attack on file transfer protocol. • Setup FTP in Windows10 machine • Explore Hydra commands for brute force attack • Learn about brute force attack on FTP to get login credentials
Curated Video
Cloud Native Development on Azure with Java 2.6: Deploy Your App to an Azure App Service Instance
In this video, we will show you how to deploy the Spring Boot app to Azure. So, you will be able to migrate your locally running app to Azure Web Apps. • Created an Azure web application hosted within the Azure App Service • Use the KUDU...
Curated Video
Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4
Exam questions. • Practice questions • Solutions • Explanation of answer
Packt
State the purpose of network hardware : Structured Cabling
From the section: Essentials of Networking. In this section, we learn about WANS, Routers, cables and connectors. CompTIA doesn’t expect you to prove you can crimp your own cables, but it does expect you to understand the crimping...
Packt
Introduction to computer hardware and software : Touring the Case
From the section: Motherboards. In this section, we look into motherboard features such as Chipsets and how to install. A PC’s case is an amazing and often overlooked part of the system. Understanding common case features makes it easier...
Packt
Troubleshoot a faulty computer network : RIP Troubleshooting Scenario 1. Can you find the issue?
From the section: RIP Troubleshooting (ICND1). In this section, we learn to troubleshoot RIP in different scenario. RIP Troubleshooting (ICND1): RIP Troubleshooting Scenario 1. Can you find the issue?
Packt
Use functions or APIs from external libraries to develop a computer program : Name and Main
From the section: Advanced Python. This section helps to understand about OOP, classes, class interface etc. We will dive into learning Advance Python Why does "Name and Main" sound like a steakhouse? It has nothing to do with steak. But...
Packt
Use functions or APIs from external libraries to develop a computer program : Creating a Package
From the section: Advanced Python. This section helps to understand about OOP, classes, class interface etc. We will dive into learning Advance Python Learn how to create your own local package for your Python programs!
Curated Video
Describe cyber attacks that could affect a computer system or network : Installation of Virtual Machines
From the section: Introducing Network Security.This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Curated Video
Describe cyber attacks that could affect a computer system or network : The Course Overview
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Hough transform – practical example in python
From the section: Computer Vision Basics: Part 2. In this section, we’ll explore the some addtiional features of Computer Vision. Computer Vision Basics: Part 2: [Activity] Hough transform – practical example in python
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Python Basics: Looping and an Exercise
From the section: Python Crash Course [Optional]. In this section, we’ll continue diving into Python data structures with tuples and dictionaries, functions, Boolean Operations and Loops, and libraries like Pandas, MatPlotLib and Seaborn...
Curated Video
How to Create an Interactive Game in PowerPoint
This video demonstrates how to create an interactive "Guess the Phrase" game show using Microsoft PowerPoint. The game involves students guessing letters to reveal a word related to a topic, making it an engaging resource for classroom...
Curated Video
Generate Random Words in PowerPoint from Text File
This video is a tutorial on how to create a resource using VBA in PowerPoint. The resource allows students to generate random pairs of words from a text file and challenges them to come up with a sentence connecting the two words. The...
Packt
Introduction to computer hardware and software : System Setup
From the section: Firmware. In this section, we learn about BIOS, POST and system setup. A small system-setup program built into the motherboard firmware enables techs to configure low-level features and options for the system’s...
Curated Video
Ensemble Machine Learning Techniques 4.2: AdaBoost Algorithm
This video aims to teach the viewer details about one of the Boosting techniques called AdaBoost. • We go into the details of the AdaBoost algorithm • We see how to calculate model coefficients • We see how to calculate model weights
Curated Video
Ensemble Machine Learning Techniques 5.1: Overview of Stacking Technique
This video talks about a commonly used and helpful ensemble technique called stacking. • We get an introduction to stacking technique • We discuss how stacking works • Look at a similar approach to stacking called blending
Curated Video
Python for Network Forensics 2.3: Querying the Registry
In this video, we will become familiar with the Windows registry and how the key:value data store maintains OS configuration data. • Learn how to interact with the registry using regedit • Use Python to interact with the registry by...
Packt
Advanced Computer Vision Projects 3.3: Multi-Person Pose Detection
In this video, we run a more advanced model to count the number of people and extract poses from more complex images. • Run more advanced ArtTrack model • Apply to model to multiperson images • Visualize the results
Curated Video
Java 11 Programming for Beginners 1.1: The Course Overview
This video provides an overview of the entire course.
Curated Video
Serverless JavaScript Projects 3.1: Sign Up for Twilio and Determine the SMS Phone Number
We need a Twilio account and a project built in Twilio with a phone number to SMS to. • Sign in to twilio.com and sign up for account • Build a project in Twilio for SMS messaging • Get the phone number that will be used to send SMS...