Instructional Video3:26
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Restricting Cortana

Higher Ed
In this video, we will understand how Cortana works and how to limit the amount of information it collects, to prevent the data from being shared through trackers.
Instructional Video4:15
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introducing Proton Email

Higher Ed
This video illustrates the Proton email and its features and advantages, safety, and disadvantages.
Instructional Video6:05
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacks Against Encryption

Higher Ed
In this video, we will look at the different kinds of attacks that hackers can perform to decrypt an already encrypted hard drive.
Instructional Video9:39
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - What Is the Cloud?

Higher Ed
In this lesson, we will understand more about cloud computing, storing data online than on a local hard drive.
Instructional Video2:17
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Using the Inbuilt AntiRansomware Tool

Higher Ed
In this video, you will learn about the built-in anti-ransomware tools available in the Windows operating system.
Instructional Video8:02
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Ransomware - Cryptolocker, WannaCry, Bad Rabbit

Higher Ed
In this video, we will look at the most effective form of malware today globally, ransomware, a form of malware where the attacker prevents the victim from accessing the computer or the files.
Instructional Video6:42
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Accessing the Dark Web with Tor

Higher Ed
This video talks about the dark web that conducts illegal activities with Tor. The author illustrates how to use the dark web.
Instructional Video6:45
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - VPN Myths Debunked

Higher Ed
In this video, the author debunks the significant myths about VPN use and several reasons for using a paid VPN.
Instructional Video4:41
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - What are Privacy, Anonymity, and Pseudonymity

Higher Ed
In this video, you will learn more about privacy, anonymity, and pseudonymity concepts.
Instructional Video6:30
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - HTTP, HTTPS, SSL, and TLS

Higher Ed
Here, you will learn about the hypertext transfer protocol, hypertext transfer protocol secure, secure sockets layer, and transport layer security, and how each one works.
Instructional Video5:22
Curated Video

Fundamentals of Object-Oriented Programming - C++ - UML Inheritance - Case Study - Employee Part 1

Higher Ed
In this video, we will first understand what inheritance is. Then we will have a look at an employee inheritance hierarchy with a UML diagram. Based on the information in the diagram, we will be writing a program to fulfil the...
Instructional Video6:11
Curated Video

Fundamentals of Object-Oriented Programming - C++ - Friends - Functions and Classes

Higher Ed
In this video, you will learn about Friends functions and classes. This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will learn about STL (Standard Template...
Instructional Video5:29
Curated Video

Fundamentals of Object-Oriented Programming - C++ - Module 3 Objectives

Higher Ed
In this video, we will cover the learning objective of this module. This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will learn about STL (Standard Template...
Instructional Video5:40
Curated Video

Fundamentals of Object-Oriented Programming - C++ - Classes and Objects

Higher Ed
In this video, you will learn about classes and objects with abstraction and encapsulation. This clip is from the chapter "Module 2" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, we will cover...
Instructional Video2:29
Curated Video

Practical Cyber Hacking Skills for Beginners - Introduction to Burp Suite

Higher Ed
This video demonstrates Burp Suite, a powerful tool used to detect vulnerabilities on a website.
Instructional Video6:20
Curated Video

Practical Cyber Hacking Skills for Beginners - Cookies Revisited

Higher Ed
Here, you will learn about cookies, why and how they are used, and how they affect display of online pages.
Instructional Video4:12
Curated Video

Practical Cyber Hacking Skills for Beginners - How a Website Works

Higher Ed
This video illustrates how a website works and what happens when we try to access a website.
Instructional Video8:31
Curated Video

Practical Cyber Hacking Skills for Beginners - Setting Up Hashcat

Higher Ed
This lesson will teach us how to install and set up the Hashcat by changing the folder structures and deleting older hashtag versions.
Instructional Video6:00
Curated Video

Practical Cyber Hacking Skills for Beginners - Creating a Sample Outbound Rule

Higher Ed
In this lesson, we will look at creating a sample outbound rule; we will test it out by trying to block internet access by setting outbound rules for the Google Chrome browser.
Instructional Video8:33
Curated Video

Practical Cyber Hacking Skills for Beginners - Windows 10 Firewall Demo

Higher Ed
This video walks us through the built-in firewall of the Windows 10 operating system. The advantages of using the firewall, and how it protects the operating system.
Instructional Video5:45
Curated Video

Practical Cyber Hacking Skills for Beginners - TCP versus UDP

Higher Ed
Here, we will understand transmission control protocol and user datagram protocol and the fundamental differences between the two.
Instructional Video5:51
Curated Video

Practical Cyber Hacking Skills for Beginners - Ports and Protocols

Higher Ed
This video explores the ports, networks, and protocols used to operate each port.
Instructional Video7:06
Curated Video

Practical Cyber Hacking Skills for Beginners - Creating a LinkedIn Clone Site

Higher Ed
This video demonstrates how to clone the LinkedIn site.
Instructional Video5:03
Curated Video

Practical Cyber Hacking Skills for Beginners - Kali Linux Walkthrough

Higher Ed
This video is a demonstrative walkthrough of the Kali Linux operative system, how to use it, and work on it.