Curated Video
How Can Pentest.ws Help You
Learn how to document your findings for a professional presentation
Curated Video
Wireshark D5 V3 - HTTP analysisDNS analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 3: DNS analysis
Curated Video
Wireshark D3 V4 - How is traffic capturedCapture Filters
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 4: Capture filters
Curated Video
Execute Man-in-the-Middle Attacks
Learn how to execute MITM attacks using Ettercap tool, a very powerful application in Kali
Curated Video
Explore Main Services and Install Necessary Programs
This video will help you get started in setting up your lab
Curated Video
Perform a DNS Spoofing Attack
This video will teach you how to perform a DNS spoofing attack, and how to take user's URL request to a crafted web application of your own
Curated Video
Port Scanning
An application called a port scanner scans a server or host for open ports. Administrators may use such an application to check the network security policies, and attackers may use it to discover network services operating on a host and...
Curated Video
Introducing NMAP
NMAP is the classic network scanner, in this video we will deep dive into its features
Packt
Hands-On Continuous Integration and Automation with Jenkins - CD Pipeline – Test and Deploy to Stage
This video adds unit tests for the Python code, deploys the application to a staging environment, and tests the deployments with user acceptance tests. • Add steps to the pipeline • Analyze unit and user acceptance tests • Deploy to a...
Curated Video
Structural Design Patterns in Modern C++ - User Interface (UI) Example Overview
This video provides an overview of the UI with the help of an example. This clip is from the chapter "Composite Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the composite design...
Curated Video
Linux Fundamentals - Verifying Connectivity with Remote Servers
This video explains how to verify connectivity with remote servers. This clip is from the chapter "Networking in Linux" of the series "Linux Fundamentals".This section introduces you to networking in Linux. Then, you will learn about...
Curated Video
Linux Fundamentals - Using the curl and wget Utilites
This video demonstrates the use of curl and wget utilities. This clip is from the chapter "Networking in Linux" of the series "Linux Fundamentals".This section introduces you to networking in Linux. Then, you will learn about Internet...
Curated Video
Linux Fundamentals - Connecting to the Linux Server Remotely Using Secure Shell (SSH)
This video explains how to connect to the Linux server remotely using SSH. This clip is from the chapter "Networking in Linux" of the series "Linux Fundamentals".This section introduces you to networking in Linux. Then, you will learn...
Curated Video
Linux Fundamentals - Command Options
This video focuses on command options. This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux on macOS and...
Curated Video
Linux Fundamentals - Exploring IP Address Settings
This video explores IP address settings. This clip is from the chapter "Networking in Linux" of the series "Linux Fundamentals".This section introduces you to networking in Linux. Then, you will learn about Internet Protocol (IP) and...
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - Amazon Relational Database Service (RDS) and Aurora
This video focuses on Amazon RDS and Aurora. This clip is from the chapter "Domain 4: Analysis" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn how to build a more complex...
Professor Dave Explains
Virus-Cell Interactions Part 2 Multicellular Hosts
We just went over some basics regarding virus-cell interactions, but we have a little more to discuss. We need to understand some more details regarding how viruses interact with multicellular hosts, such as humans. Let's take a look!
Weird History
What Roman Parties Were Really Like
Contrary to popular belief, Rome was not all crazy sex parties. In fact, ancient Roman parties were pretty tame by today’s standards. Most of the time, it consisted of noble families getting together, eating elaborate food dishes, and...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Penetration Testing
This episode focuses on how penetration testing discovers and exploits security vulnerabilities. Concepts covered include known, partially known, and unknown testing types as well as the role that red, white, blue, and purple teams play....
Communication Coach Alex Lyon
4 Other Communication Channels I Recommend in 2020
I'd like to recommend 4 other great communication-related channels in 2020.
Astrum
Are we sending microbes to alien worlds? Panspermia
With all the focus on the Coronavirus, it made me wonder how viruses would cope in space generally. This led on to other questions like "do we contaminate other worlds with Earth based life?" and "can alien bacteria and viruses thrive...
NASA
Gravity Assist: Using Webb to Trace Galactic Histories, with Aaron Yung
The James Webb Space Telescope, which launched Dec. 25, will allow us to see the farthest galaxies and better understand the origins of the Milky Way. Aaron Yung at NASA’s Goddard Space Flight Center is preparing for these historic...
Packt
Kafka Advertised Host Setting
This video demonstrates how to set an advertised host in Kafka. This clip is from the chapter "Annex - Starting Kafka Differently" of the series "Apache Kafka Series - Learn Apache Kafka for Beginners".In this section, you will learn to...