Instructional Video10:11
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-How Hackers Find SQL Injections in Minutes with Sqlmap

Higher Ed
This video provides an overview of the section. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on how...
Instructional Video1:55
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-Web Hacker's Toolbox: Tools Used by Successful Hackers

Higher Ed
This clip is from the chapter "Introduction to the Course" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section provides an introduction to the course.
Instructional Video11:21
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Using ImagePicker in Create Tweet

Higher Ed
In this video, we will be using the ImagePicker to enable users to select and upload images along with their tweets in the full stack Twitter Clone app.
Instructional Video12:54
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Create TweetView

Higher Ed
In this video, we will walk through the process of creating a custom TweetView for a mobile app.
Instructional Video10:30
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Subdomain Takeover – Part 1

Higher Ed
This is the first of the two-part video that demonstrates the subdomain takeover by attacking the subdomain. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert Full-Stack...
Instructional Video1:18
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Full-Stack Attacks on Modern Web Applications

Higher Ed
This video introduces the section. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".null
Instructional Video11:29
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 1 (Part1)

Higher Ed
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how the hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Instructional Video3:36
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Hacking AngularJS Applications

Higher Ed
This video introduces the section. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS applications.
Instructional Video3:17
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - User Redirection through window.opener Tabnabbing – Part 2

Higher Ed
This is the second of the two-part video that talks about how to prevent from this attack. This attack is user redirection through window.opener tabnabbing. This clip is from the chapter "Hacking Web Applications through PDFs, Images,...
Instructional Video10:18
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Token Hijacking through PDF – Part 1

Higher Ed
This is the first of the two-part video that demonstrates token hijacking through PDF. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation...
Instructional Video1:31
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Hacking Web Applications via PDFs, Images, and Links

Higher Ed
This video introduces the section. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking web...
Instructional Video1:50
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Bypassing Content Security Policy in Modern Web Applications

Higher Ed
This video introduces the section. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on bypassing Content...
Instructional Video9:23
Curated Video

Precision in Motion: Mastering the Safety and Timeliness of French Trains and Planes

6th - Higher Ed
Explore the intricate systems that ensure the punctuality and safety of millions of daily train and plane passengers in France. This video takes you behind the scenes at major transportation hubs to uncover how cutting-edge technology...
Instructional Video7:21
Curated Video

The Science of Online Advertising: How Your Preferences Are Tracked

6th - Higher Ed
Discover how online advertising is tailored to individual preferences through sophisticated tracking technologies. Learn about the use of cookies, which gather data about your browsing habits to serve targeted ads. Explore the...
Instructional Video6:19
Curated Video

Quick JavaScript Crash Course - Modern and Advanced JavaScript - Rest Parameters

Higher Ed
This video explains the rest parameters. This clip is from the chapter "Function and Arguments" of the series "Quick JavaScript Crash Course - Modern and Advanced JavaScript".This section explains functions and arguments, which is a...
Instructional Video5:11
Curated Video

SQL Server Course for Beginners with 100+ examples - Drop a Table in SQL

Higher Ed
Learn how to drop a table in SQL. Dropping will delete all the records of the table. It will also obliterate the existence of the table. This clip is from the chapter "Advanced SQL" of the series "SQL Server Course for Beginners with...
Instructional Video5:20
Curated Video

Behavioral Design Patterns in C++ - DataList - I

Higher Ed
This video starts with another example that will be used to understand how macro commands can be implemented. This clip is from the chapter "Command" of the series "Behavioral Design Patterns in C++".In this section, we will explore the...
Instructional Video4:24
Curated Video

Behavioral Design Patterns in C++ - TextPad - IV

Higher Ed
In this video, we will implement the menu class for handling user input. This clip is from the chapter "Command" of the series "Behavioral Design Patterns in C++".In this section, we will explore the command design pattern, which...
Instructional Video1:49
Great Big Story

Poetic pilgrimage, bridging hip hop and Islam

12th - Higher Ed
Explore the impact of Poetic Pilgrimage, a duo challenging stereotypes and uniting the worlds of hip hop and Islam through their powerful spoken word.
Instructional Video11:23
Curated Video

Learn Tableau by Working on Exciting Dashboards - Dimension, Measures, Aggregation, Granularity

Higher Ed
This video explains the difference between dimension, measures, aggregation, and granularity.
Instructional Video5:12
Curated Video

Learn Tableau by Working on Exciting Dashboards - Fixed LOD

Higher Ed
This video explains what the fixed level of detailed expressions are by connecting to the sample retailer data.
Instructional Video10:13
Curated Video

Learn Tableau by Working on Exciting Dashboards - Level of Detail - Introduction

Higher Ed
This video explains the level of detail expressions and how to compute them.
Instructional Video5:06
Curated Video

Learn Tableau by Working on Exciting Dashboards - Tableau Generated Fields

Higher Ed
This video explains Tableau generated fields and how we can use them.
Instructional Video4:11
Healthcare Triage

How Can a Tick Bite Make You Allergic to Red Meat?

Higher Ed
Can you really become allergic to red meat? Yes. Alpha-gal is a sugar molecule found in many mammals, including pigs, cattle, and lamb. And yes, it is possible for the human immune system to become reactive to alpha-gal, and growing...