Mazz Media
Animal Essential Functions
This live-action video program is about the term "animal essential functions". The program is designed to reinforce and support a student's comprehension and retention of the term "animal essential functions" through use of video...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Scanning with Nmap
Nmap is the most commonly used network scanning tool. Scans can be saved as XML files. Nmap can be used at the command line, but it also has a frontend GUI named Zenmap. This clip is from the chapter "Tools of the Trade" of the series...
Curated Video
CISSP®- The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37 Revision 1 and 2
This video explains NIST SP 800-37 revision 1 and 2. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Linux Snort IDS Lab
An Intrusion Detection System (IDS) is designed to detect suspicious network or host activity and then log or notify the incident. In this episode, the Snort IDS is configured and tested in Linux. This clip is from the chapter "The Basic...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Scanners
How do attackers discover networks and hosts? Network scanners such as Nmap are used by attackers as well as legitimate security technicians to perform network reconnaissance. This clip is from the chapter "Tools of the Trade" of the...
Curated Video
The Complete Practical Docker Guide - Exploring Environment Variables
This video helps in exploring environment variables. This clip is from the chapter "Communication Between Containers and Environment Variables (MySQL, phpMyAdmin)" of the series "The Complete Practical Docker Guide".This section focuses...
Curated Video
Learning Scala Web Development (Video 14)
The Scala programming language has gained a lot of traction in the last couple of years because of its functional orientation and conciseness. The industry has a strong interest in using Scala in modern production systems, and as such,...
Curated Video
Bash Shell Scripting- Simple Shell Script to verify the user is root or not and User is having sudo
This video shows how to use the simple shell script to verify the user is root or not and User is having sudo. This clip is from the chapter "Conditional Statements - simple if, if-else, if elif elif else" of the series "Complete Bash...
Curated Video
The Full Stack Web Development - phpinfo() Function
PHP Errors, Debugging & Config: phpinfo() Function This clip is from the chapter "PHP Errors, Debugging & Config" of the series "The Full Stack Web Development".In this section, we talk about different types of error, debug functions and...
IDG TECHtalk
How to use the screenfetch and neofetch commands: 2-Minute Linux Tips
In this Linux tip, learn how to use the screenfetch and neofetch commands. They're actually both bash scripts that you'll need to install if you haven't already. Once installed, without anything more than invoking them by name, either...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Configuring Linux Log Forwarding
Centralized Linux log hosts can be configured using the rsyslog daemon on Linux hosts. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section explains the...
All In One Social Media
How To Streamyard: 6 HACKS To Live Stream With Streamyard BETTER!
In this "How To Streamyard" tutorial, I will share with you 6 hacks to live stream with Streamyard better. I have been using Streamyard since they were in Beta and I have seen so many amazing changes with this platform. Here are my 6...
Curated Video
Describe cyber attacks that could affect a computer system or network : Scanning the Network with OpenVas
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will know how to find vulnerabilities...
Curated Video
Bash Shell Scripting- Providing password for ssh using sshpass utility
This video shows how to provide a password for ssh using sshpass utility. This clip is from the chapter "Working with remote servers" of the series "Complete Bash Shell Scripting".This section shows how to work with remote servers.
Packt
Starting Kafka on a Remote Machine
This video demonstrates how to start Kafka on a remote machine. This clip is from the chapter "Annex - Starting Kafka Differently" of the series "Apache Kafka Series - Learn Apache Kafka for Beginners".In this section, you will learn to...
Curated Video
The Full Stack Web Development - Database & Job Class
Backend Programming with PHP: Database & Job Class This clip is from the chapter "Backend Programming with PHP" of the series "The Full Stack Web Development".Here, we talk about all the basics of PHP and move on to OOP, integrate MySQL,...
Curated Video
Band 9 Sample IELTS Part 2: A Person I Want to Know
Today you’ll hear a band 9 sample IELTS Part 2 answer about a person I want to know.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Using tcpdump to Analyze Network Traffic
tcpdump is a built-in Unix and Linux command-line tool that can capture, analyze, filter, and save captured network packets. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
World of Computer Networking Your CCNA start - Dynamic Network Address Translation (NAT)
This video introduced you to dynamic NAT. This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
Curated Video
Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- IP Addresses and Subnetting - Part 2
In this video, we'll learn about IP addresses and subnetting - part 2. This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is...
Packt
Steps to Connect Database Information to Selenium - 1
This is the first part of the two-part lecture that explains how to connect the database information to Selenium. This clip is from the chapter "Database Connection to Selenium Test Cases" of the series "Selenium WebDriver with Java -...
Curated Video
World of Computer Networking Your CCNA start - Types of Network Address Translation (NAT)
This video introduces you to different types of NAT. This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
Professor Dave Explains
Herpes Simplex Virus (HSV-1 and HSV-2)
We are probably familiar with herpes as a sexually transmitted disease, but we want to know as much as we can about this virus and the things it can do. What is the difference between HSV-1 and HSV-2? How does viral transmission work?...