Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Identify Legit Apps
In this video, the author shares a few tips on how to successfully navigate Google Play Store and download the right kind of application to help you identify legit apps and spot the fake apps out there. This clip is from the chapter...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - IOS
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Mobile Security" of the series "The Absolute Beginners Guide to...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - Android
This video talks about the kinds of permissions the applications have on an Android device. We will look at app permissions such as Instagram, Rebtel, and introduce to you an app to manage the permissions quickly and effectively. This...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Facebook Account
In this video, you will discover effective strategies to enhance the security of your Facebook account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Social Media Ethics - Part 2
This video further continues to talk about social media ethics when it comes to social media sites like Facebook. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Creating New Accounts and Logging In (DO NOT DO THIS)
In this video, you will learn to create a new account and log in to Reddit. This clip is from the chapter "Internet and Browsing Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section delves...
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Federated Directory Services
Active Directory Federation Services (ADFS) allows you to pass-through the authentication of a local AD logon to access AWS resources. This video explores the concept.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Cognito
What can you do if you want to integrate a local Active Directory or another identity management system with AWS? The answer is found in Cognito, an AWS solution for user identity and data synchronization or single sign-on (SSO).
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Additional Security Services
This video explains the basics of Cognito, GuardDuty, and Macie as it relates to authentication and security monitoring. It also explores the threat vectors of which you should be aware.
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Case Studies of Award-Winning Race Condition Attacks
This video explains some case studies of award-winning race condition attacks. This clip is from the chapter "Exploiting Race Conditions with OWASP ZAP" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".null
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Dealing with Difficult Customers
In this video, you will learn how to effectively communicate with particularly difficult customers and examine some phrases that you can immediately use in similar encounters. This clip is from the chapter "Safety and Professionalism" of...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Case Studies of Award-Winning Race Condition Attacks
This video explains some case studies of award-winning race condition attacks. This clip is from the chapter "Exploiting Race Conditions in Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section...
Curated Video
React JS Masterclass - Go From Zero To Job Ready - Conditional Auth Header / 165
In this video, we will understand how to create the header for the WriteNode project with a login popup button. We will use the Event() for the login as conditional authorization.
Curated Video
Social Media Automation using Python - Liking and Deleting the Post
Let's use Python coding to like and delete posts on Facebook, using the like_post() function and the delete_post() functions to delete the post. This clip is from the chapter "Facebook Automation" of the series "Social Media Automation...
Curated Video
Social Media Automation using Python - Commenting on a Post
In this video, we will use the put_object() function and use the ID obtained from the previous lesson along with the message() function to comment on a post. This clip is from the chapter "Facebook Automation" of the series "Social Media...
Curated Video
Social Media Automation using Python - Introduction to Module
This video introduces the concept of automating Facebook or Meta, newly called so. We will look at the possibilities we can automate to make tasks easier. This clip is from the chapter "Facebook Automation" of the series "Social Media...
Curated Video
Social Media Automation using Python - Introduction to Course
In this video, we will explore the course's prerequisites and discuss the course content and the concepts that will be covered in this course. This clip is from the chapter "Introduction" of the series "Social Media Automation Using...
Curated Video
Social Media Automation using Python - Introduction and Installation
In this video, you will learn to install and set up a software development kit called facebook-sdk 3.1.0. developed by the Python community, which is easy to use. This clip is from the chapter "Facebook Automation" of the series "Social...
Curated Video
OAuth Explained
OAuth is a protocol that helps ‘big’ websites (websites that have a very large number of users, such as Google, Facebook, etc.) grant access to its users’ information to third-party websites or applications without sharing the users’...
PBS
Creepy Clowns: The Horror Behind the Laughter
When did clowns—the characters who filled our childhoods with juggling and balloons—become so creepy? For centuries, clowns have worn two faces: as irreverent entertainers, and tricksters who could break social norms. So when stories of...
Curated Video
What is Remarketing? (or Retargeting)
Have you ever been wandering about the internet and been surprised to find adverts for products you recently looked at? If you have, welcome to remarketing. Maybe you looked at an online product and then, later that day, saw a discount...
Curated Video
What Is Paid Media
Delve into the world of paid media in this informative video. Understand what paid media is and how it can amplify your brand's online reach. Explore various paid advertising channels, techniques, and strategies to drive targeted...
Curated Video
Instagram v Facebook
Delve into the ultimate battle of the social media giants: Instagram vs. Facebook! Explore the unique features, audience demographics, and advertising opportunities offered by each platform. Gain insights into which platform suits your...
Financial Times
Facebook whistleblower on 'harmful but legal' content
FT interview - Frances Haugen talks to the FT's European tech correspondent Madhumita Murgia about the 'huge opportunity' to introduce strong new digital laws, and why she chose to speak out against the social media giant.