Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Sensitive Data in URLs
This video talks about how to find sensitive data in URLs using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Password Hashing with Bcrypt
In this video, we will explore how to securely hash and store user passwords using Bcrypt.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Security Policies
NTFS permissions control files and folders, but there are plenty of other resources that need control. Security policies control factors such as login attempts, printer access, and password length/complexity. This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Why Windows?
In this video, we will look at why Microsoft Windows is so dominant on desktop systems. This clip is from the chapter "The Visible Computer" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section explains the common...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Passwords and Authentication
Password security can be compromised by many attack types, such as brute force, dictionary, and rainbow tables. This video explores options for creating very secure passwords and using multifactor authentication. This clip is from the...
Curated Video
Learning GitHub Actions for DevOps CI/CD - GitHub Actions Store Your Secrets and Passwords Securely
This video demonstrates how GitHub Actions store your secrets and passwords securely. This clip is from the chapter "GitHub Actions: Exploring the Features" of the series "Learning GitHub Actions for DevOps CI/CD".This section focuses on...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Mobile Security Troubleshooting
A lot of symptoms point to potential attacks on a mobile device, such as connection loss, power drain, slow data speeds, high resource utilization, and unintended connections. Others point at attacks that have already happened, such as...
Curated Video
CISSP Crash Course - Managed Identification
This video explains managed identification and authentication. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access management.
Curated Video
Oracle Database Administration from Zero to Hero - Introducing Oracle Database Architecture (Part 2 of 2)
In this video, you will learn about the major Oracle database files, including their purpose, types, and locations. This clip is from the chapter "Database Architecture" of the series "Oracle Database Administration from Zero to Hero".In...
Curated Video
Oracle Database Administration from Zero to Hero - Using Password File Authentication
In this video, you will learn about password file authentication. You will understand the concept, create a password file, set the REMOTE_LOGIN_PASSWORDFILE parameter, explore the relationship between OS authentication and password file...
Curated Video
Oracle Database Administration from Zero to Hero - Managing User Profiles (Part 2 of 2)
In this video, we will continue our exploration of managing user profiles. You will learn how to enable password complexity verification functions, obtain information about user passwords and profiles, implement gradual password rollover...
Curated Video
Real-World DevOps Project From Start to Finish - Installing and Configuring MariaDB, Ansible Vault
In this video, you will learn how to install and set up MariaDB on your server. You will explore the configuration options, including securing the database with user authentication and access control. Additionally, you will discover how...
Curated Video
PHISH: Practicing Good Email and Sign-in Hygiene
Explore the daily routines that create a resilient barrier against cyber threats. This video covers best practices such as crafting strong and unique passwords, enabling two-factor authentication, and logging out when accounts are not in...
Curated Video
SkillSprints: Creating Secure Passwords
In this video you will learn to create secure passwords that are difficult to guess or hack.
Vlogbrothers
They Hacked Me
Thank you to Sherri Davidoff from LMG Security for helping me both with this video and also with recovering from my hack. If you're thinking "I won't get hacked, I'm not a public person like Hank," that does NOT protect you. Most hacks...
Curated Video
LAB 2: Google Hacking
I will show you the basics of Google hacking without any prior technical knowledge
Curated Video
No Password !! No Issue, You Can Still Hack
No Password !! No Issue, You Can Still Hack
Curated Video
Takeover a Database Server
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully. Use this technique ethically.
Curated Video
Hashing in a Nutshell
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Curated Video
Pass the Hash with Mimikatz on Windows
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Curated Video
Attack a Router Using Medusa
In this video, you will learn how to run an online password attack on a router using Medusa on KALI. Use this ethically !!!
Curated Video
Intercept_ Analyze_ and Replay Web Traffic
Learn how to leverage the powerful Burp suite in analyzing web traffic and crafting attacks
Curated Video
Password Spraying
Learn how to spray passwords across many accounts. Password spraying is an attack that attempts to access a large number of accounts (usernames) with a few commonly used passwords. It is different from the traditional brute-force attacks...