Curated Video
Learning D3.JS 5.0 1.5: Setting Up a Local Server
In this video, we will see why we need a server, available server options, and creating a local server in our machine. • Understand why you need a server • Explore server options for all platforms • Get a step-by-step guide to create a...
Curated Video
Bug Bounty Program Certification 8.4: Database Attack Using Manual Techniques
This video focuses on manual database attack. • Explore manual database attack • Understand various injection commands to exploit database • Explanation of the manual commands
Curated Video
Bug Bounty Program Certification 7.5: Install Acunetix Web Vulnerability Scanner
This video will help you understand web scanning using Acunetix web vulnerability scanner. • Download Acunetix web vulnerability scanner • Installation of web scanner • Reporting of vulnerabilities
Curated Video
Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Curated Video
Bug Bounty Program Certification 5.5: Perform Brute Force Attack on File Transfer Protocol
This video will help you perform brute force attack on file transfer protocol. • Setup FTP in Windows10 machine • Explore Hydra commands for brute force attack • Learn about brute force attack on FTP to get login credentials
Curated Video
Cloud Native Development on Azure with Java 2.6: Deploy Your App to an Azure App Service Instance
In this video, we will show you how to deploy the Spring Boot app to Azure. So, you will be able to migrate your locally running app to Azure Web Apps. • Created an Azure web application hosted within the Azure App Service • Use the KUDU...
Curated Video
Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4
Exam questions. • Practice questions • Solutions • Explanation of answer
Packt
State the purpose of network hardware : Structured Cabling
From the section: Essentials of Networking. In this section, we learn about WANS, Routers, cables and connectors. CompTIA doesn’t expect you to prove you can crimp your own cables, but it does expect you to understand the crimping...
Packt
Introduction to computer hardware and software : Touring the Case
From the section: Motherboards. In this section, we look into motherboard features such as Chipsets and how to install. A PC’s case is an amazing and often overlooked part of the system. Understanding common case features makes it easier...
Packt
Troubleshoot a faulty computer network : RIP Troubleshooting Scenario 1. Can you find the issue?
From the section: RIP Troubleshooting (ICND1). In this section, we learn to troubleshoot RIP in different scenario. RIP Troubleshooting (ICND1): RIP Troubleshooting Scenario 1. Can you find the issue?
Packt
Use functions or APIs from external libraries to develop a computer program : Name and Main
From the section: Advanced Python. This section helps to understand about OOP, classes, class interface etc. We will dive into learning Advance Python Why does "Name and Main" sound like a steakhouse? It has nothing to do with steak. But...
Packt
Use functions or APIs from external libraries to develop a computer program : Creating a Package
From the section: Advanced Python. This section helps to understand about OOP, classes, class interface etc. We will dive into learning Advance Python Learn how to create your own local package for your Python programs!
Curated Video
Describe cyber attacks that could affect a computer system or network : Installation of Virtual Machines
From the section: Introducing Network Security.This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Curated Video
Describe cyber attacks that could affect a computer system or network : The Course Overview
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Hough transform – practical example in python
From the section: Computer Vision Basics: Part 2. In this section, we’ll explore the some addtiional features of Computer Vision. Computer Vision Basics: Part 2: [Activity] Hough transform – practical example in python
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Python Basics: Looping and an Exercise
From the section: Python Crash Course [Optional]. In this section, we’ll continue diving into Python data structures with tuples and dictionaries, functions, Boolean Operations and Loops, and libraries like Pandas, MatPlotLib and Seaborn...