Instructional Video9:28
Curated Video

Bug Bounty Program Certification 8.4: Database Attack Using Manual Techniques

Higher Ed
This video focuses on manual database attack. • Explore manual database attack • Understand various injection commands to exploit database • Explanation of the manual commands
Instructional Video11:13
Curated Video

Bug Bounty Program Certification 7.5: Install Acunetix Web Vulnerability Scanner

Higher Ed
This video will help you understand web scanning using Acunetix web vulnerability scanner. • Download Acunetix web vulnerability scanner • Installation of web scanner • Reporting of vulnerabilities
Instructional Video8:43
Curated Video

Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines

Higher Ed
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Instructional Video12:03
Curated Video

Bug Bounty Program Certification 5.5: Perform Brute Force Attack on File Transfer Protocol

Higher Ed
This video will help you perform brute force attack on file transfer protocol. • Setup FTP in Windows10 machine • Explore Hydra commands for brute force attack • Learn about brute force attack on FTP to get login credentials
Instructional Video5:43
Curated Video

Cloud Native Development on Azure with Java 2.6: Deploy Your App to an Azure App Service Instance

Higher Ed
In this video, we will show you how to deploy the Spring Boot app to Azure. So, you will be able to migrate your locally running app to Azure Web Apps. • Created an Azure web application hosted within the Azure App Service • Use the KUDU...
Instructional Video8:06
Curated Video

Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video10:40
Packt

State the purpose of network hardware : Structured Cabling

Higher Ed
From the section: Essentials of Networking. In this section, we learn about WANS, Routers, cables and connectors. CompTIA doesn’t expect you to prove you can crimp your own cables, but it does expect you to understand the crimping...
Instructional Video6:47
Packt

Introduction to computer hardware and software : Touring the Case

Higher Ed
From the section: Motherboards. In this section, we look into motherboard features such as Chipsets and how to install. A PC’s case is an amazing and often overlooked part of the system. Understanding common case features makes it easier...
Instructional Video7:38
Packt

Troubleshoot a faulty computer network : RIP Troubleshooting Scenario 1. Can you find the issue?

Higher Ed
From the section: RIP Troubleshooting (ICND1). In this section, we learn to troubleshoot RIP in different scenario. RIP Troubleshooting (ICND1): RIP Troubleshooting Scenario 1. Can you find the issue?
Instructional Video7:20
Packt

Use functions or APIs from external libraries to develop a computer program : Name and Main

Higher Ed
From the section: Advanced Python. This section helps to understand about OOP, classes, class interface etc. We will dive into learning Advance Python Why does "Name and Main" sound like a steakhouse? It has nothing to do with steak. But...
Instructional Video8:05
Packt

Use functions or APIs from external libraries to develop a computer program : Creating a Package

Higher Ed
From the section: Advanced Python. This section helps to understand about OOP, classes, class interface etc. We will dive into learning Advance Python Learn how to create your own local package for your Python programs!
Instructional Video12:53
Curated Video

Describe cyber attacks that could affect a computer system or network : Installation of Virtual Machines

Higher Ed
From the section: Introducing Network Security.This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Instructional Video1:57
Curated Video

Describe cyber attacks that could affect a computer system or network : The Course Overview

Higher Ed
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Instructional Video7:24
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Hough transform – practical example in python

Higher Ed
From the section: Computer Vision Basics: Part 2. In this section, we’ll explore the some addtiional features of Computer Vision. Computer Vision Basics: Part 2: [Activity] Hough transform – practical example in python
Instructional Video5:04
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Python Basics: Looping and an Exercise

Higher Ed
From the section: Python Crash Course [Optional]. In this section, we’ll continue diving into Python data structures with tuples and dictionaries, functions, Boolean Operations and Loops, and libraries like Pandas, MatPlotLib and Seaborn...
Instructional Video13:06
Curated Video

How to Create an Interactive Game in PowerPoint

Pre-K - Higher Ed
This video demonstrates how to create an interactive "Guess the Phrase" game show using Microsoft PowerPoint. The game involves students guessing letters to reveal a word related to a topic, making it an engaging resource for classroom...
Instructional Video22:06
Curated Video

Generate Random Words in PowerPoint from Text File

Pre-K - Higher Ed
This video is a tutorial on how to create a resource using VBA in PowerPoint. The resource allows students to generate random pairs of words from a text file and challenges them to come up with a sentence connecting the two words. The...
Instructional Video8:59
Packt

Introduction to computer hardware and software : System Setup

Higher Ed
From the section: Firmware. In this section, we learn about BIOS, POST and system setup. A small system-setup program built into the motherboard firmware enables techs to configure low-level features and options for the system’s...
Instructional Video5:24
Curated Video

Ensemble Machine Learning Techniques 4.2: AdaBoost Algorithm

Higher Ed
This video aims to teach the viewer details about one of the Boosting techniques called AdaBoost. • We go into the details of the AdaBoost algorithm • We see how to calculate model coefficients • We see how to calculate model weights
Instructional Video3:50
Curated Video

Ensemble Machine Learning Techniques 5.1: Overview of Stacking Technique

Higher Ed
This video talks about a commonly used and helpful ensemble technique called stacking. • We get an introduction to stacking technique • We discuss how stacking works • Look at a similar approach to stacking called blending
Instructional Video8:26
Curated Video

Python for Network Forensics 2.3: Querying the Registry

Higher Ed
In this video, we will become familiar with the Windows registry and how the key:value data store maintains OS configuration data. • Learn how to interact with the registry using regedit • Use Python to interact with the registry by...
Instructional Video10:37
Packt

Advanced Computer Vision Projects 3.3: Multi-Person Pose Detection

Higher Ed
In this video, we run a more advanced model to count the number of people and extract poses from more complex images. • Run more advanced ArtTrack model • Apply to model to multiperson images • Visualize the results
Instructional Video3:31
Curated Video

Java 11 Programming for Beginners 1.1: The Course Overview

Higher Ed
This video provides an overview of the entire course.
Instructional Video3:33
Curated Video

Serverless JavaScript Projects 3.1: Sign Up for Twilio and Determine the SMS Phone Number

Higher Ed
We need a Twilio account and a project built in Twilio with a phone number to SMS to. • Sign in to twilio.com and sign up for account • Build a project in Twilio for SMS messaging • Get the phone number that will be used to send SMS...