Instructional Video7:12
Curated Video

Learning D3.JS 5.0 1.5: Setting Up a Local Server

Higher Ed
In this video, we will see why we need a server, available server options, and creating a local server in our machine. • Understand why you need a server • Explore server options for all platforms • Get a step-by-step guide to create a...
Instructional Video9:28
Curated Video

Bug Bounty Program Certification 8.4: Database Attack Using Manual Techniques

Higher Ed
This video focuses on manual database attack. • Explore manual database attack • Understand various injection commands to exploit database • Explanation of the manual commands
Instructional Video11:13
Curated Video

Bug Bounty Program Certification 7.5: Install Acunetix Web Vulnerability Scanner

Higher Ed
This video will help you understand web scanning using Acunetix web vulnerability scanner. • Download Acunetix web vulnerability scanner • Installation of web scanner • Reporting of vulnerabilities
Instructional Video8:43
Curated Video

Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines

Higher Ed
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Instructional Video12:03
Curated Video

Bug Bounty Program Certification 5.5: Perform Brute Force Attack on File Transfer Protocol

Higher Ed
This video will help you perform brute force attack on file transfer protocol. • Setup FTP in Windows10 machine • Explore Hydra commands for brute force attack • Learn about brute force attack on FTP to get login credentials
Instructional Video5:43
Curated Video

Cloud Native Development on Azure with Java 2.6: Deploy Your App to an Azure App Service Instance

Higher Ed
In this video, we will show you how to deploy the Spring Boot app to Azure. So, you will be able to migrate your locally running app to Azure Web Apps. • Created an Azure web application hosted within the Azure App Service • Use the KUDU...
Instructional Video8:06
Curated Video

Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video10:40
Packt

State the purpose of network hardware : Structured Cabling

Higher Ed
From the section: Essentials of Networking. In this section, we learn about WANS, Routers, cables and connectors. CompTIA doesn’t expect you to prove you can crimp your own cables, but it does expect you to understand the crimping...
Instructional Video6:47
Packt

Introduction to computer hardware and software : Touring the Case

Higher Ed
From the section: Motherboards. In this section, we look into motherboard features such as Chipsets and how to install. A PC’s case is an amazing and often overlooked part of the system. Understanding common case features makes it easier...
Instructional Video7:38
Packt

Troubleshoot a faulty computer network : RIP Troubleshooting Scenario 1. Can you find the issue?

Higher Ed
From the section: RIP Troubleshooting (ICND1). In this section, we learn to troubleshoot RIP in different scenario. RIP Troubleshooting (ICND1): RIP Troubleshooting Scenario 1. Can you find the issue?
Instructional Video7:20
Packt

Use functions or APIs from external libraries to develop a computer program : Name and Main

Higher Ed
From the section: Advanced Python. This section helps to understand about OOP, classes, class interface etc. We will dive into learning Advance Python Why does "Name and Main" sound like a steakhouse? It has nothing to do with steak. But...
Instructional Video8:05
Packt

Use functions or APIs from external libraries to develop a computer program : Creating a Package

Higher Ed
From the section: Advanced Python. This section helps to understand about OOP, classes, class interface etc. We will dive into learning Advance Python Learn how to create your own local package for your Python programs!
Instructional Video12:53
Curated Video

Describe cyber attacks that could affect a computer system or network : Installation of Virtual Machines

Higher Ed
From the section: Introducing Network Security.This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Instructional Video1:57
Curated Video

Describe cyber attacks that could affect a computer system or network : The Course Overview

Higher Ed
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Instructional Video7:24
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Hough transform – practical example in python

Higher Ed
From the section: Computer Vision Basics: Part 2. In this section, we’ll explore the some addtiional features of Computer Vision. Computer Vision Basics: Part 2: [Activity] Hough transform – practical example in python
Instructional Video5:04
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Python Basics: Looping and an Exercise

Higher Ed
From the section: Python Crash Course [Optional]. In this section, we’ll continue diving into Python data structures with tuples and dictionaries, functions, Boolean Operations and Loops, and libraries like Pandas, MatPlotLib and Seaborn...