Curated Video
Web API Development with Flask (Video 21)
Whether working in the enterprise, building for web or mobile, you will need to build (if you haven't already) RESTful APIs to serve data between different client applications and endpoints. This course delivers the fundamental knowledge...
The Wall Street Journal
The Hot Seat
Cybersecurity incidents demand quick thinking and decisive responses. In this exercise scenario, a fictional company is faced with some tough choices when their security is compromised.
IDG TECHtalk
Minimum vs. best Windows network security practices
Before you worry about implementing the “best” security practices, make sure you’re doing these minimum practices.
IDG TECHtalk
How to better manage your domain passwords
Follow this advice to help prevent domain password compromise or lateral movement should your password be compromised.
IDG TECHtalk
How to set up multi-factor authentication in Microsoft Office 365
Follow these steps to enable multi-factor authentication in Office 365 for more secure log-ins.
Curated Video
Bug Bounty Program Certification 6.5: Gather Machine User Login Credentials
In this video, you will gather information about Windows and Kali Linux password files. • Learn about Kali Linux shadow file • Use john the Ripper to crack password file • Gather information about Windows SAM file
Curated Video
Learning Python Web Penetration Testing (Video 18)
With the huge growth in the number of web applications in the recent times, there has also been an upsurge in the need to make these applications secure. Web penetration testing is the use of tools and code to attack a website or web app...
IDG TECHtalk
7 dumb ways to be a ransomware victim, and how to avoid the embarrassment
Ransomware perpetrators count on Windows security admins to make these common mistakes. Here’s how to find and fix them.
Seven Dimensions
Social Media Safety: Protecting Your Personal Information
In this video, the speaker highlights the dangers of oversharing personal information on social media and the potential risks it poses, particularly for vulnerable individuals.
IDG TECHtalk
How an attacker can target phishing attacks
There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you can...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - WPA2 Cracking Lab
Wi-Fi Protected Access (WPA) protects Wi-Fi network communications. This episode demonstrates how there are ways to crack a WPA2 using offline attack methods. This clip is from the chapter "Securing Wireless LANs" of the series "CompTIA...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Hashing
CISSP Domain 3: System Architecture and Engineering: Hashing. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering Video...
Curated Video
AZ-204 Developing for Microsoft Azure Exam Prep - Introduction to Azure Active Directory (AD)
This video provides an introduction to Azure AD. This clip is from the chapter "AZ-204 Azure Authentication" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section focuses on AZ-204 Azure authentication.
IDG TECHtalk
How to better control access to your Windows network
Take stock of how people and devices access your network and block potential avenues of attack.
Curated Video
Django3- Error Handling
In this video, we will look at error handling. This clip is from the chapter "Site 3 - Todo Woo" of the series "Django 3 - Full Stack Websites with Python Web Development".In this section, we will be working on our project site 3 - Todo...
IDG TECHtalk
Eliminate compromised and weak passwords
A single compromised password allowed attackers access to Colonial Pipeline’s network. Chaos ensued. This advice will help you avoid that fate.
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Broken authentication and session management
Credentials Management: Broken authentication and session management This clip is from the chapter "Credentials Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, very common source of...
Curated Video
Learning Python Web Penetration Testing (Video 19)
With the huge growth in the number of web applications in the recent times, there has also been an upsurge in the need to make these applications secure. Web penetration testing is the use of tools and code to attack a website or web app...
IDG TECHtalk
Building a toy social network with Python, Part 3: Logins and user tokens
In Part 3 of this ongoing series, we create the components needed to allow users to log in and be identified by the system, and show how to save passwords in the system by one-way hashing them, not storing them as insecure plaintext.
IDG TECHtalk
How to disable basic or legacy authentication to set up MFA in Office 365
Microsoft recommends setting up multi-factor authentication in Windows 10 for better security, but you have to disable basic or legacy authentication first.
Packt
CompTIA Network+ Certification N10-007: The Total Course - Authenticating, Authorizing, and Accounting (AAA)
This video explains how RADIUS and TACACS+ protocol is used to provide network AAA. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA Network+ Certification N10-007:...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Access Control "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)"
This video dives into access control lists, describing the three levels of control commonly used in computing. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - SQL Basics
In this video, you'll learn the basics of SQL needed for SQL injection. This clip is from the chapter "Web Application Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
Curated Video
Mastering MEAN Web Development Expert Full Stack JavaScript (Video 21)
Web development is moving fast and to keep up to mark, you need a technology stack that is . The MEAN stack includes MongoDb, Express, Angular, and Node.js. These tools provide a rich environment to build advanced web applications in a...