Instructional Video6:58
Curated Video

Mobile Malware Types

Higher Ed
In this video, we will explain the various types of mobile malway such as RAT, trojans, spyware, etc..
Instructional Video2:01
Curated Video

Master KALI Desktop Environment

Higher Ed
Before crafting attacks, get familiar with the desktop environment of Kali linux
Instructional Video4:37
Curated Video

Acquire Malicious Apps1

Higher Ed
This video will describe the methods of acquiring malicious Android applications over the internet. There are few publicly available sites in addition to Github links that will be shared.
Instructional Video1:46
Curated Video

Android Security Features

Higher Ed
This video will highlight the various security features oferred by Android
Instructional Video0:38
Curated Video

Managed Services

Higher Ed
An MSSP (managed security service provider) offers outsourced management and monitoring of security systems and equipment. Managed firewall, intrusion detection, virtual private network, vulnerability screening, and anti-viral services...
Instructional Video4:10
Curated Video

SSL Interception

Higher Ed
In this video, we will intercept SSL traffic by decrypting the SSL tunnel between an APK and a server
Instructional Video7:11
Curated Video

How to Attack Modern Wireless Networks - Introduction

Higher Ed
This video is a general overview on how to attack wireless networks
Instructional Video1:51
Curated Video

Setup Your Lab in Kali

Higher Ed
In this video, you will learn how to install the necessary tools to setup your safe lab for malware analysis
Instructional Video2:33
Curated Video

Metasploitable VM

Higher Ed
Metasploitable MV is an intentionaly vulnerable machine by Rapid7, it is made for learning purposes. We will learn how to setup this virtual machine to exploit it in many of the videos in this course
Instructional Video3:56
Curated Video

Wi-Fi Security

Higher Ed
You will learn how to protect your home WiFi and be vigilant when you are using public Wifi
Instructional Video2:05
Curated Video

How to Protect Your Smartphone

Higher Ed
This video will provide you with the needful tips on how to protect your smartphone from security breaches
Instructional Video1:41
Curated Video

Why KALI

Higher Ed
Kali is a powerful pentest box, in this video we will explain the reasons behind its fame
Instructional Video5:15
Curated Video

Read and Write NFC Tags

Higher Ed
In this video you will learn how to read and write data to an NFC card or tag
Instructional Video4:55
Curated Video

Introduction to Cloud Computing - What is SAAS , PAAS, and IAAS

Higher Ed
This video explains SAAS, PAAS, and IAAS. This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
Instructional Video15:02
Curated Video

01 What is Power Electronics

Higher Ed
Power Electronics course - Walid Issa
Instructional Video4:52
Curated Video

Introduction to Cloud Computing - The Definition of Cloud Computing

Higher Ed
This video explains the definition of cloud computing. This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
Instructional Video5:43
Curated Video

Linux Fundamentals - Environment Variables

Higher Ed
This video explores environment variables. This clip is from the chapter "Environment Variables in Linux" of the series "Linux Fundamentals".This section explains the environment variables and explains how to find solutions with the help...
Instructional Video4:58
Curated Video

Structural Design Patterns in Modern C++ - Introduction to Design Patterns

Higher Ed
This video presents an introduction to design patterns. This clip is from the chapter "Introduction" of the series "Structural Design Patterns in Modern C++".This section introduces you to design patterns and Unified Modeling Language...
Instructional Video5:59
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - Kinesis Data Streams Overview

Higher Ed
This video provides an overview of Amazon Kinesis data streams. This clip is from the chapter "Domain 1: Collection" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn to build up a...
Instructional Video13:58
Curated Video

Introduction to Cloud Computing - Footprints of Amazon Web Services

Higher Ed
This video explains the footprints of Amazon Web Services. This clip is from the chapter "Let's learn AWS" of the series "Introduction to Cloud Computing".This section introduces you to AWS.
Instructional Video4:03
Curated Video

MongoDB Mastering MongoDB for Beginners (Theory and Projects) - Applications of MongoDB

Higher Ed
In this video, we will explore different applications of MongoDB. This clip is from the chapter "Introduction" of the series "MongoDB—Mastering MongoDB for Beginners (Theory and Projects)".In this section, we will look at the course...
Instructional Video4:49
Curated Video

Ultimate ASP.NET 5 Web API Development Guide - CORS Configuration

Higher Ed
This video shows configuring CORS (Cross-Origin Resource Sharing). This clip is from the chapter "Project Setup and Configuration" of the series "Ultimate ASP.NET Core Web API Development Guide".This section focuses on the project setup...
Instructional Video5:12
Curated Video

Spark Programming in Python for Beginners with Apache Spark 3 - Introduction to Spark APIs

Higher Ed
In this video, we will cover an introduction to Spark APIs. This clip is from the chapter "Spark Structured API Foundation" of the series "Spark Programming in Python for Beginners with Apache Spark 3".In this section, you will learn...
Instructional Video3:27
Curated Video

Scala & Spark-Master Big Data with Scala and Spark - Scala Applications

Higher Ed
Explore the applications of Scala in this session. This clip is from the chapter "Introduction" of the series "Scala & Spark-Master Big Data with Scala and Spark".Welcome to the course.