Curated Video
World of Computer Networking Your CCNA start - Network Interface Controller (NIC)
This video provides an introduction to NIC. This clip is from the chapter "Ethernet" of the series "World of Computer Networking: Your CCNA start".This section introduces you to Ethernet.
Curated Video
World of Computer Networking Your CCNA start - Same Ports in Different Applications
This video highlights the concept of same ports in different applications. This clip is from the chapter "Transport Layers: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)" of the series "World of Computer...
Curated Video
World of Computer Networking Your CCNA start - Uniform Resource Locator (URL) Ports and Fragments
This video focuses on URL ports and fragments. This clip is from the chapter "Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS)" of the series "World of Computer Networking: Your CCNA start".This section introduces...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Nmap - 1
This video is part of a 3-part video series where you'll learn about network mapping. This clip is from the chapter "Active Information Gathering and Port Scanning" of the series "The Complete Ethical Hacking Bootcamp: Beginner To...
Curated Video
World of Computer Networking Your CCNA start - Network Switches
This video provides an introduction to network switches. This clip is from the chapter "Switches and Data Link Layer" of the series "World of Computer Networking: Your CCNA start".This section introduces you to switches and the data link...
Curated Video
World of Computer Networking Your CCNA start - Routers
This video explains the concept of routers. This clip is from the chapter "Routers and Network Layer" of the series "World of Computer Networking: Your CCNA start".This section introduces you to routers and the network layer.
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - HTTP Responses
This video shows you how to perform pen testing using http responses. This clip is from the chapter "Web Application Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Scanning with Zenmap
In this video, you'll learn how to perform scanning using zenmap. This clip is from the chapter "Active Information Gathering and Port Scanning" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
Curated Video
Learning Splunk - Hands-On Lab: Search Pipeline
Understanding the use of the Splunk search pipeline in a hands-on activity. • Create a search using your firewall logs • Experiment with different visualizations for your data • Save your results as a report that can be viewed later This...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Testing Network Security
This video shows how to scan your network for potential weaknesses. This clip is from the chapter "Protecting Your Network" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn how to...
Curated Video
World of Computer Networking Your CCNA start - Multiple Sockets
This video focuses on multiple sockets. This clip is from the chapter "Transport Layers: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)" of the series "World of Computer Networking: Your CCNA start".This section...
Curated Video
World of Computer Networking Your CCNA start - Analyzing Sockets on the Windows Client
This video demonstrates how to analyze sockets on the Windows client. This clip is from the chapter "Transport Layers: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)" of the series "World of Computer Networking:...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Bypassing Firewalls with Nmap
In this video, you'll learn another use of Nmap—to bypass firewalls. This clip is from the chapter "Active Information Gathering and Port Scanning" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Curated Video
Plate Heat Exchangers Basics
Plate heat exchangers what are they, how do they work and where do we use them. Find out here in this video on plate heat exchangers.
Curated Video
Containerize Spring Boot CRUD App with Docker and Docker Compose - Creating First Docker Compose File
In this video, you will learn how to create first Docker Compose file. This clip is from the chapter "All about Docker Compose" of the series "Containerize Spring Boot CRUD App with Docker and Docker Compose".In this section, you will...
Curated Video
AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - Working with Security Groups Lab
This video demonstrates how to control who has access to the Amazon EC2 instances that you implement with the help of security groups. This clip is from the chapter "Solutions Architect Chapter 6 - Compute Services Management" of the...
Curated Video
World of Computer Networking Your CCNA start - What is a Network Socket?
This video provides an introduction to the concept of network sockets. This clip is from the chapter "Transport Layers: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)" of the series "World of Computer Networking:...
Curated Video
World of Computer Networking Your CCNA start - Port Ranges
This video presents an overview of port ranges. This clip is from the chapter "Transport Layers: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)" of the series "World of Computer Networking: Your CCNA start".This...
Curated Video
World of Computer Networking Your CCNA start - Application and Protocol Ports
This video introduces you to application and protocol ports. This clip is from the chapter "Transport Layers: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)" of the series "World of Computer Networking: Your CCNA...
Curated Video
Kubernetes for the Absolute Beginners - Hands-On - Services – Load Balancer
In this video, we will learn about load balancer. This clip is from the chapter "Services" of the series "Kubernetes for the Absolute Beginners - Hands-On".In this section, we will learn more about NodePort and ClusterIP services.
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Brute Forcing SSH with Metasploit
This video shows you how to use Metasploit to perform brute force SSH. This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll...
Curated Video
CompTIA A+ Certification 220-1001: The Total Course - Port Numbers
An IP address directs a packet to the right computer, but it’s the port number that makes a connection between two applications on separate systems. It’s critical to understand how port numbers do their job and to memorize many special...
Paul Marriott
Mini Self-Opening Box w/Arduino Nano, Switch & 4 x AA Battery
Project modifications. I swapped out a large Arduino Uno microcontroller for a smaller Arduino Nano equivalent from a mini self-opening box project. I showcase the AA batteries, switch and the self-opening box itself.
The March of Time
1940s: CAPE TOWN PORT: VS Crates being lifted onto cargo ship docked in port, lumber being lifted, loaded, various cranes loading cargo, supplies, unloading boxes from trucks & cargo train, crates marked 'SDO PORT SAID.' Exporting, exports, war effort
MOT 1940s^ CAPE TOWN PORT: VS Crates being lifted onto cargo ship docked in port, lumber being lifted, loaded, various cranes loading cargo, supplies, unloading boxes from trucks & cargo train, crates marked 'SDO PORT SAID.' Exporting,...