Instructional Video10:09
Curated Video

Python for Network Forensics 3.3: Deeper File Properties

Higher Ed
In this video, we will explore other important properties of file that will allow you to decipher a known bad or malicious actor. • Learn how a digest algorithm works with a file • Develop a Python application to hash a file • Alter our...
Instructional Video5:54
IDG TECHtalk

How to and why you should disable LLMNR with Windows Server

Higher Ed
Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.
Instructional Video6:21
Curated Video

Bash Shell Scripting- Writing Comments for a Shell Script

Higher Ed
This video shows how to write comments for a shell script.<br/<br/>>

This clip is from the chapter "Basics of shell scripting" of the series "Complete Bash Shell Scripting".This section covers the basics of shell scripting.
Instructional Video16:52
Packt

Practice Exercises with XPath and Cascading Style Sheets (CSS) with Regular Expressions

Higher Ed
This video contains practice exercises with XPath and CSS with regular expressions.
<
br/>
This clip is from the chapter "Locator Techniques and Tools used to Identify Objects" of the series "Selenium WebDriver with Java - Basics to...
Instructional Video5:43
Curated Video

Learn and Master C Programming - Understanding Conditional Compilation

Higher Ed
We will learn about new preprocessor directives used for conditional compilation of code.
r/>
This clip is from the chapter "Preprocessor Directives" of the series "Learn and Master C Programming For Absolute Beginners!".In...
Instructional Video3:52
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - What is the Hash Function?

Higher Ed
This video explains the hash function.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to initialize a new Git...
Instructional Video8:33
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Attacks on our cryptography

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Attacks on our cryptography.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
Instructional Video2:20
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - Number of Folders Created for Objects

Higher Ed
This video explains the number of folders that can be created for objects. This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...
Instructional Video3:51
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - Git Read-tree

Higher Ed
This video sheds light on the Git read-tree.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to initialize a...
Instructional Video9:00
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - IP Security (IPsec)

Higher Ed
The IPsec network security protocol suite can be used to secure any type of network traffic through integrity, authentication and encryption. Many VPNs use IPsec to establish an encrypted network tunnel.
r/>
This clip is from...
Instructional Video5:40
Curated Video

Describe network protocols : The Course Overview

Higher Ed
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP.<b<br/>r/>

This video will give you an overview about the course.
Instructional Video3:57
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - JSON Versus Git Database

Higher Ed
This video illustrates the difference between JSON and the Git database.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section...
Instructional Video5:24
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - Exploring Git Objects with the git cat-file Command

Higher Ed
This video explores some Git objects with the git cat-file command.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains...
Instructional Video2:42
Curated Video

Complete Modern C++ - std::hash (C++11)

Higher Ed
This video demonstrates how to write a custom hash function and equality function object for unordered containers.
r/>
This clip is from the chapter "Standard Template Library" of the series "Complete Modern C++".This section...
Instructional Video7:59
Curated Video

Python 3: Project-based Python, Algorithms, Data Structures - Project: Job Scheduler execution flow

Higher Ed
Visualization of how a hashmap works to achieve O(1) complexity/performance
r/>
This clip is from the chapter "Algorithms - Search and abstract data structures" of the series "Python 3: Project-based Python, Algorithms, Data...
Instructional Video10:15
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - Contents of Git Objects

Higher Ed
This video explains the various contents of Git objects.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...
Instructional Video5:30
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - Git Versus GitHub

Higher Ed
This video illustrates the difference between Git and GitHub.
r/>
This clip is from the chapter "Introduction to Git and GitHub" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section provides an...
Instructional Video6:45
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - Writing a New Git Object with a git hash-object

Higher Ed
This video illustrates how to write a new Git object with a git hash-object.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section...
Instructional Video18:17
Packt

Generating Customized Cascading Style Sheets (CSS) from HTML Attributes

Higher Ed
This video explains how to generate a customized CSS from HTML attributes.
<
br/>
This clip is from the chapter "Locator Techniques and Tools used to Identify Objects" of the series "Selenium WebDriver with Java - Basics to Advanced...
Instructional Video6:33
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Hashing

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Hashing.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Instructional Video4:21
IDG TECHtalk

Guide to key Windows 10 event logs you need to monitor

Higher Ed
These are the event logs that will help you identify malicious activity on your network.
Instructional Video7:41
Curated Video

Core Java Programming Course- Hash Map

Higher Ed
This video explains the Hash map.<br/<br/>>

This clip is from the chapter "Sets and Maps" of the series "Learn How to Code: The Complete Core Java Programming Course".This section explains the various sets and maps available in Java.
Instructional Video1:57
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - What Have We Learned so Far?

Higher Ed
This video provides an overview of the contents we have learned so far in this section.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and...
Instructional Video5:25
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Accounting

Higher Ed
The 3 As—authentication, authorization, and accounting/auditing—play a big role in IT security. Tracking activity through auditing provides accountability for access to resources such as files on a file server or database rows.
r/> ...