Instructional Video12:21
Curated Video

Bug Bounty Program Certification 9.6: Brute Force Attacks on Websites

Higher Ed
This video will help you perform brute force attack on web admin. • Request interception using Burpsuite • Create wordlist for brute force attack • Perform brute force attack on web admin page using burp suite
Instructional Video3:27
Curated Video

Bug Bounty Program Certification 2.5: What Is Network Bug Bounty Program?

Higher Ed
In this video, explore network bug bounty overview. • Explore network bug bounty • Example of bug bounty • Explain in depth about network bug bounty program and its processes
Instructional Video7:45
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Classifying Images with a Simple CNN, Part 2

Higher Ed
From the section: Deep Learning and Tensorflow: Part 2. In this section, we’ll talk about what CNNs is, and how it works. Deep Learning and Tensorflow: Part 2: [Activity] Classifying Images with a Simple CNN, Part 2
Instructional Video7:24
Curated Video

Explain web security : Shodan for scanning

Higher Ed
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks. In this video we will learn what Shodan is and how to use it. - Scour through the Shodan...
Instructional Video6:03
Packt

Introduction to computer hardware and software : What is the BIOS?

Higher Ed
From the section: Firmware. In this section, we learn about BIOS, POST and system setup. Basic Input/Output Services (BIOS) is code (firmware) built into every motherboard to give the CPU basic communication with the hardware attached to...
Instructional Video7:06
Packt

Compare the breadth-first and depth-first search algorithms : Implementing DFS

Higher Ed
From the section: Searching in Graphs. In this section, we will see what we are searching for. Also, we will look at how to use and implement Breadth-First Search and Depth-First Search along with a simple puzzle game example. Implement...
Instructional Video3:21
Packt

Compare the breadth-first and depth-first search algorithms : What Are We Searching for?

Higher Ed
From the section: Searching in Graphs. In this section, we will see what we are searching for. Also, we will look at how to use and implement Breadth-First Search and Depth-First Search along with a simple puzzle game example. What does...
Instructional Video7:09
Curated Video

High Performance Scientific Computing with C 2.1: Floating-Point Numbers and IEEE-754

Higher Ed
How are real numbers stored and manipulated? How does this affect our program’s performance? • Learn how the IEEE-754 standard defines floating-point storage • Learn the range of floating-point numbers • See how we can go beyond this...
Instructional Video7:49
Packt

Advanced Computer Vision Projects 1.5: Retraining the Model

Higher Ed
In this video, we cover retraining the captioning data on user provided images. • Load the model and initialize the TensorFlow session • Apply the model to sample images • Visualize the results
Instructional Video6:34
Curated Video

Mastering Tableau 2018.1, Second Edition 9.4: Using Nested LOD Expressions

Higher Ed
In this video, we’ll see nested LOD expressions in detail. • The importance of nested LOD • Implement nested LOD
Instructional Video7:50
Curated Video

Mastering Tableau 2018.1, Second Edition 7.5: Understanding Window Table Calculations

Higher Ed
In this video, we’ll cover window functions. • Understand window functions • Implement window functions
Instructional Video9:14
Curated Video

Mastering Tableau 2018.1, Second Edition 3.2: Data Preparation and Cleaning Data Sources with Text and Geography

Higher Ed
In this video, we’ll see how we can format text and geographic fields. • Prepare text for analysis • Prepare geographic fields for analysis
Instructional Video8:19
Curated Video

Mastering Tableau 2018.1, Second Edition 2.1: Understanding the Connect Page and Global Superstore Dataset

Higher Ed
In this video, we will see the connect page and the features and functions that we get from it. We are also going to see the global superstore dataset. • Explore the data connection page • Inspect the global superstore dataset
Instructional Video3:12
Curated Video

Bug Bounty Program Certification 1.2: How to Get Most Out of This Course?

Higher Ed
This video will give you a brief overview about the course. • Explain about course topics • Explore various components • Prepare for next sections
Instructional Video5:19
Curated Video

Serverless JavaScript Projects 4.2: Setting Up the UI with DynamoDB Database

Higher Ed
In this video, we need to locate the places for Database Updates and pulls and setup DynamoDB in AWS. • Find locations in the front end where we will call the database endpoints • Setup DynamoDB capabilities in AWS • Prepare to run the...
Instructional Video6:33
Curated Video

Tips, Tricks, and Techniques for Node.js Development 6.1: Linting

Higher Ed
In this video, we will learn how we can apply rules to our code so we are all using the same code style. • Understand why we use linting • Learn how to apply eslint to our project • Look at eslinting warnings