Curated Video
Wireshark D2 V3 - Edit Menu
DAY TWO - We will explore Wireshark interface in details - Video 3: Edit menu
Curated Video
Wireshark D5 V6 - HTTP analysisARP analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 6: ARP analysis
Curated Video
Wireshark D5 V4 - HTTP analysisDHCP analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 4: DHCP analysis
Curated Video
Wireshark D4 V6 - ICMPv4 Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 6: ICMPv4 deep-dive
Curated Video
Wireshark D4 V1 - 3 way handshake
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 1: 3-way handshake
Curated Video
Introducing NMAP
NMAP is the classic network scanner, in this video we will deep dive into its features
Curated Video
Wireshark D2 V5 - Toolbars
DAY TWO - We will explore Wireshark interface in details - Video 5: Toolbars
Visual Learning Systems
Your Science Fair Project: Steps in the Scientific Method
The scientific method is the foundation of work for scientists. In this video the scientific method is explained in detail serving as the basis for your science fair project. The process of creating a science fair project along with...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Firewalls
Packet filtering firewalls apply to layer 4 (Transport layer) of the OSI model and examine only packet headers to allow or deny network traffic. Content filtering firewalls apply to OSI layer 7 (Application layer) and can examine packet...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Security Assessment Tools
Open-source and proprietary (paid) security assessment tools are used by security analysts and malicious actors; what differs is the reason they are being used. The scanless tool uses web sites to perform port scans while the hping3 tool...
Curated Video
Describe network protocols : UDP Echo Server
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. In this video, we will look at how to create a UDP echo server. • Get...
ACDC Leadership
Micro Unit 6- Practice Questions #1
To watch the full version of this video and all the other hidden videos please gett he Ultimate Review Packet. I promise you that you will love it. This video includes practice questions for microeconomics Unit 6- Market Failures.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Protocol Analyzers
Network traffic can be captured, saved, and analyzed using a properly placed hardware or software network protocol analyzer such as the free Wireshark tool. Capture analysis can result in identifying indicators of compromise or the use...
Australian Broadcasting Corporation
Short Cuts To Glory - Recipes - Pimp Noodles
Sometimes all you’ve got in your cupboard is a lonely pack of two minute noodles. Well, even then you can make a simple meal packed full of flavour.
Kids’ Poems and Stories With Michael Rosen
Eddie and the Supermarket | POEM
Eddie and the Supermarket | POEM | You Wait Till I’m Older than You - Published by Puffin
ACDC Leadership
Micro Unit 5- Practice Questions #1
To watch the full version of this video and all the other hidden videos please gett he Ultimate Review Packet. I promise you that you will love it. This video covers microeconomics Unit 5- The Resource Market.
Curated Video
Python for Network Forensics 1.5: Introduction to Impacket
In this video, we will add breadth to our Python capability to extend functionality using Impacket. • Further expand our application to import Impacket • Decode raw packets using Impacket • Get a better understanding of encapsulation and...
ACDC Leadership
Micro Unit 6 Summary- Market Failures and the Role of the Government
This video introduces the topic of market failures and the role of government in addressing them. They cover concepts such as public goods, externalities, antitrust laws, and income distribution. The teacher emphasizes the importance of...
ACDC Leadership
Money Back Guarantee
Getting the Ultimate Review Packet helps fund ACDC Econ so I can keep making awesome videos and it will help you learn econ way faster. And, there is no risk. If you don't like it, get a full refund.
Curated Video
CISSP®- The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37 Revision 1 and 2
This video explains NIST SP 800-37 revision 1 and 2. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - IP Security (IPsec)
The IPsec network security protocol suite can be used to secure any type of network traffic through integrity, authentication and encryption. Many VPNs use IPsec to establish an encrypted network tunnel. This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Bots and Botnets
Distributed Denial of Service (DDoS) attacks use collections of infected bots, or zombies in a botnet, to flood victims hosts or networks. Bots periodically contact a malicious user-controlled command and control server. This clip is...
Curated Video
World of Computer Networking Your CCNA start - Analyzing Broadcast Ethernet Frames
This video explains how to analyze broadcast Ethernet frame headers. This clip is from the chapter "Switches and Data Link Layer" of the series "World of Computer Networking: Your CCNA start".This section introduces you to switches and...