Instructional Video5:44
Curated Video

CISSP Crash Course - Cryptanalytic Attacks

Higher Ed
This video explains cryptographic attacks and malware attacks such as Ransomware.
<
br/>
This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Instructional Video11:01
Curated Video

CISSP Crash Course - Cryptographic Solutions

Higher Ed
This video explains cryptographic systems—asymmetric encryption and RSA algorithm.
<
br/>
This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses...
Instructional Video3:55
Curated Video

The Complete Vue.js Course for Beginners - Teleport Components

Higher Ed
is a built-in component that allows us to "teleport" a part of a component's template into a DOM node that exists outside the DOM hierarchy of that component.
<
br/>
This clip is from the chapter "Advanced Concepts" of the series...
Instructional Video2:37
Curated Video

Automating Image Creation with HashiCorp Packer for DevOps - Installing Packer on Mac

Higher Ed
In this lab demonstration, you will learn to install Packer on MacOS. We will first establish the Homebrew package manager to install Packer on the MacOS machine.
<
br/>
This clip is from the chapter "Introduction to HashiCorp...
Instructional Video11:17
Curated Video

Automating Image Creation with HashiCorp Packer for DevOps - Hello, Packer!

Higher Ed
This overviews the entire HashiCorp suite of tools and describes products such as Terraform, Vault, Consul, Nomad, Waypoint, Boundary, Packer, and Vagrant. It then provides a detailed introduction to the features of Packer.
<
br/>...
Instructional Video8:21
Curated Video

Oracle Database Administration from Zero to Hero - Using OS Authentication (Part 2 of 2)

Higher Ed
In this video, we will continue our exploration of OS authentication. You will learn how to allow administrative OS authentication for OS users and create OS-authenticated normal users.
<
br/>
This clip is from the chapter "Managing...
Instructional Video13:33
Curated Video

Oracle Database Administration from Zero to Hero - Managing Local and Common Users

Higher Ed
In this video, we will explore the concepts of local and common users. You will understand the difference between these user types, learn how to create common and local users, grant privileges commonly and locally, and differentiate...
Instructional Video4:52
Curated Video

Automating Image Creation with HashiCorp Packer for DevOps - Hands-On Lab - Convert JSON to HCL

Higher Ed
This video provides a hands-on lab covering converting a Packer template from JSON to HCL format. The lab covers how to use the Packer init command to convert the template and how to modify the resulting HCL file to update the...
Instructional Video6:47
Curated Video

Can Blockchain Improve Machine Learning Privacy?

Higher Ed
This probably sounds like a clickbait title but I promise it isn't.
Instructional Video2:08
Curated Video

History of the Hashtag

9th - Higher Ed
Everyday, millions of people around the world use hashtags to sift through the Internet’s endless content – but where did this ubiquitous symbol actually come from?
Instructional Video4:19
Curated Video

Crack Passwords with Rainbow Tables

Higher Ed
This video will explain the concept of Rainbow tables, and how you can use them to expedite password cracking time
Instructional Video4:37
Curated Video

Acquire Malicious Apps1

Higher Ed
This video will describe the methods of acquiring malicious Android applications over the internet. There are few publicly available sites in addition to Github links that will be shared.
Instructional Video5:58
Curated Video

Offline Password Attack on Windows

Higher Ed
In this video, you will learn how to extract the password hashes on a windows machine, then crack the hashes on KALI using John the Ripper. <br<br/>/>

Use this ethically !!!
Instructional Video5:54
Curated Video

Execute an Offline Password Attack on Windows

Higher Ed
Learn how to plan an execute an offline password attack on Windows using John The Ripper tool
Instructional Video5:43
Curated Video

No Password !! No Issue, You Can Still Hack

Higher Ed
No Password !! No Issue, You Can Still Hack
Instructional Video5:34
Curated Video

Hashing in a Nutshell

Higher Ed
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Instructional Video3:35
Curated Video

Various Password Attacks

Higher Ed
This video will show you the various techniques used in hacking passowrds
Instructional Video6:16
Curated Video

Execute an Offline Password Attack in Linux

Higher Ed
Learn how to plan an execute an offline password attack on Linux using the HashCat powerful tool
Instructional Video6:32
Curated Video

Pass the Hash with Mimikatz on Windows

Higher Ed
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Instructional Video6:29
Curated Video

Offline Password Attack on Linux

Higher Ed
In this video, you will learn how to extract and identify password hashes on a Linux machine. Use the powerful Hashcat tool to crack those hashes.
Instructional Video3:00
Curated Video

LAB 1: How to Compare Hashes

Higher Ed
I will show you how you can download a file and make sure its the original file by comparing the hashes
Instructional Video8:43
Curated Video

Spark Programming in Python for Beginners with Apache Spark 3 - Working with Spark SQL Tables

Higher Ed
In this demo video, you will learn how to work with Spark SQL tables.
<
br/>
This clip is from the chapter "Spark Data Sources and Sinks" of the series "Spark Programming in Python for Beginners with Apache Spark 3".In this section,...
Instructional Video3:55
Packt

Use different data types : Exploring Python Data Types

Higher Ed
From the section: NumPy Fundamentals in Python. Every programming language is different. You will cover fundamentals in order to get familiar with the Python environment needed for NumPy. You will learn to work with numbers, lists,...
Instructional Video12:14
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Digital Forensics

Higher Ed
The application of computer science to legal situations include evidence gathering is referred to as digital forensics. This episode covers e-discovery and steganography.
r/>
This clip is from the chapter "Dealing with...