Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Restricting Cortana
In this video, we will understand how Cortana works and how to limit the amount of information it collects, to prevent the data from being shared through trackers.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introducing Proton Email
This video illustrates the Proton email and its features and advantages, safety, and disadvantages.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacks Against Encryption
In this video, we will look at the different kinds of attacks that hackers can perform to decrypt an already encrypted hard drive.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - What Is the Cloud?
In this lesson, we will understand more about cloud computing, storing data online than on a local hard drive.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Using the Inbuilt AntiRansomware Tool
In this video, you will learn about the built-in anti-ransomware tools available in the Windows operating system.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Ransomware - Cryptolocker, WannaCry, Bad Rabbit
In this video, we will look at the most effective form of malware today globally, ransomware, a form of malware where the attacker prevents the victim from accessing the computer or the files.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Accessing the Dark Web with Tor
This video talks about the dark web that conducts illegal activities with Tor. The author illustrates how to use the dark web.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - VPN Myths Debunked
In this video, the author debunks the significant myths about VPN use and several reasons for using a paid VPN.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - What are Privacy, Anonymity, and Pseudonymity
In this video, you will learn more about privacy, anonymity, and pseudonymity concepts.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - HTTP, HTTPS, SSL, and TLS
Here, you will learn about the hypertext transfer protocol, hypertext transfer protocol secure, secure sockets layer, and transport layer security, and how each one works.
Curated Video
Fundamentals of Object-Oriented Programming - C++ - UML Inheritance - Case Study - Employee Part 1
In this video, we will first understand what inheritance is. Then we will have a look at an employee inheritance hierarchy with a UML diagram. Based on the information in the diagram, we will be writing a program to fulfil the...
Curated Video
Fundamentals of Object-Oriented Programming - C++ - Friends - Functions and Classes
In this video, you will learn about Friends functions and classes. This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will learn about STL (Standard Template...
Curated Video
Fundamentals of Object-Oriented Programming - C++ - Module 3 Objectives
In this video, we will cover the learning objective of this module. This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will learn about STL (Standard Template...
Curated Video
Fundamentals of Object-Oriented Programming - C++ - Classes and Objects
In this video, you will learn about classes and objects with abstraction and encapsulation. This clip is from the chapter "Module 2" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, we will cover...
Curated Video
Practical Cyber Hacking Skills for Beginners - Introduction to Burp Suite
This video demonstrates Burp Suite, a powerful tool used to detect vulnerabilities on a website.
Curated Video
Practical Cyber Hacking Skills for Beginners - Cookies Revisited
Here, you will learn about cookies, why and how they are used, and how they affect display of online pages.
Curated Video
Practical Cyber Hacking Skills for Beginners - How a Website Works
This video illustrates how a website works and what happens when we try to access a website.
Curated Video
Practical Cyber Hacking Skills for Beginners - Setting Up Hashcat
This lesson will teach us how to install and set up the Hashcat by changing the folder structures and deleting older hashtag versions.
Curated Video
Practical Cyber Hacking Skills for Beginners - Creating a Sample Outbound Rule
In this lesson, we will look at creating a sample outbound rule; we will test it out by trying to block internet access by setting outbound rules for the Google Chrome browser.
Curated Video
Practical Cyber Hacking Skills for Beginners - Windows 10 Firewall Demo
This video walks us through the built-in firewall of the Windows 10 operating system. The advantages of using the firewall, and how it protects the operating system.
Curated Video
Practical Cyber Hacking Skills for Beginners - TCP versus UDP
Here, we will understand transmission control protocol and user datagram protocol and the fundamental differences between the two.
Curated Video
Practical Cyber Hacking Skills for Beginners - Ports and Protocols
This video explores the ports, networks, and protocols used to operate each port.
Curated Video
Practical Cyber Hacking Skills for Beginners - Creating a LinkedIn Clone Site
This video demonstrates how to clone the LinkedIn site.
Curated Video
Practical Cyber Hacking Skills for Beginners - Kali Linux Walkthrough
This video is a demonstrative walkthrough of the Kali Linux operative system, how to use it, and work on it.