Instructional Video10:15
Señor Jordan

03 Spanish Lesson - Affirmative tú commands (part 2) - Irregulars

12th - Higher Ed
¡Hola! Here's another video in a series on commands in Spanish. In this video we'll be going over affirmative tú commands in Spanish that are irregular. The funny thing is those irregulars always seem to be some of the most common verbs...
Instructional Video5:44
Señor Jordan

03 Practice Usted commands with a special guest! - Practice 2

12th - Higher Ed
03 Practice Usted commands with a special guest! - Practice 2
Instructional Video6:28
Señor Jordan

03 Practice Usted commands with a special guest! - Practice 1

12th - Higher Ed
03 Practice Usted commands with a special guest! - Practice 1
Instructional Video6:12
Señor Jordan

03 Nosotros commands - Practice 3

12th - Higher Ed
03 Nosotros commands - Practice 3
Instructional Video5:48
Señor Jordan

03 Nosotros commands - Practice 2

12th - Higher Ed
03 Nosotros commands - Practice 2
Instructional Video3:14
Señor Jordan

03 Nosotros commands - Practice 1

12th - Higher Ed
03 Nosotros commands - Practice 1
Instructional Video7:03
Señor Jordan

03 How to form Vosotros commands in Spanish

12th - Higher Ed
03 How to form Vosotros commands in Spanish
Instructional Video4:56
Señor Jordan

03 How to form Ustedes commands

12th - Higher Ed
03 How to form Ustedes commands
Instructional Video5:03
Señor Jordan

03 How to form Usted Commands in Spanish

12th - Higher Ed
03 How to form Usted Commands in Spanish
Instructional Video6:52
Señor Jordan

03 How to form Nosotros commands in Spanish

12th - Higher Ed
03 How to form Nosotros commands in Spanish
Instructional Video4:02
Señor Jordan

03 Tú commands + pronouns - Practice 2

12th - Higher Ed
03 Tú commands + pronouns - Practice 2
Instructional Video4:04
Señor Jordan

03 Tú commands + pronouns - Practice 1

12th - Higher Ed
03 Tú commands + pronouns - Practice 1
Instructional Video2:14
Señor Jordan

03 Tú commands + pronouns - Explanation

12th - Higher Ed
03 Tú commands + pronouns - Explanation
Instructional Video8:24
Curated Video

Get Started with Linux Commands

Higher Ed
This video will teach you the basic commands we will use in this course
Instructional Video24:55
Curated Video

Lab 1 Task 1 Building First circuit in LTSpice

Higher Ed
Lab 1 Task 1 Building First circuit Basics of Power Electronics - Walid Issa
Instructional Video9:29
Curated Video

Getting Started With Powershell Empire

Higher Ed
This video will show you how to install Powershell Empire and install a keylogger on a victim's machine. A jump-start tutorial on how to use this tool.
Instructional Video6:50
Curated Video

Hack an Android Phone

Higher Ed
In this video, you will learn how to hack into an android phone by deploying a malicious application. Gain total control over the mobile phone and manage it through Armitage on KALI.
Instructional Video8:11
Curated Video

Create Your First Trojan

Higher Ed
In this video, you will learn how to create your first Trojan file, and how to use this file once it is invoked by the victim. The Trojan file is moved to the victim's machine by using various social engineering techniques.
Instructional Video8:26
Curated Video

Takeover a Database Server

Higher Ed
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully. Use this technique ethically.
Instructional Video6:10
Curated Video

Bypass Firewalls by Tunneling Data and Commands over DNS new

Higher Ed
This video will teach you how to setup a Command and Control center to bypass firewall rules and control the victim over DNS traffic, which in many cases is not suspicious to anyone monitoring a network traffic.
Instructional Video6:15
Curated Video

How Can Pentest.ws Help You

Higher Ed
Learn how to document your findings for a professional presentation
Instructional Video4:44
Curated Video

Wireshark D5 V5 - HTTP analysisMTP analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 5: SMTP analysis
Instructional Video8:11
Curated Video

Create Your First Trojan and Infiltrate a Target

Higher Ed
This video wil show you the baby steps on how to create your first trojan file in Kali Linux. We will put his file into action and start infiltrating data from the victim's machine
Instructional Video6:50
Curated Video

Hack an Android Phone with Armitage

Higher Ed
In this video, we will actually hack an Android phone by deploying our payload using Armitage, which is a GUI for metasploit framework.