Instructional Video5:16
Vlogbrothers

Understanding the Primaries: Delegates, Democracy, and America's Nonstop Political Party

6th - 11th
In which John seeks to understand the strange and labyrinthine process used by the Republican and Democratic parties to select a nominee for President, focusing on the great state of Missouri, where the races were close but the delegate...
Instructional Video2:40
Vlogbrothers

Your Attention

6th - 11th
In which John discusses what's wrong with the Internet, whether it's new, and the power (and value) of our attention.
Instructional Video13:13
Curated Video

24 Mosfet Consideration | Power Electronics

Higher Ed
24 Mosfet Consideration | Power Electronics
Instructional Video25:11
Curated Video

34 Buck-Boost Converter Analysis and Design | Power Electronics

Higher Ed
34 Buck-Boost Converter Analysis and Design | Power Electronics
Instructional Video22:53
Curated Video

29 Buck Converter Introductory Basics | Power Electronics

Higher Ed
29 Buck Converter Introductory Basics | Power Electronics
Instructional Video3:50
Curated Video

Dynamic Analysis

Higher Ed
This video will explain Dynamic malware analysis in details, which is a runtime approach for analyzing malicious activities
Instructional Video4:24
Curated Video

Android Dynamic Malware Analysis

Higher Ed
In this tutorial, you will learn how to perform dynamic malware analysis for an APK file using MobSF or Mobile Security Framework, which is a super handy tool for analyzing Android applications.
Instructional Video2:51
Curated Video

Android Malware Analysis Introduction

Higher Ed
An introduction to malware analysis
Instructional Video5:06
Curated Video

Static vs Dynamic Malware Analysis

Higher Ed
The video will explain the main differences between two major approaches in analyzing malware. Static and Dynamic.
Instructional Video22:05
Curated Video

31 Buck Converter Design | Power Electronics

Higher Ed
31 Buck Converter Design | Power Electronics
Instructional Video29:40
Curated Video

26 Inverters | Power Electronics

Higher Ed
26 Inverters | Power Electronics
Instructional Video34:14
Curated Video

32 Buck DC/DC Converters Design Consederations | Power Electronics

Higher Ed
32 Buck DC/DC Converters Design Consederations | Power Electronics
Instructional Video1:00:11
Curated Video

Lab 3 Buck Converter in LTSpice | Power Electronics

Higher Ed
Lab 3 Buck Converter in LTSpice | Power Electronics
Instructional Video12:31
Curated Video

16 Switching Losses and LTSpice | Power Electronics

Higher Ed
Basics of Power Electronics - Walid Issa 16 Switching Losses and LTSpice | Power Electronics
Instructional Video15:52
Curated Video

14 Thermal Calculations using LTSpice

Higher Ed
Electronics Thermal Heatsink Design Tutorial Thermal Calculations using LTSpice Basics of Power Electronics - Walid Issa
Instructional Video24:55
Curated Video

Lab 1 Task 1 Building First circuit in LTSpice

Higher Ed
Lab 1 Task 1 Building First circuit Basics of Power Electronics - Walid Issa
Instructional Video1:18
Curated Video

Definitions

Higher Ed
The video introduces various terminology used in risk management
Instructional Video4:37
Curated Video

Acquire Malicious Apps1

Higher Ed
This video will describe the methods of acquiring malicious Android applications over the internet. There are few publicly available sites in addition to Github links that will be shared.
Instructional Video19:20
Curated Video

30 Buck Converter Analysis | Power Electronics

Higher Ed
30 Buck Converter Analysis | Power Electronics
Instructional Video20:59
Curated Video

18 Which Switch to Choose ? | Power Electronics

Higher Ed
Basics of Power Electronics - Walid Issa 18 Which Switch to Choose ? | Power Electronics
Instructional Video5:26
Curated Video

Injecting a Legit APK and Analyze it using MobSF

Higher Ed
MobSF is a powerful setup for analyzing mobile malware. In this video we will learn how to install this framework and analyze malicious applications on it.
Instructional Video4:10
Curated Video

SSL Interception

Higher Ed
In this video, we will intercept SSL traffic by decrypting the SSL tunnel between an APK and a server
Instructional Video3:37
Curated Video

Wireshark D3 V6 - Finding and marking packets

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 6: Finding and marking packets
Instructional Video18:03
Curated Video

Analysis of GDPR Compliance Program

Higher Ed
This section provides information that will assist you in building your own GDPR compliance program within your organization