Curated Video
Robots at Home: The Future of Domestic Automation
Explore the rapid evolution of robots from mere concepts to essential household companions that handle chores, assist with homework, and even cook meals. Discover how advancements in robotics are integrating intelligent, humanoid...
Curated Video
Linux Network Administration - NIC Information
This video explains the Network Interface Card information, which is installed in the computer.
Curated Video
Fundamentals of Secure Software - IAST (Interactive Application Security Testing)
This video demonstrates IAST (Interactive Application Security Testing).
Curated Video
Fundamentals of Secure Software - SAST (Static Application Security Testing)
This video provides an introduction to SAST (Static Application Security Testing).
Curated Video
Fundamentals of Secure Software - Type of Threat Modeling
This video demonstrates different types of threat modeling.
Curated Video
Fundamentals of Secure Software - SKF (Security Knowledge Framework)
This video explains how to use the SKF (Security Knowledge Framework).
Curated Video
Fundamentals of Secure Software - Security Misconfiguration
This video talks about security misconfiguration.
Curated Video
A Detailed Guide to the OWASP Top 10 - #5 Security Misconfiguration Prevention
This video explains the steps to be taken to prevent the OWASP 05 security misconfiguration.
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Have I Been Pwned?
In this video, the author introduces you to a web tool called “have I been pwnedâ€; this is a website where you can check whether your email address or password has been compromised. This clip is from the chapter "Personal Security" of...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Creating a Personal Disaster Recovery Plan
In this video, you will learn to create your very own disaster recovery plan. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section talks about malware...
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Trusted Advisor
Wouldn't it be amazing if you have someone you could turn to and ask them to evaluate your AWS implementation for problems in security, performance, and cost management? The good news is that you do. It's the Trusted Advisor within AWS...
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Elastic Container Service (ECS)
At times, you might want to run some code in AWS without having to launch, configure, upgrade, and manage entire EC2 instances. You may be able to do this with the Elastic Container Service and this video explains how.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Services, Part 3
This video continues the AWS offerings tour and looks at the most recent additions to the AWS system.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Analytics Engines
AWS provides several services for analytics, including CloudSearch, ElasticSearch Service, Data Pipeline, AWS Glue, QuickSight and Athena. This video provides a quick tour of these services for the solutions architect.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - OpsWorks
For years, we have had operations management software solutions in internal enterprise networks. AWS offers the same using OpsWorks and this video explores the features and capabilities of this solution.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Kinesis
What can you use to analyze data on-the-fly in AWS? The answer is Kinesis and its several implementation methods. In this video, you are introduced to the Kinesis solution in AWS and what it has to offer.
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Fuzzing with Burp Suite Intruder Overview
This video provides you with an overview of Fuzzing with the help of Burp Suite Intruder. This clip is from the chapter "Fuzzing with Burp Suite Intruder" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - The Basics of Fuzzing
This video provides basic knowledge on Fuzzing. This clip is from the chapter "Fuzzing with Burp Suite Intruder" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on Fuzzing with Burp Suite...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Summary-1
This video helps you with the summary of this section. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Dumping Database Table Entries Demo
This is a demo video on how to dump database table entries. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - The Basics of Sqlmap Overview
This video provides an overview of the basics of Sqlmap. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-How Hackers Find SQL Injections in Minutes with Sqlmap
This video provides an overview of the section. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on how...
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Presenting User Profile Images
In this video, the presenter shows how to present the user profile images in the app UI by creating a route to serve the static files.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - What Is the Registry?
The Registry is the primary repository for everything about your Windows system. The Registry is rarely accessed directly, but, when necessary, we use the Registry Editor utility to do so. This clip is from the chapter "Working with...