Instructional Video3:16
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Sensitive Data in URLs

Higher Ed
This video talks about how to find sensitive data in URLs using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Instructional Video8:44
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Password Hashing with Bcrypt

Higher Ed
In this video, we will explore how to securely hash and store user passwords using Bcrypt.
Instructional Video7:40
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Security Policies

Higher Ed
NTFS permissions control files and folders, but there are plenty of other resources that need control. Security policies control factors such as login attempts, printer access, and password length/complexity. This clip is from the...
Instructional Video7:38
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Why Windows?

Higher Ed
In this video, we will look at why Microsoft Windows is so dominant on desktop systems. This clip is from the chapter "The Visible Computer" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section explains the common...
Instructional Video13:36
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Passwords and Authentication

Higher Ed
Password security can be compromised by many attack types, such as brute force, dictionary, and rainbow tables. This video explores options for creating very secure passwords and using multifactor authentication. This clip is from the...
Instructional Video6:21
Curated Video

Learning GitHub Actions for DevOps CI/CD - GitHub Actions Store Your Secrets and Passwords Securely

Higher Ed
This video demonstrates how GitHub Actions store your secrets and passwords securely. This clip is from the chapter "GitHub Actions: Exploring the Features" of the series "Learning GitHub Actions for DevOps CI/CD".This section focuses on...
Instructional Video5:36
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Mobile Security Troubleshooting

Higher Ed
A lot of symptoms point to potential attacks on a mobile device, such as connection loss, power drain, slow data speeds, high resource utilization, and unintended connections. Others point at attacks that have already happened, such as...
Instructional Video9:41
Curated Video

CISSP Crash Course - Managed Identification

Higher Ed
This video explains managed identification and authentication. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access management.
Instructional Video6:49
Curated Video

Oracle Database Administration from Zero to Hero - Introducing Oracle Database Architecture (Part 2 of 2)

Higher Ed
In this video, you will learn about the major Oracle database files, including their purpose, types, and locations. This clip is from the chapter "Database Architecture" of the series "Oracle Database Administration from Zero to Hero".In...
Instructional Video14:07
Curated Video

Oracle Database Administration from Zero to Hero - Using Password File Authentication

Higher Ed
In this video, you will learn about password file authentication. You will understand the concept, create a password file, set the REMOTE_LOGIN_PASSWORDFILE parameter, explore the relationship between OS authentication and password file...
Instructional Video9:32
Curated Video

Oracle Database Administration from Zero to Hero - Managing User Profiles (Part 2 of 2)

Higher Ed
In this video, we will continue our exploration of managing user profiles. You will learn how to enable password complexity verification functions, obtain information about user passwords and profiles, implement gradual password rollover...
Instructional Video15:25
Curated Video

Real-World DevOps Project From Start to Finish - Installing and Configuring MariaDB, Ansible Vault

Higher Ed
In this video, you will learn how to install and set up MariaDB on your server. You will explore the configuration options, including securing the database with user authentication and access control. Additionally, you will discover how...
Instructional Video1:23
Curated Video

PHISH: Practicing Good Email and Sign-in Hygiene

Pre-K - Higher Ed
Explore the daily routines that create a resilient barrier against cyber threats. This video covers best practices such as crafting strong and unique passwords, enabling two-factor authentication, and logging out when accounts are not in...
Instructional Video2:56
Curated Video

SkillSprints: Creating Secure Passwords

Pre-K - Higher Ed
In this video you will learn to create secure passwords that are difficult to guess or hack.
Instructional Video3:46
Vlogbrothers

They Hacked Me

6th - 11th
Thank you to Sherri Davidoff from LMG Security for helping me both with this video and also with recovering from my hack. If you're thinking "I won't get hacked, I'm not a public person like Hank," that does NOT protect you. Most hacks...
Instructional Video1:29
Curated Video

Password Tools and Tips

Higher Ed
General tips and tools for password generation and storage
Instructional Video5:03
Curated Video

LAB 2: Google Hacking

Higher Ed
I will show you the basics of Google hacking without any prior technical knowledge
Instructional Video5:43
Curated Video

No Password !! No Issue, You Can Still Hack

Higher Ed
No Password !! No Issue, You Can Still Hack
Instructional Video8:26
Curated Video

Takeover a Database Server

Higher Ed
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully. Use this technique ethically.
Instructional Video5:34
Curated Video

Hashing in a Nutshell

Higher Ed
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Instructional Video6:32
Curated Video

Pass the Hash with Mimikatz on Windows

Higher Ed
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Instructional Video1:57
Curated Video

Attack a Router Using Medusa

Higher Ed
In this video, you will learn how to run an online password attack on a router using Medusa on KALI. Use this ethically !!!
Instructional Video7:39
Curated Video

Intercept_ Analyze_ and Replay Web Traffic

Higher Ed
Learn how to leverage the powerful Burp suite in analyzing web traffic and crafting attacks
Instructional Video4:42
Curated Video

Password Spraying

Higher Ed
Learn how to spray passwords across many accounts. Password spraying is an attack that attempts to access a large number of accounts (usernames) with a few commonly used passwords. It is different from the traditional brute-force attacks...