Instructional Video7:08
Curated Video

Practical Cyber Hacking Skills for Beginners - Working with DNS Commands

Higher Ed
In this video, you will learn about the different commands needed to operate the DNS and protect a network from being attacked.
Instructional Video3:01
Curated Video

Easy File Conversion

Pre-K - Higher Ed
Learn how to convert files between different formats quickly and easily. This video covers online tools and software for converting documents, images, and media files. Save time by knowing the best methods for file conversion. ...
Instructional Video4:49
Let's Tute

Maintaining Property Documents and Helpline Numbers

9th - Higher Ed
In this session we are going to understand the How to maintain property documents and Importance of safeguarding property documents and the Types of Property documents and the different way of maintaing records of helpline...
Instructional Video13:26
Curated Video

Fundamentals of Object-Oriented Programming - C++ - Environment Setup and First Run

Higher Ed
In this video, you will learn how to download and install Code::Block IDE on our system, then learn how to set it up.
<
br/>
This clip is from the chapter "Module 1" of the series "Fundamentals of Object-Oriented Programming -...
Instructional Video2:49
Instructional Video20:07
Curated Video

Java Multithreading and Parallel Programming Masterclass - Project - Parallel Text File Processing

Higher Ed
This is a project-based video on parallel text file processing.
Instructional Video2:43
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Hardening - Enabling the Smart Screen Filter

Higher Ed
Here, we will look at the next step in hardening the Windows 10 OS using smart screen filtering to enhance the protection of your OS.
Instructional Video9:26
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting with Veracrypt

Higher Ed
After learning about encryption, we will look at encrypting a computer using Veracrypt software.
Instructional Video4:27
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Disk Encryption

Higher Ed
Here, you will learn about encryption and decryption, the two technologies applied to a hard drive.
Instructional Video1:42
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Using GMER - Rootkit Scanner

Higher Ed
This video demonstrates the GMER rootkit scanner and how it helps eliminate the rootkit from infesting a system.
Instructional Video10:00
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to Tor

Higher Ed
In this video, the author talks about a popular anonymity tool called Tor, the most powerful tool available to provide anonymity on the Internet.
Instructional Video5:22
Curated Video

Fundamentals of Object-Oriented Programming - C++ - UML Inheritance - Case Study - Employee Part 1

Higher Ed
In this video, we will first understand what inheritance is. Then we will have a look at an employee inheritance hierarchy with a UML diagram. Based on the information in the diagram, we will be writing a program to fulfil the...
Instructional Video13:23
Curated Video

Fundamentals of Object-Oriented Programming - C++ - Classes - File I/O Program

Higher Ed
In this video, we will work on a patient data program and learn about input/output classes.
<
br/>
This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will...
Instructional Video3:07
Curated Video

Fundamentals of Object-Oriented Programming - C++ - Files - CHAR IO RDBUF

Higher Ed
In this video, you will learn about char() and rdbuf().
<
br/>
This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will learn about STL (Standard Template...
Instructional Video3:32
Curated Video

Fundamentals of Object-Oriented Programming - C++ - Files - BUFFER

Higher Ed
In this video, you will learn about file I/O readd Buffer class.
<
br/>
This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will learn about STL (Standard...
Instructional Video4:49
Curated Video

Fundamentals of Object-Oriented Programming - C++ - Files - FSTREAM

Higher Ed
In this video, you will learn about file I/O classes such as fstream, ifstream, and ofstream.
<
br/>
This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you...
Instructional Video4:00
Curated Video

Fundamentals of Object-Oriented Programming - C++ - Header and Implementation Files

Higher Ed
In this video, you will learn how to add header and implementation files to our distance program.
<
br/>
This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you...
Instructional Video7:00
Curated Video

Practical Cyber Hacking Skills for Beginners - Launching a Combinator Attack

Higher Ed
Here, we will look at how the combinator attack is performed with the two text files required to complete the attack.
Instructional Video7:37
Curated Video

Practical Cyber Hacking Skills for Beginners - Launching a Word List Attack

Higher Ed
This video illustrates the first attack type, the word list, which is by specifying the actual mode to Hashcat.
Instructional Video8:31
Curated Video

Practical Cyber Hacking Skills for Beginners - Setting Up Hashcat

Higher Ed
This lesson will teach us how to install and set up the Hashcat by changing the folder structures and deleting older hashtag versions.
Instructional Video3:48
Curated Video

Practical Cyber Hacking Skills for Beginners - Introduction to Hashcat

Higher Ed
This video introduces a tool that is an advanced password recovery tool and is available on various platforms.
Instructional Video10:21
Curated Video

Practical Cyber Hacking Skills for Beginners - Calculating Hash Values with PowerShell

Higher Ed
In this video, you will learn about calculating the hash values of different types of files using Microsoft PowerShell.
Instructional Video9:10
Curated Video

Practical Cyber Hacking Skills for Beginners - Hashing

Higher Ed
In this video, we will look at hashing, which is the conversion of key/string/variable into a hash using an algorithm used in malware and antimalware products.
Instructional Video6:37
Curated Video

Practical Cyber Hacking Skills for Beginners - Hardening Networks

Higher Ed
Here, you will learn how to harden networks. What devices and protocols are available to harden a network from being hacked?