Instructional Video3:55
Vlogbrothers

You Cannot Trust Yourself (Hank's End of the Year Worries)

6th - 11th
This video had a whole section in it where I complained about how annoyed I get when I see other people who don't consider their impact get really surprised when people get mad at them and how nice it must be to just be blissfully...
Instructional Video20:47
Vlogbrothers

We're Thinking About Facebook Wrong

6th - 11th
Usually I'm up in the description being like, "here are a bunch of things I wasn't really able to fit in the video" but actually...turns out, if you let me go for 20 minutes, I get most of it out. OK, I guess the one insight I had...
Instructional Video10:36
Vlogbrothers

We Have Destroyed Copyright Law

6th - 11th
The internet destroyed copyright law and we have not re-built. Instead of laws and courts we now have claims and disputes. YouTube in particular has placed itself in the middle of extra-legal arbitrations over what is and is not fair...
Instructional Video2:40
Vlogbrothers

Your Attention

6th - 11th
In which John discusses what's wrong with the Internet, whether it's new, and the power (and value) of our attention.
Instructional Video2:27
Curated Video

Web Applications Security Overview

Higher Ed
This video will highlight the security concerns when it comes to web applications
Instructional Video2:12
Curated Video

Browsing the Internet Safely

Higher Ed
The video highlights the tips on how to browse the internet safely and what are the risky habits to avoid over the internet
Instructional Video3:54
Curated Video

Steps to plan a successfull pentest

Higher Ed
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Instructional Video6:52
Curated Video

Hack Facebook, Twitter, and Gmail Accounts

Higher Ed
We will use the SET tool to setup a phishing campaign in order to hack social media accounts
Instructional Video10:09
Curated Video

Design Effective Wordlists

Higher Ed
Learn how to effectively create wordlists that will aid you in cracking passwords
Instructional Video6:27
Curated Video

Hack Using Google ONLY

Higher Ed
You will learn how to easily perform hacking using search engines and publicly available information. Find passwords, confidential files, and gain access to systems with minimum efforts.
Instructional Video4:40
Curated Video

Types of Attackers and Cybersecurity Professionals

Higher Ed
In the field of information security, there are three well-known categories of hackers: black hats, white hats, and grey hats. In an effort to set themselves apart from one another and distinguish the good hackers from the evil, hackers...
Instructional Video4:37
Curated Video

Acquire Malicious Apps1

Higher Ed
This video will describe the methods of acquiring malicious Android applications over the internet. There are few publicly available sites in addition to Github links that will be shared.
Instructional Video4:12
Curated Video

Hack Using a Rogue Access Point

Higher Ed
In this tutorial, you will learn how to create a fake wireless access point and use it to hack the users logged on to it. We will use WiFi Pineapple device.
Instructional Video6:27
Curated Video

Google Dorks Live Examples

Higher Ed
Spot the vulnerabilities in the wild, leverage Google to hack into web applications and systems that are published over the Internet. You will be surprised by how easy it is.
Instructional Video5:03
Curated Video

LAB 2: Google Hacking

Higher Ed
I will show you the basics of Google hacking without any prior technical knowledge
Instructional Video2:58
Curated Video

Welcome Note

Higher Ed
The video explains the importance of cyber security in a connected world
Instructional Video3:56
Curated Video

Wi-Fi Security

Higher Ed
You will learn how to protect your home WiFi and be vigilant when you are using public Wifi
Instructional Video3:20
Curated Video

Publish Your Weapons Online

Higher Ed
This video will teach you how to prepare your lab for a real world attack
Instructional Video1:23
Curated Video

LAB 9: What the Internet Knows About You

Higher Ed
We will show you what Google knows about you in order to personalize your ads
Instructional Video1:11
Curated Video

Virtual Private Networks (VPN)

Higher Ed
A virtual private network (VPN) allows users to send and receive data through shared or public networks as though their computing equipment were directly linked to the private network by extending a private network across the latter.
Instructional Video1:26
Curated Video

LAB 5: Shodan and IoT Scanners

Higher Ed
I will introeuce you to shodan, and teach you how to discover assets over the Internet
Instructional Video6:08
Curated Video

Modern Web Design with HTML5, CSS3, and JavaScript - Learning to Code in HTML

Higher Ed
This video demonstrates how to start coding in HTML. This clip is from the chapter "Introduction to Getting Started with Web Design" of the series "Modern Web Design with HTML5, CSS3, and JavaScript".This section provides an introduction...
Instructional Video3:23
Curated Video

MongoDB Mastering MongoDB for Beginners (Theory and Projects) - Network Access

Higher Ed
In this video, we will cover network access. This clip is from the chapter "Mongo with Node" of the series "MongoDB—Mastering MongoDB for Beginners (Theory and Projects)".In this section, we will cover Mongo with Node.
Instructional Video5:39
Curated Video

gRPC [Golang] Master Class Build Modern API and Microservices - [Theory] SSL Security

Higher Ed
[Hands-On] gRPC Advanced Features Deep Dive: [Theory] SSL Security This clip is from the chapter "[Hands-On] gRPC Advanced Features Deep Dive" of the series "gRPC [Golang] Master Class: Build Modern API and Microservices".In this...