Instructional Video6:36
Curated Video

Bug Bounty Program Certification 4.1: Bugs Overview in Networks As External Attacker

Higher Ed
In this video, we will find bugs in networks as external attacker. • Explore wireless attack process as an attacker • Learn about pre-attack phase of external attack • Learn about post attack phase of external attack
Instructional Video12:57
Curated Video

Cloud Native Development on Azure with Java 5.2: Deploying Multi-Container Application to Azure Kubernetes Service

Higher Ed
Now that you know what Kubernetes is, we are all ready to get our hands dirty! In this video, we will deploy a multi-container application to Azure Kubernetes Service. • Configure an existing service principle and use it to manage the...
Instructional Video1:14
Next Animation Studio

FBI tricked international cartels into using ‘encrypted’ phones

12th - Higher Ed
The huge surveillance operation started years ago, when a convicted drug smuggler offered the ‘back door’ of his special new gangster phone to the FBI.
Instructional Video1:41
Science360

Anchovi Labs

12th - Higher Ed
An introduction to Anchovy Labs, a team specialising in image annotation and analysis software at the California Institute of Technology.
Instructional Video4:23
IDG TECHtalk

How to securely prepare for Adobe Flash end of life on Windows 10

Higher Ed
Microsoft will soon discontinue support for Adobe Flash. Here’s how to transition to secure alternatives while blocking unsafe use of Flash.
Instructional Video4:49
IDG TECHtalk

Security considerations for remote workers

Higher Ed
Companies that are scrambling to support remote workers in the wake of the COVID-19 crisis need to address these security concerns.
Instructional Video1:18
XKA Digital

It's important to make a difference

Higher Ed
Nigel was appointed in April 2002 to head up the BBC's training and development operation, where he built one of the most successful learning and development operations in the UK. This included an award-winning leadership programme,...
Instructional Video7:10
Curated Video

Python for Network Forensics 5.3: Exploitation

Higher Ed
Once an attack vector has been found we will proceed with exploitation to take over the system. • Learn about a common attack vector through exploitable web services • Develop a Python-based reverse shell to gain access into the system •...
Instructional Video8:51
Curated Video

Python for Network Forensics 1.5: Introduction to Impacket

Higher Ed
In this video, we will add breadth to our Python capability to extend functionality using Impacket. • Further expand our application to import Impacket • Decode raw packets using Impacket • Get a better understanding of encapsulation and...
Instructional Video3:28
Packt

Advanced Computer Vision Projects 3.4: Videos and Retraining

Higher Ed
In this video, we’ll briefly cover how to extend the model to handle videos and how to retrain the model. • See that we can apply algorithms to videos by running frame-by-frame • Briefly go over instructions to retrain on existing or new...
Instructional Video2:21
Packt

Advanced Computer Vision Projects 1.1: The Course Overview

Higher Ed
This video shows an entire overview of the course.
Instructional Video3:10
Curated Video

Mastering Tableau 2018.1, Second Edition 8.4: Clustering Data in Tableau

Higher Ed
In this video, we’ll see how to cluster data in Tableau. • Understand clusters • Implement clustering in Tableau
Instructional Video4:27
Curated Video

Mastering Tableau 2018.1, Second Edition 3.3: Using the Data Interpreter

Higher Ed
In this video, we’ll see the data interpreter in action. • Load the dataset into Tableau • Apply the data interpreter to the data
Instructional Video6:31
Curated Video

Tips, Tricks, and Techniques for Node.js Development 5.3: Clustering

Higher Ed
Node.js is running a single process on a CPU, wasting other cores. Luckily for us, Node.js has a module to solve this for us and let us use multi-core. In this video, we will learn how to use this module. • Explain cluster module • Use...
Instructional Video3:56
Curated Video

Learning D3.JS 5.0 10.4: Make It More Functional

Higher Ed
In this video, we will add another JSON file with cities, population, longitude, and latitude, and make the cities visible. • Add the new JSON file • Add code to make the cities visible • View the result
Instructional Video3:42
Curated Video

Learning D3.JS 5.0 8.6: Adding Visual Information

Higher Ed
In this video, we will create an area chart using the line chart. • Add some code to make the data more readable • Understand the area chart • Add the area chart
Instructional Video2:50
Curated Video

Learning D3.JS 5.0 7.5: Working with Arrays

Higher Ed
In this video, we will use arrays to simulate real-life examples. • Go through the array documentation • Use the array and alternate the domain() in the code • Use the console to check whether the result is correct
Instructional Video3:14
Curated Video

Learning D3.JS 5.0 2.1: What Is an SVG?

Higher Ed
In this video, we will learn about SVG, what it is, where we use it, what we can do with it, its advantages/disadvantages, and how D3.js handles them. • Understand the definition of SVG • Learn the properties of SVG • Know when we should...
Instructional Video8:07
Curated Video

Bug Bounty Program Certification 12.2: Install Drozer on Windows and Android Machines

Higher Ed
This video will help you download and install Drozer in Android and Windows. • Download Drozer file • Install Drozer in Windows • Install drozer.apk in android phone
Instructional Video8:35
Curated Video

Bug Bounty Program Certification 11.4: Find Bugs in Coding Files and Break Algorithm

Higher Ed
This video will help you find algorithm and complete the task. • Analyze source code to find algorithm used • Find out encryption key • Complete the task to encrypt the string
Instructional Video8:20
Curated Video

Bug Bounty Program Certification 10.1: Install Android Studio in Windows Machine and Setup

Higher Ed
This video will help you understand how to setup lab for Android machine. • Download Android studio • Installation of Android studio • Create a Nexus phone using Android studio
Instructional Video5:16
Curated Video

Bug Bounty Program Certification 6.6: Infect Complete Network Using Malwares

Higher Ed
In this video, you will see how to infect entire network using malwares. • Learn about various network attacks • Explore the process of network infection techniques • Explanation of malware infection in network
Instructional Video6:16
All In One Social Media

How To Streamyard: How To Create Overlays For Streamyard (series)

Higher Ed
How to create overlays for Streamyard is the most commonly asked question I get when it comes to using Streamyard. In this video, I will not only show you how to create overlays, but I will also give you free templates to make it easier...
Instructional Video4:56
IDG TECHtalk

How to mitigate risk from nation-state attacks

Higher Ed
The recent SolarWinds attack underscores the danger many companies face from nation-state actors. Here’s how to prepare your Windows networks from the threat.