Instructional Video4:51
Mazz Media

Animal Essential Functions

6th - 8th
This live-action video program is about the term "animal essential functions". The program is designed to reinforce and support a student's comprehension and retention of the term "animal essential functions" through use of video...
Instructional Video8:59
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Scanning with Nmap

Higher Ed
Nmap is the most commonly used network scanning tool. Scans can be saved as XML files. Nmap can be used at the command line, but it also has a frontend GUI named Zenmap. This clip is from the chapter "Tools of the Trade" of the series...
Instructional Video9:05
Curated Video

CISSP®- The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37 Revision 1 and 2

Higher Ed
This video explains NIST SP 800-37 revision 1 and 2. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security...
Instructional Video7:24
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Linux Snort IDS Lab

Higher Ed
An Intrusion Detection System (IDS) is designed to detect suspicious network or host activity and then log or notify the incident. In this episode, the Snort IDS is configured and tested in Linux. This clip is from the chapter "The Basic...
Instructional Video5:15
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Scanners

Higher Ed
How do attackers discover networks and hosts? Network scanners such as Nmap are used by attackers as well as legitimate security technicians to perform network reconnaissance. This clip is from the chapter "Tools of the Trade" of the...
Instructional Video4:35
Curated Video

The Complete Practical Docker Guide - Exploring Environment Variables

Higher Ed
This video helps in exploring environment variables. This clip is from the chapter "Communication Between Containers and Environment Variables (MySQL, phpMyAdmin)" of the series "The Complete Practical Docker Guide".This section focuses...
Instructional Video5:20
Curated Video

Learning Scala Web Development (Video 14)

Higher Ed
The Scala programming language has gained a lot of traction in the last couple of years because of its functional orientation and conciseness. The industry has a strong interest in using Scala in modern production systems, and as such,...
Instructional Video10:47
Curated Video

Bash Shell Scripting- Simple Shell Script to verify the user is root or not and User is having sudo

Higher Ed
This video shows how to use the simple shell script to verify the user is root or not and User is having sudo. This clip is from the chapter "Conditional Statements - simple if, if-else, if elif elif else" of the series "Complete Bash...
Instructional Video8:58
Curated Video

The Full Stack Web Development - phpinfo() Function

Higher Ed
PHP Errors, Debugging & Config: phpinfo() Function This clip is from the chapter "PHP Errors, Debugging & Config" of the series "The Full Stack Web Development".In this section, we talk about different types of error, debug functions and...
Instructional Video1:35
IDG TECHtalk

How to use the screenfetch and neofetch commands: 2-Minute Linux Tips

Higher Ed
In this Linux tip, learn how to use the screenfetch and neofetch commands. They're actually both bash scripts that you'll need to install if you haven't already. Once installed, without anything more than invoking them by name, either...
Instructional Video8:28
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Configuring Linux Log Forwarding

Higher Ed
Centralized Linux log hosts can be configured using the rsyslog daemon on Linux hosts. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section explains the...
Instructional Video3:40
All In One Social Media

How To Streamyard: 6 HACKS To Live Stream With Streamyard BETTER!

Higher Ed
In this "How To Streamyard" tutorial, I will share with you 6 hacks to live stream with Streamyard better. I have been using Streamyard since they were in Beta and I have seen so many amazing changes with this platform. Here are my 6...
Instructional Video7:40
Curated Video

Describe cyber attacks that could affect a computer system or network : Scanning the Network with OpenVas

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will know how to find vulnerabilities...
Instructional Video7:45
Curated Video

Bash Shell Scripting- Providing password for ssh using sshpass utility

Higher Ed
This video shows how to provide a password for ssh using sshpass utility. This clip is from the chapter "Working with remote servers" of the series "Complete Bash Shell Scripting".This section shows how to work with remote servers.
Instructional Video5:43
Packt

Starting Kafka on a Remote Machine

Higher Ed
This video demonstrates how to start Kafka on a remote machine. This clip is from the chapter "Annex - Starting Kafka Differently" of the series "Apache Kafka Series - Learn Apache Kafka for Beginners".In this section, you will learn to...
Instructional Video21:23
Curated Video

The Full Stack Web Development - Database & Job Class

Higher Ed
Backend Programming with PHP: Database & Job Class This clip is from the chapter "Backend Programming with PHP" of the series "The Full Stack Web Development".Here, we talk about all the basics of PHP and move on to OOP, integrate MySQL,...
Instructional Video2:33
Curated Video

Band 9 Sample IELTS Part 2: A Person I Want to Know

9th - Higher Ed
Today you’ll hear a band 9 sample IELTS Part 2 answer about a person I want to know.
Instructional Video8:17
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Using tcpdump to Analyze Network Traffic

Higher Ed
tcpdump is a built-in Unix and Linux command-line tool that can capture, analyze, filter, and save captured network packets. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video2:22
Curated Video

World of Computer Networking Your CCNA start - Dynamic Network Address Translation (NAT)

Higher Ed
This video introduced you to dynamic NAT. This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
Instructional Video8:43
Curated Video

Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines

Higher Ed
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Instructional Video17:04
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- IP Addresses and Subnetting - Part 2

Higher Ed
In this video, we'll learn about IP addresses and subnetting - part 2. This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is...
Instructional Video16:49
Packt

Steps to Connect Database Information to Selenium - 1

Higher Ed
This is the first part of the two-part lecture that explains how to connect the database information to Selenium. This clip is from the chapter "Database Connection to Selenium Test Cases" of the series "Selenium WebDriver with Java -...
Instructional Video2:42
Curated Video

World of Computer Networking Your CCNA start - Types of Network Address Translation (NAT)

Higher Ed
This video introduces you to different types of NAT. This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
Instructional Video8:02
Professor Dave Explains

Herpes Simplex Virus (HSV-1 and HSV-2)

12th - Higher Ed
We are probably familiar with herpes as a sexually transmitted disease, but we want to know as much as we can about this virus and the things it can do. What is the difference between HSV-1 and HSV-2? How does viral transmission work?...