Hi, what do you want to do?
Curated Video
CISSP Crash Course - Cryptanalytic Attacks
This video explains cryptographic attacks and malware attacks such as Ransomware.
<
br/>
This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
<
br/>
This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Curated Video
CISSP Crash Course - Cryptographic Solutions
This video explains cryptographic systems—asymmetric encryption and RSA algorithm.
<
br/>
This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses...
<
br/>
This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses...
Curated Video
The Complete Vue.js Course for Beginners - Teleport Components
is a built-in component that allows us to "teleport" a part of a component's template into a DOM node that exists outside the DOM hierarchy of that component.
<
br/>
This clip is from the chapter "Advanced Concepts" of the series...
<
br/>
This clip is from the chapter "Advanced Concepts" of the series...
Curated Video
Automating Image Creation with HashiCorp Packer for DevOps - Installing Packer on Mac
In this lab demonstration, you will learn to install Packer on MacOS. We will first establish the Homebrew package manager to install Packer on the MacOS machine.
<
br/>
This clip is from the chapter "Introduction to HashiCorp...
<
br/>
This clip is from the chapter "Introduction to HashiCorp...
Curated Video
Automating Image Creation with HashiCorp Packer for DevOps - Hello, Packer!
This overviews the entire HashiCorp suite of tools and describes products such as Terraform, Vault, Consul, Nomad, Waypoint, Boundary, Packer, and Vagrant. It then provides a detailed introduction to the features of Packer.
<
br/>...
<
br/>...
Curated Video
Oracle Database Administration from Zero to Hero - Using OS Authentication (Part 2 of 2)
In this video, we will continue our exploration of OS authentication. You will learn how to allow administrative OS authentication for OS users and create OS-authenticated normal users.
<
br/>
This clip is from the chapter "Managing...
<
br/>
This clip is from the chapter "Managing...
Curated Video
Oracle Database Administration from Zero to Hero - Managing Local and Common Users
In this video, we will explore the concepts of local and common users. You will understand the difference between these user types, learn how to create common and local users, grant privileges commonly and locally, and differentiate...
Curated Video
Automating Image Creation with HashiCorp Packer for DevOps - Hands-On Lab - Convert JSON to HCL
This video provides a hands-on lab covering converting a Packer template from JSON to HCL format. The lab covers how to use the Packer init command to convert the template and how to modify the resulting HCL file to update the...
Curated Video
Can Blockchain Improve Machine Learning Privacy?
This probably sounds like a clickbait title but I promise it isn't.
Curated Video
History of the Hashtag
Everyday, millions of people around the world use hashtags to sift through the Internet’s endless content – but where did this ubiquitous symbol actually come from?
Curated Video
Crack Passwords with Rainbow Tables
This video will explain the concept of Rainbow tables, and how you can use them to expedite password cracking time
Curated Video
Acquire Malicious Apps1
This video will describe the methods of acquiring malicious Android applications over the internet. There are few publicly available sites in addition to Github links that will be shared.
Curated Video
Offline Password Attack on Windows
In this video, you will learn how to extract the password hashes on a windows machine, then crack the hashes on KALI using John the Ripper.
<br<br/>/>
Use this ethically !!!
Use this ethically !!!
Curated Video
Execute an Offline Password Attack on Windows
Learn how to plan an execute an offline password attack on Windows using John The Ripper tool
Curated Video
No Password !! No Issue, You Can Still Hack
No Password !! No Issue, You Can Still Hack
Curated Video
Hashing in a Nutshell
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Curated Video
Various Password Attacks
This video will show you the various techniques used in hacking passowrds
Curated Video
Execute an Offline Password Attack in Linux
Learn how to plan an execute an offline password attack on Linux using the HashCat powerful tool
Curated Video
Pass the Hash with Mimikatz on Windows
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Curated Video
Offline Password Attack on Linux
In this video, you will learn how to extract and identify password hashes on a Linux machine. Use the powerful Hashcat tool to crack those hashes.
Curated Video
LAB 1: How to Compare Hashes
I will show you how you can download a file and make sure its the original file by comparing the hashes
Curated Video
Spark Programming in Python for Beginners with Apache Spark 3 - Working with Spark SQL Tables
In this demo video, you will learn how to work with Spark SQL tables.
<
br/>
This clip is from the chapter "Spark Data Sources and Sinks" of the series "Spark Programming in Python for Beginners with Apache Spark 3".In this section,...
<
br/>
This clip is from the chapter "Spark Data Sources and Sinks" of the series "Spark Programming in Python for Beginners with Apache Spark 3".In this section,...
Packt
Use different data types : Exploring Python Data Types
From the section: NumPy Fundamentals in Python. Every programming language is different. You will cover fundamentals in order to get familiar with the Python environment needed for NumPy. You will learn to work with numbers, lists,...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Digital Forensics
The application of computer science to legal situations include evidence gathering is referred to as digital forensics. This episode covers e-discovery and steganography.
r/>
This clip is from the chapter "Dealing with...
r/>
This clip is from the chapter "Dealing with...