Curated Video
Learning Python Web Penetration Testing (Video 4)
With the huge growth in the number of web applications in the recent times, there has also been an upsurge in the need to make these applications secure. Web penetration testing is the use of tools and code to attack a website or web app...
Next Animation Studio
Scientists discover fish parasites that do not breathe: study
The Henneguya salminicola is the first multicellular animal discovered that does not breathe.
Curated Video
Describe network protocols : Creating Simple TCP Echo Server
From the section: Programming TCP Clients and Servers In this section, we will learn about how to build TCP Servers and how it works. In this video, will learn how to create a simple TCP echo server. • Learn the process how a server...
Curated Video
Describe cyber attacks that could affect a computer system or network : Leaving a Backdoor in the Target Machine
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will find out what is persistent...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Honeypots
How can malicious attacker and malware activity be monitored without allowing the compromise of production systems? Honeypots are fake decoy systems designed to attract malicious activity for the purpose of logging and tracing activity....
Curated Video
Create a computer network: Model Network Devices as Objects
From the section: Interacting with Classic Network Devices. In this section, we will look at how to interact with classic network devices with Python libraries. We will explain what we define as classic network devices and use Netmiko...
Curated Video
Describe cyber attacks that could affect a computer system or network : Creating Reverse Shell with Metasploit
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will discover how to set a reverse on...
Curated Video
Bash Shell Scripting - Basic System - Commands
This video helps you with the basic system of commands. This clip is from the chapter "Linux Commands - Quick Refresher" of the series "Mastering Bash Shell Scripting: Automate your daily tasks [Updated for 2021]".This section is a quick...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - The Metasploit Framework
Penetration testers can use the cross-platform Metasploit framework command-line tool for discovering and exploiting security flaws on hosts. This clip is from the chapter "Testing Infrastructure" of the series "CompTIA Security+...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 13 Ask Me Anything (AMA)
There is much to be learned by analyzing past security incidents. In this episode, Dan discussed the Cyber Kill Chain. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
Learning Python Web Penetration Testing (Video 6)
With the huge growth in the number of web applications in the recent times, there has also been an upsurge in the need to make these applications secure. Web penetration testing is the use of tools and code to attack a website or web app...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks
Staying up-to-date with the latest types of security attacks is form of attack mitigation. Keeping systems hardened helps protect against zero-day attacks. Software developers must adhere to secure coding practices to ensure deployed...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - SSH Public Key Authentication Lab
Multifactor authentication should always be used for administrative accounts. In this demo, SSH public key authentication is configured for a Linux host. This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Professor Dave Explains
Phyla Orthonectida and Dicyemida: Mesozoans
We've arrived at the spiralia phyla orthonectida and dicyemida. The dycemids live exclusively in the renal sac of benthic cephalopods, such as an octopodes. Orthnectids spend most of their lives as trophic plasmodium within the tissue of...
TLDR News
What The Hell is the G7? What Do They Actually Do? - TLDR News
This week the G7 is meeting in Cornwall (England) to discuss COVID and other major global isues. However, what they actually do and who they are is a little confusing and contentious. So in this video we discuss what the G7 is, what...
Curated Video
Bug Bounty Program Certification 4.2: Setup External Network Attack
In this video, we will see how to setup external wireless adapter and wireless attack. • Explore information about external wireless adapter • Connect wireless adapter to Kali Linux OS • Setup wireless attack lab
Curated Video
Describe cyber attacks that could affect a computer system or network : Hidden Scanning Ports with Nmap
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will learn how to scan a target with...
Curated Video
Understanding the Chain of Infection: How Germs Spread and Infect
In this video, the concept of the chain of infection is explained, highlighting how germs spread from various sources to infect new hosts. It explores the different modes of transmission, including person-to-person contact, indirect...
Curated Video
World of Computer Networking Your CCNA start - Dynamic Port Address Translation (PAT)
This video introduces you to dynamic PAT. This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
Janus Academy
How Well Does Mark Zuckerberg Speak Chinese? | Comments on His Speech in Mandarin in China
Facebook co-founder and CEO Mark Zuckerberg speaks fluent Mandarin at Tsinghua University in Beijing. How well did he speak? Let's see what a native Mandarin teacher has to say!
Curated Video
Active Directory with Windows Server 2016 - Introduction to Web App Proxy
Understand the benefits, usage, and purpose of Web App Proxy (WAP) with Federation Services and learn about the requirements to implement and authenticate. This clip is from the chapter "Implement Identity Federation and Access...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Virtualization
CISSP Domain 3: System Architecture and Engineering: Virtualization. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
Curated Video
World of Computer Networking Your CCNA start - Summary "Network Address Translation (NAT)"
This video provides a summary of the section. This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
Curated Video
IELTS Listening: Learn Prediction to Increase Scores
Today you’ll learn how to predict on the IELTS Listening Exam to increase your scores.