Instructional Video2:49
Curated Video

IELTS Reading Tips: 3 Methods of Scanning

9th - Higher Ed
Today you’ll find out the three methods of scanning to use on the IELTS Reading Exam.
Instructional Video5:32
Curated Video

Explain web security : Methodolo-gy of Hack-ers

Higher Ed
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether we...
Instructional Video9:00
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Vulnerability Assessments

Higher Ed
This episode discusses how to use tools to identify security flaws on hosts or for a specific application. Topics include credential vs non-credential scans and keeping the vulnerability database up to date. This clip is from the chapter...
Instructional Video3:56
Curated Video

IELTS Reading Tips: Increase Your Scores

9th - Higher Ed
Today you’ll learn IELTS Reading tips to increase your scores on your next exam.
Instructional Video8:53
Curated Video

Describe cyber attacks that could affect a computer system or network : Hidden Scanning Ports with Nmap

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will learn how to scan a target with...
Instructional Video4:06
Curated Video

Vital IELTS Reading Strategy II: Skimming

9th - Higher Ed
Today you’ll learn how to skim on the IELTS Reading Exam.
Instructional Video7:59
Curated Video

Learning Angular 2 Directives (Video 8)

Higher Ed
Get up to speed with the building blocks of Angular 2. New technologies and new patterns are emerging on a daily basis. Coding for the front end is extremely demanding, but at the same time more interesting and challenging than ever...
Instructional Video2:06
NASA

NASA | Flying Around the Radar

3rd - 11th
The HIWRAP is the High-Altitude Imaging Wind and Rain Airborne Profiler, a "conically scanning" Doppler radar, meaning it scans in a cone-shaped manner. Wind measurements are crucial for understanding and forecasting tropical storms...
Instructional Video4:36
Curated Video

Should I Learn to Speed Read for the IELTS Exam?

9th - Higher Ed
Today I’ll answer a question about learning to speed read for the IELTS Exam.
Instructional Video7:40
Curated Video

Describe cyber attacks that could affect a computer system or network : Scanning the Network with OpenVas

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will know how to find vulnerabilities...
Instructional Video3:08
Curated Video

IELTS Reading Strategy: Why you Must Skim

9th - Higher Ed
With this simple strategy, you can save time on the IELTS Reading exam.
Instructional Video8:43
Curated Video

Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines

Higher Ed
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Instructional Video3:29
Curated Video

IELTS Listening Tips: You Need to Prepare for Accents

9th - Higher Ed
Today you’ll learn amazing resources you need to prepare for various accents in IELTS Listening.
Instructional Video9:32
Curated Video

Bug Bounty Program Certification 5.2: Find Major Bugs in Server

Higher Ed
In this video, we will learn about advance scanning using vulnerability scanner. • Use Nessus network vulnerability scanner • Use advance scan, find bugs in server • Explanation of bug available in server
Instructional Video1:21
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Smartphones and Mobile Apps Part III

Higher Ed
In Part III, you will learn some great solutions that Google has put in place, to protect you from the bad guys when you are using an Android device. We will also discuss Google Play Protect, and how it is designed to help you detect and...
Instructional Video14:56
Curated Video

Explain web security : Other Types of Reconnaissance

Higher Ed
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks. In this video we’ll understand vulnerability scanning - Check out vulnerability scanning...
Instructional Video2:12
NASA

NASA | HS3 Mission: S-HIS Instrument

3rd - 11th
Interview with Henry "Hank" Revercomb, principal investigator for the NASA HS3 Mission's Scanning High-Resolution Interferometer Sounder Instrument. He is responsible for the infrared remote sensing of temperature, water vapor, and cloud...
Instructional Video13:47
Curated Video

Explain web security : Working with NMap

Higher Ed
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks. Our aim in this video is to understand what NMap is and how we will be working with it. -...
Instructional Video7:24
Curated Video

Explain web security : Shodan for scanning

Higher Ed
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks. In this video we will learn what Shodan is and how to use it. - Scour through the Shodan...
Instructional Video11:44
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Nmap - 2

Higher Ed
In this video, you'll continue to learn about Nmap. This clip is from the chapter "Active Information Gathering and Port Scanning" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll...
Instructional Video9:38
Curated Video

Bug Bounty Program Certification 13.2: Bug Bounty Certification Exam Practice Questions – Part 1

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video15:34
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Nmap - 1

Higher Ed
This video is part of a 3-part video series where you'll learn about network mapping. This clip is from the chapter "Active Information Gathering and Port Scanning" of the series "The Complete Ethical Hacking Bootcamp: Beginner To...
Instructional Video12:26
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Nmap - 3

Higher Ed
This is the last video on Nmap. This clip is from the chapter "Active Information Gathering and Port Scanning" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll perform active information...
Instructional Video14:00
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Rockou.txt Wordlist

Higher Ed
In this video, you'll get an introduction to the Rockou.txt Wordlist and how to use it. This clip is from the chapter "Wireless Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...