Instructional Video6:15
Curated Video

Learning Python Web Penetration Testing (Video 4)

Higher Ed
With the huge growth in the number of web applications in the recent times, there has also been an upsurge in the need to make these applications secure. Web penetration testing is the use of tools and code to attack a website or web app...
Instructional Video1:10
Next Animation Studio

Scientists discover fish parasites that do not breathe: study

12th - Higher Ed
The Henneguya salminicola is the first multicellular animal discovered that does not breathe.
Instructional Video3:13
Curated Video

Describe network protocols : Creating Simple TCP Echo Server

Higher Ed
From the section: Programming TCP Clients and Servers In this section, we will learn about how to build TCP Servers and how it works. In this video, will learn how to create a simple TCP echo server. • Learn the process how a server...
Instructional Video4:37
Curated Video

Describe cyber attacks that could affect a computer system or network : Leaving a Backdoor in the Target Machine

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will find out what is persistent...
Instructional Video6:02
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Honeypots

Higher Ed
How can malicious attacker and malware activity be monitored without allowing the compromise of production systems? Honeypots are fake decoy systems designed to attract malicious activity for the purpose of logging and tracing activity....
Instructional Video9:41
Curated Video

Create a computer network: Model Network Devices as Objects

Higher Ed
From the section: Interacting with Classic Network Devices. In this section, we will look at how to interact with classic network devices with Python libraries. We will explain what we define as classic network devices and use Netmiko...
Instructional Video9:29
Curated Video

Describe cyber attacks that could affect a computer system or network : Creating Reverse Shell with Metasploit

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will discover how to set a reverse on...
Instructional Video9:01
Curated Video

Bash Shell Scripting - Basic System - Commands

Higher Ed
This video helps you with the basic system of commands. This clip is from the chapter "Linux Commands - Quick Refresher" of the series "Mastering Bash Shell Scripting: Automate your daily tasks [Updated for 2021]".This section is a quick...
Instructional Video8:09
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - The Metasploit Framework

Higher Ed
Penetration testers can use the cross-platform Metasploit framework command-line tool for discovering and exploiting security flaws on hosts. This clip is from the chapter "Testing Infrastructure" of the series "CompTIA Security+...
Instructional Video2:15
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 13 Ask Me Anything (AMA)

Higher Ed
There is much to be learned by analyzing past security incidents. In this episode, Dan discussed the Cyber Kill Chain. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video7:56
Curated Video

Learning Python Web Penetration Testing (Video 6)

Higher Ed
With the huge growth in the number of web applications in the recent times, there has also been an upsurge in the need to make these applications secure. Web penetration testing is the use of tools and code to attack a website or web app...
Instructional Video9:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks

Higher Ed
Staying up-to-date with the latest types of security attacks is form of attack mitigation. Keeping systems hardened helps protect against zero-day attacks. Software developers must adhere to secure coding practices to ensure deployed...
Instructional Video9:06
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - SSH Public Key Authentication Lab

Higher Ed
Multifactor authentication should always be used for administrative accounts. In this demo, SSH public key authentication is configured for a Linux host. This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Instructional Video5:24
Professor Dave Explains

Phyla Orthonectida and Dicyemida: Mesozoans

12th - Higher Ed
We've arrived at the spiralia phyla orthonectida and dicyemida. The dycemids live exclusively in the renal sac of benthic cephalopods, such as an octopodes. Orthnectids spend most of their lives as trophic plasmodium within the tissue of...
Instructional Video4:02
TLDR News

What The Hell is the G7? What Do They Actually Do? - TLDR News

12th - Higher Ed
This week the G7 is meeting in Cornwall (England) to discuss COVID and other major global isues. However, what they actually do and who they are is a little confusing and contentious. So in this video we discuss what the G7 is, what...
Instructional Video5:33
Curated Video

Bug Bounty Program Certification 4.2: Setup External Network Attack

Higher Ed
In this video, we will see how to setup external wireless adapter and wireless attack. • Explore information about external wireless adapter • Connect wireless adapter to Kali Linux OS • Setup wireless attack lab
Instructional Video8:53
Curated Video

Describe cyber attacks that could affect a computer system or network : Hidden Scanning Ports with Nmap

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will learn how to scan a target with...
Instructional Video3:00
Curated Video

Understanding the Chain of Infection: How Germs Spread and Infect

Pre-K - Higher Ed
In this video, the concept of the chain of infection is explained, highlighting how germs spread from various sources to infect new hosts. It explores the different modes of transmission, including person-to-person contact, indirect...
Instructional Video11:34
Curated Video

World of Computer Networking Your CCNA start - Dynamic Port Address Translation (PAT)

Higher Ed
This video introduces you to dynamic PAT. This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
Instructional Video6:56
Janus Academy

How Well Does Mark Zuckerberg Speak Chinese? | Comments on His Speech in Mandarin in China

12th - Higher Ed
Facebook co-founder and CEO Mark Zuckerberg speaks fluent Mandarin at Tsinghua University in Beijing. How well did he speak? Let's see what a native Mandarin teacher has to say!
Instructional Video3:37
Curated Video

Active Directory with Windows Server 2016 - Introduction to Web App Proxy

Higher Ed
Understand the benefits, usage, and purpose of Web App Proxy (WAP) with Federation Services and learn about the requirements to implement and authenticate. This clip is from the chapter "Implement Identity Federation and Access...
Instructional Video14:02
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Virtualization

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Virtualization. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
Instructional Video4:43
Curated Video

World of Computer Networking Your CCNA start - Summary "Network Address Translation (NAT)"

Higher Ed
This video provides a summary of the section. This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
Instructional Video3:57
Curated Video

IELTS Listening: Learn Prediction to Increase Scores

9th - Higher Ed
Today you’ll learn how to predict on the IELTS Listening Exam to increase your scores.