The Guardian
Street children from around the world: 'Football helps kids take the right path'
There are an estimated 150 million street children around the world. We speak to young people from Pakistan, Burundi and Brazil about the role sport has had in getting them off the streets
Lingokids
How to Draw a Traffic Light
Green means GO! This video teaches kids how to draw a traffic light with step-by-step instructions. Your child can learn about transportation vocabulary while training their fine motor skills and creativity! Let's be safe on the road!
Zach Star
Today In Engineering (Episode 2) | Human Vs A.I. Drone Race, Laser Communication, and more...
This video of "Today In Engineering" includes: 1. Human Vs AI Drone Race 2. Nasa' Psyche Project 3. Near Perfect Streaming Algorithm 4. The Boring Company
Curated Video
Rearview Mirror Part 1: The Power of Self Reflection
In this episode of "In Control," we kickstart our series titled "Rearview Mirror" by delving into the power of self-reflection. Using the metaphor of a rearview mirror, we highlight how examining our past actions can inform better...
Curated Video
Cracking WPA and WPA2 new 2
This video will explain the difference between two famous wireless protocols, and will show you a technique on cracking the passwords by deauthenticating users connected to a specific SSID
Curated Video
Dynamic Analysis
This video will explain Dynamic malware analysis in details, which is a runtime approach for analyzing malicious activities
Curated Video
Android Dynamic Malware Analysis
In this tutorial, you will learn how to perform dynamic malware analysis for an APK file using MobSF or Mobile Security Framework, which is a super handy tool for analyzing Android applications.
Curated Video
Wireshark D3 V1 - How is traffic captured
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 1: How is traffic captured
Curated Video
Hack Using a Rogue Access Point
In this tutorial, you will learn how to create a fake wireless access point and use it to hack the users logged on to it. We will use WiFi Pineapple device.
Curated Video
How Does Port Scanning Work
In this video, you will learn the two main techniques used in port scanning. We will be mainly using NMAP tool
Curated Video
Setup a Stealthy Command and Control Center Online
This video will teach you how to setup a command and control center over the internet to start you actual attacks
Curated Video
Wireshark D5 V7 - HTTP analysisTroubleshoot your network
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 7: Troubleshoot your network
Curated Video
SSL Interception
In this video, we will intercept SSL traffic by decrypting the SSL tunnel between an APK and a server
Curated Video
Bypass Firewalls by Tunneling Data and Commands over DNS new
This video will teach you how to setup a Command and Control center to bypass firewall rules and control the victim over DNS traffic, which in many cases is not suspicious to anyone monitoring a network traffic.
Curated Video
Wireshark D4 V5 - IPv6 Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 5: IPv6 deep-dive
Curated Video
How to Attack Modern Wireless Networks - Introduction
This video is a general overview on how to attack wireless networks
Curated Video
Wireshark D5 V3 - HTTP analysisDNS analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 3: DNS analysis
Curated Video
Wireshark D3 V4 - How is traffic capturedCapture Filters
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 4: Capture filters
Curated Video
Wireshark D3 V2 - How is traffic capturedSPAN Port
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 2: SPAN ports
Curated Video
Wireshark Simplified
In this video, you will learn about the famous packet capturing tool, Wireshark. The tutorial demonstrates the capabilities of the application on KALI, while inspecting traffic between the KALI machine and a cloud windows server. Use...
Curated Video
Wi-Fi Security
You will learn how to protect your home WiFi and be vigilant when you are using public Wifi
Curated Video
Insufficient Logging and Monitoring
Insufficient logging and monitoring is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
Hack WPA2 Wireless Networks
In this tutorial, you will learn how to crack into WPA and WPA2 wireless networks using various tools like aircrack-ng.
Curated Video
Execute Man-in-the-Middle Attacks
Learn how to execute MITM attacks using Ettercap tool, a very powerful application in Kali