Hi, what do you want to do?
Curated Video
Practical Cyber Hacking Skills for Beginners - Firewall and IDS Evasion Techniques
In this video, we will understand a firewall and the intrusion detecting system in NMAP for a packet or probe coming specifically from NMAP.
Curated Video
Practical Cyber Hacking Skills for Beginners - Host Discovery Controls - Part 2
This video continues where we left off, understanding the host discovery controls and the scanning techniques used briefly.
Curated Video
Practical Cyber Hacking Skills for Beginners - Host Discovery Controls
In this lesson, we will look at the different probes used by the NMAP, including ICMP Echo request, TCP Syn packet to port 443, TCP ACK packet to port 80, and ICMP timestamp request.
Curated Video
Practical Cyber Hacking Skills for Beginners - Basics of NMAP
After installing and configuring NMAP, we will look at how this NMAP scanning program works.
Curated Video
Practical Cyber Hacking Skills for Beginners - TCP versus UDP
Here, we will understand transmission control protocol and user datagram protocol and the fundamental differences between the two.
Curated Video
Practical Cyber Hacking Skills for Beginners - Introduction to NAT
This video is a detailed introduction to Network Address Translation, allowing computers to share the same public IP address.
Curated Video
Practical Cyber Hacking Skills for Beginners - Working with DHCP Commands
This video takes us through the different commands to operate the DHCP and protect a system or network from attacks.
Curated Video
Practical Cyber Hacking Skills for Beginners - Introduction to DHCP and DNS
This video introduces us to the dynamic host configuration protocol and the domain name service.
Curated Video
Practical Cyber Hacking Skills for Beginners - Home Setup
This video briefly overviews a network setup in a typical home, including electronic devices, modems, routers, hubs, and so on.
Curated Video
Flaws in the Internet's Border Gateway Protocol
The White House recently unveiled a plan to deal with networking weaknesses in the Border Gateway Protocol. In the past, the BGP has been exploited or misconfigured to cause massive disruptions on the Internet. Topics Covered: Biggest...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Anonymizer
In this video, we will look at the tools and software used to make activity on the Internet untraceable.
Curated Video
Modern JavaScript from the Beginning - Second Edition - Deploying a Fullstack App
Finally, in this video, we will go over the process of deploying a full-stack application to a server.
<
br/>
This clip is from the chapter "RandomIdeas Project - Webpack Frontend (Bonus Project)" of the series "Modern JavaScript...
<
br/>
This clip is from the chapter "RandomIdeas Project - Webpack Frontend (Bonus Project)" of the series "Modern JavaScript...
Curated Video
Modern JavaScript from the Beginning - Second Edition - Mongoose Connect and Dotenv
In this video, we will use the Mongoose library to connect to our MongoDB database. We will also use the dotenv library to manage our environment variables, such as the database connection string.
<
br/>
This clip is from the...
<
br/>
This clip is from the...
Curated Video
Hands-On Continuous Integration and Automation with Jenkins - Configure the EC2 Plugin
This video introduces AWS concepts like IAM policy, IAM user, and AMI, and shows how to add AWS credentials to Jenkins and install and configure the EC2 plugin.
Curated Video
Hands-On Continuous Integration and Automation with Jenkins - Install Jenkins on AWS
This video shows how to assign an Elastic IP address to an EC2 instance, access an EC2 instance via ssh, and install Jenkins on AWS.
Curated Video
Hands-On Continuous Integration and Automation with Jenkins - Create Resources on AWS
This video introduces AWS resources and jargon and shows how to create a VPC and security group and launch an EC2 instance.
Curated Video
Data Science Model Deployments and Cloud Computing on GCP - Lab - Traffic Splitting in App Engine
In this video, we demonstrate how to perform traffic splitting in Google App Engine, showing you how to split incoming traffic between multiple versions of your application using the App Engine Console and the gcloud CLI.
<
br/>...
<
br/>...
Curated Video
Linux Crash Course for Beginners - 2023 - Troubleshooting Putty Connection
In this video, we will work on troubleshooting the issues found while connecting the Linux VM through Putty.
Curated Video
Linux Crash Course for Beginners - 2023 - Network Files and Commands
In this video, you will learn about network files and commands such as ping, ifconfig, netstat, tcpdump, and networking config.
Curated Video
Linux Crash Course for Beginners - 2023 - Enabling Internet in Linux VM
In this video, you will learn how to get internet access to our VM.
Curated Video
Linux Crash Course for Beginners - 2023 - System Utility Commands
In this video, you will learn system utility commands such as date, uptime, hostname, uname, which, cal, and bc.
Curated Video
Linux Crash Course for Beginners - 2023 - Switch Users and Sudo Access
In this video, you will learn how to switch users and allow Sudo access using su and sudo commands.
Curated Video
Linux Crash Course for Beginners - 2023 - Connect Linux VM Through Putty
In this video, you will learn how to access our Linux machine through Putty.
Curated Video
Linux Network Administration - Tracing Network Traffic - Traceroute
This video explains how to troubleshoot any network issue in the environment using traceroute.