Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - AWS Control Tower
This video will explore the features and benefits of using AWS Control Tower to manage multiple AWS accounts.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - AWS Cost Explorer
AWS Cost Explorer gives granular detail about your spending in AWS, so there's no more surprises when your month-end bill comes in.
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 1 (Part1)
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Curated Video
ChatGPT and DALL-E: Sell Your Creative Thinking with AI - How to Address AI Bias in Creative Work
In this video, we will explore some ways to address bias in creative work that involves AI systems. We will discuss the importance of being aware of bias and provide some tips on how to mitigate bias in your AI-generated content. This...
Curated Video
ChatGPT and DALL-E: Sell Your Creative Thinking with AI - Limitation 2: Output Is Not Reliably Accurate
In this video, we will examine the limitation that generative AI output is not always accurate or reliable. This clip is from the chapter "When (And When Not) to Use AI" of the series "ChatGPT and DALL-E: Sell Your Creative Thinking with...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 1
This is the first of the two-part video that demonstrates the actual attack where you would take control of the account with the help of Clickjacking. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through Polyglot File
This video explains bypassing CSP through polyglot file. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 2
This is the second of the two-part video that demonstrates how to be prevented from the account takeover through Clickjacking. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 1 (Part1)
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how the hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - User Redirection through window.opener Tabnabbing – Part 1
This is the first of the two-part video that talks about how to attack through link. You will work on the user redirection through window.opener tabnabbing. This clip is from the chapter "Hacking Web Applications through PDFs, Images,...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Token Hijacking through PDF – Part 2
This is the second of the two-part video that demonstrates token hijacking through PDF. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Token Hijacking through PDF – Part 1
This is the first of the two-part video that demonstrates token hijacking through PDF. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through AngularJS
This video explains and demonstrates the bypassing of CSP through AngularJS. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation...
Curated Video
ChatGPT for Creatives - Creating Settings and Monsters
In this video, you will learn about creating settings and monsters for our manga and comics. We will discuss various techniques and tips for creating unique and interesting settings that will enhance the story's mood and themes. We will...
Great Big Story
From prank to practice, the unexpected journey of Liquid Ass
Explore the quirky story of Liquid Ass, a prank fart spray that found an unexpected role in military medical training, helping prepare troops for real-world conditions.
Curated Video
Deep Learning - Artificial Neural Networks with Tensorflow - Stochastic Gradient Descent
In this video, you will learn about stochastic gradient descent. This clip is from the chapter "In-Depth: Gradient Descent" of the series "Deep Learning - Artificial Neural Networks with TensorFlow".In this optional section, we will dive...
Curated Video
Deep Learning - Artificial Neural Networks with Tensorflow - Activation Functions
In this video, you will learn about activation functions. This clip is from the chapter "Feedforward Artificial Neural Networks" of the series "Deep Learning - Artificial Neural Networks with TensorFlow".In this section, we will cover...
Curated Video
Deep Learning - Artificial Neural Networks with Tensorflow - Code Preparation (Classification Theory)
In this video, we will take a crash course in linear classification for TensorFlow 2.0. This clip is from the chapter "Machine Learning and Neurons" of the series "Deep Learning - Artificial Neural Networks with TensorFlow".In this...
Curated Video
Limitless: The Evolution and Future of Athletic Records
Dive into the world of athletic records and the ongoing quest to push human limits in sports like pole vaulting, swimming, and sprinting. Explore how athletes like Renaud Lavillenie and Frédérick Bousquet have shattered expectations and...
Curated Video
Young Prodigies: The Making of Tomorrow's Champions
Explore the rigorous worlds of budding young athletes in sports like synchronized swimming and tennis at INSEP, France's premier training facility for elite sports. Discover how young prodigies like Juliette and Rayane are shaped by a...
Curated Video
Chilled to the Bone: Nicolas Vanier's Mastery of the Extreme Cold
Dive into the frigid world of Nicolas Vanier as he trains on the Vercors plateau, preparing for the grueling conditions of the Siberian winter. This feature explores how Nicolas and his sled dogs adapt to severe cold, focusing on...
Curated Video
Deep Learning - Convolutional Neural Networks with TensorFlow - Transfer Learning Code (Part 1)
In this video, we will dive into action and look at codes for transfer learning with data augmentation. This clip is from the chapter "Transfer Learning for Computer Vision" of the series "Deep Learning - Convolutional Neural Networks...
Curated Video
Deep Learning - Convolutional Neural Networks with TensorFlow - Transfer Learning Theory
In this video, we will get introduced to the concept of transfer learning. This clip is from the chapter "Transfer Learning for Computer Vision" of the series "Deep Learning - Convolutional Neural Networks with TensorFlow".In this...
Curated Video
Deep Learning - Convolutional Neural Networks with TensorFlow - 2 Approaches to Transfer Learning
In this video, we will discuss the two approaches used for transfer learning, which we will use in the next videos. This clip is from the chapter "Transfer Learning for Computer Vision" of the series "Deep Learning - Convolutional Neural...