Instructional Video6:01
The Guardian

Street children from around the world: 'Football helps kids take the right path'

Pre-K - Higher Ed
There are an estimated 150 million street children around the world. We speak to young people from Pakistan, Burundi and Brazil about the role sport has had in getting them off the streets
Instructional Video5:24
Lingokids

How to Draw a Traffic Light

Pre-K - 3rd
Green means GO! This video teaches kids how to draw a traffic light with step-by-step instructions. Your child can learn about transportation vocabulary while training their fine motor skills and creativity! Let's be safe on the road!
Instructional Video10:33
Zach Star

Today In Engineering (Episode 2) | Human Vs A.I. Drone Race, Laser Communication, and more...

12th - Higher Ed
This video of "Today In Engineering" includes: 1. Human Vs AI Drone Race 2. Nasa' Psyche Project 3. Near Perfect Streaming Algorithm 4. The Boring Company
Instructional Video4:08
Curated Video

Rearview Mirror Part 1: The Power of Self Reflection

6th - 8th
In this episode of "In Control," we kickstart our series titled "Rearview Mirror" by delving into the power of self-reflection. Using the metaphor of a rearview mirror, we highlight how examining our past actions can inform better...
Instructional Video6:21
Curated Video

Cracking WPA and WPA2 new 2

Higher Ed
This video will explain the difference between two famous wireless protocols, and will show you a technique on cracking the passwords by deauthenticating users connected to a specific SSID
Instructional Video3:50
Curated Video

Dynamic Analysis

Higher Ed
This video will explain Dynamic malware analysis in details, which is a runtime approach for analyzing malicious activities
Instructional Video4:24
Curated Video

Android Dynamic Malware Analysis

Higher Ed
In this tutorial, you will learn how to perform dynamic malware analysis for an APK file using MobSF or Mobile Security Framework, which is a super handy tool for analyzing Android applications.
Instructional Video3:40
Curated Video

Wireshark D3 V1 - How is traffic captured

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 1: How is traffic captured
Instructional Video4:12
Curated Video

Hack Using a Rogue Access Point

Higher Ed
In this tutorial, you will learn how to create a fake wireless access point and use it to hack the users logged on to it. We will use WiFi Pineapple device.
Instructional Video3:59
Curated Video

How Does Port Scanning Work

Higher Ed
In this video, you will learn the two main techniques used in port scanning. We will be mainly using NMAP tool
Instructional Video6:02
Curated Video

Setup a Stealthy Command and Control Center Online

Higher Ed
This video will teach you how to setup a command and control center over the internet to start you actual attacks
Instructional Video3:58
Curated Video

Wireshark D5 V7 - HTTP analysisTroubleshoot your network

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 7: Troubleshoot your network
Instructional Video4:10
Curated Video

SSL Interception

Higher Ed
In this video, we will intercept SSL traffic by decrypting the SSL tunnel between an APK and a server
Instructional Video6:10
Curated Video

Bypass Firewalls by Tunneling Data and Commands over DNS new

Higher Ed
This video will teach you how to setup a Command and Control center to bypass firewall rules and control the victim over DNS traffic, which in many cases is not suspicious to anyone monitoring a network traffic.
Instructional Video4:48
Curated Video

Wireshark D4 V5 - IPv6 Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 5: IPv6 deep-dive
Instructional Video7:11
Curated Video

How to Attack Modern Wireless Networks - Introduction

Higher Ed
This video is a general overview on how to attack wireless networks
Instructional Video5:54
Curated Video

Wireshark D5 V3 - HTTP analysisDNS analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 3: DNS analysis
Instructional Video3:28
Curated Video

Wireshark D3 V4 - How is traffic capturedCapture Filters

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 4: Capture filters
Instructional Video3:42
Curated Video

Wireshark D3 V2 - How is traffic capturedSPAN Port

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 2: SPAN ports
Instructional Video6:17
Curated Video

Wireshark Simplified

Higher Ed
In this video, you will learn about the famous packet capturing tool, Wireshark. The tutorial demonstrates the capabilities of the application on KALI, while inspecting traffic between the KALI machine and a cloud windows server. Use...
Instructional Video3:56
Curated Video

Wi-Fi Security

Higher Ed
You will learn how to protect your home WiFi and be vigilant when you are using public Wifi
Instructional Video1:49
Curated Video

Insufficient Logging and Monitoring

Higher Ed
Insufficient logging and monitoring is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Instructional Video6:21
Curated Video

Hack WPA2 Wireless Networks

Higher Ed
In this tutorial, you will learn how to crack into WPA and WPA2 wireless networks using various tools like aircrack-ng.
Instructional Video8:35
Curated Video

Execute Man-in-the-Middle Attacks

Higher Ed
Learn how to execute MITM attacks using Ettercap tool, a very powerful application in Kali