Instructional Video22:53
Curated Video

29 Buck Converter Introductory Basics | Power Electronics

Higher Ed
29 Buck Converter Introductory Basics | Power Electronics
Instructional Video4:24
Curated Video

Android Dynamic Malware Analysis

Higher Ed
In this tutorial, you will learn how to perform dynamic malware analysis for an APK file using MobSF or Mobile Security Framework, which is a super handy tool for analyzing Android applications.
Instructional Video21:29
Curated Video

AWS Security Boiled Down

Higher Ed
A general overview about AWS security architecture and tools. Learn more about VPC, EC2, S3, AIM, Security Groups, and NACLs. This video will give you a quick jump into cloud security.
Instructional Video29:40
Curated Video

26 Inverters | Power Electronics

Higher Ed
26 Inverters | Power Electronics
Instructional Video12:31
Curated Video

16 Switching Losses and LTSpice | Power Electronics

Higher Ed
Basics of Power Electronics - Walid Issa<br/>
16 Switching Losses and LTSpice | Power Electronics
Instructional Video6:52
Curated Video

Hack Facebook, Twitter, and Gmail Accounts

Higher Ed
We will use the SET tool to setup a phishing campaign in order to hack social media accounts
Instructional Video15:52
Curated Video

14 Thermal Calculations using LTSpice

Higher Ed
Electronics Thermal Heatsink Design Tutorial<br/>
Thermal Calculations us<br/>ing LTSpice
Basics of Power Electronics - Walid Issa
Instructional Video24:55
Curated Video

Lab 1 Task 1 Building First circuit in LTSpice

Higher Ed
Lab 1 Task 1 Building First circuit<br/>
Basics of Power Electronics - Walid Issa
Instructional Video15:32
Curated Video

Create a Simple SIEM

Higher Ed
Learn the basic feature of SIEM solutions; logs aggregation using Powershell commands.
Instructional Video1:51
Curated Video

Who is Selling Your Email Addresses

Higher Ed
This video will help you identify those companies you sign up to, who in return sell your email addresses to companies who will spam you. You can easily identify those now.
Instructional Video6:27
Curated Video

Hack Using Google ONLY

Higher Ed
You will learn how to easily perform hacking using search engines and publicly available information. Find passwords, confidential files, and gain access to systems with minimum efforts.
Instructional Video4:28
Curated Video

DKIM Email Security

Higher Ed
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Instructional Video2:21
Curated Video

Audit Windows Servers With a Press of a Button

Higher Ed
Automate the process of auditing your Windows Servers by using this batch file.
Instructional Video5:58
Curated Video

Offline Password Attack on Windows

Higher Ed
In this video, you will learn how to extract the password hashes on a windows machine, then crack the hashes on KALI using John the Ripper. <br<br/>/>

Use this ethically !!!
Instructional Video4:12
Curated Video

Hack Using a Rogue Access Point

Higher Ed
In this tutorial, you will learn how to create a fake wireless access point and use it to hack the users logged on to it. We will use WiFi Pineapple device.
Instructional Video5:21
Curated Video

DNS Poisoning Attack

Higher Ed
In this video, you will use KALI to learn how to cache poison the DNS (Domain Name Server) entries to redirect the requester to a different page.
Instructional Video8:11
Curated Video

Hack Active Directory Database

Higher Ed
Hack the NTDS.DIT database using shadow copies, registry command, and powershell commands
Instructional Video20:59
Curated Video

18 Which Switch to Choose ? | Power Electronics

Higher Ed
Basics of Power Electronics - Walid Issa<br/>
18 Which Switch to Choose ? | Power Electronics
Instructional Video5:54
Curated Video

Execute an Offline Password Attack on Windows

Higher Ed
Learn how to plan an execute an offline password attack on Windows using John The Ripper tool
Instructional Video9:09
Curated Video

Hidden Tear Ransomware Setup

Higher Ed
In this tutorial, you will learn how to customize one of the publicly available forks of the Hidden Tear Ransomware, and how to deploy it.
<
br/>
Use this only for learning
p
urposes.

Use this only in t
e
st VM...
Instructional Video8:11
Curated Video

Create Your First Trojan

Higher Ed
In this video, you will learn how to create your first Trojan file, and how to use this file once it is invoked by the victim. The Trojan file is moved to the victim's machine by using various social engineering techniques.
Instructional Video8:26
Curated Video

Takeover a Database Server

Higher Ed
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully. <br<br/>/>

Use this technique ethically.
Instructional Video5:34
Curated Video

Hashing in a Nutshell

Higher Ed
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Instructional Video4:55
Curated Video

Bloodhound and Sharphound

Higher Ed
Learn how attackers use Bloodhound and Sharphound to Get Active Directory Domain Admin Access.