Instructional Video8:07
Curated Video

The Powerful Armitage Tool

Higher Ed
This video will demonstrate the powerful armitage tool, which is a GUI application for the metasploit framework
Instructional Video9:29
Curated Video

Getting Started With Powershell Empire

Higher Ed
This video will show you how to install Powershell Empire and install a keylogger on a victim's machine. A jump-start tutorial on how to use this tool.
Instructional Video8:26
Curated Video

Control a Database Server with SQLMap-2 new

Higher Ed
This video will show you how to leverage SQL injection vulnerability to take full control over a Database server
Instructional Video12:59
Curated Video

Analysis of Code4hk APK

Higher Ed
This video will deep dive into the analysis of a malicious APK file named Code4hk, and wil show you how hackers can inject an APK within another APK's resources.
Instructional Video6:59
Curated Video

Dissecting FTP

Higher Ed
In this tutorial, you will learn the modes FTP functions under as well as their security architecture.
Instructional Video1:59
Curated Video

Records Of Processing Activities

Higher Ed
This section provides information that will help participants gain knowledge on the GDPR requirements on the records of processing activities, the steps of creating records, and the importance of keeping up-to-date records of processing...
Instructional Video5:54
Curated Video

Execute an Offline Password Attack on Windows

Higher Ed
Learn how to plan an execute an offline password attack on Windows using John The Ripper tool
Instructional Video1:45
Curated Video

Keyword Search Tecniques

Higher Ed
This video will guide you on how to use keyword search techniques in spotting malicious code within an APK
Instructional Video4:49
Curated Video

Execute a Phishing Attack

Higher Ed
In this video, you will learn how to plan and execute a phishing attack using the SET tool
Instructional Video6:49
Curated Video

Wireshark D5 V2 - HTTP analysisFTP analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 2: FTP analysis
Instructional Video5:35
Curated Video

Sender Framework Policy (SPF)

Higher Ed
In this tutorial, you will learn about SPF and how to set it up on your DNS server.
Instructional Video8:26
Curated Video

Takeover a Database Server

Higher Ed
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully. Use this technique ethically.
Instructional Video5:34
Curated Video

Hashing in a Nutshell

Higher Ed
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Instructional Video6:16
Curated Video

Execute an Offline Password Attack in Linux

Higher Ed
Learn how to plan an execute an offline password attack on Linux using the HashCat powerful tool
Instructional Video4:44
Curated Video

Wireshark D2 V4 - View Menu

Higher Ed
DAY TWO - We will explore Wireshark interface in details - Video 4: View menu
Instructional Video15:20
Curated Video

Hacking with Termux

Higher Ed
A simple tool for ethical hacking is Termux. There are numerous tools for Termux available online, so we've compiled a list of the top hacking tools for Termux along with instructions on how to use each one.
Instructional Video3:41
Curated Video

Wireshark D2 V1 - File Menu

Higher Ed
DAY TWO - We will explore Wireshark interface in details - Video 1: File menu
Instructional Video4:42
Curated Video

Password Spraying

Higher Ed
Learn how to spray passwords across many accounts. Password spraying is an attack that attempts to access a large number of accounts (usernames) with a few commonly used passwords. It is different from the traditional brute-force attacks...
Instructional Video6:29
Curated Video

Offline Password Attack on Linux

Higher Ed
In this video, you will learn how to extract and identify password hashes on a Linux machine. Use the powerful Hashcat tool to crack those hashes.
Instructional Video1:44
Curated Video

WiFi Password Cracking

Higher Ed
Exploiting security flaws in wireless networks to gain unwanted access is known as cracking. Exploits on networks that employ WEP to establish security restrictions are referred to as WEP cracking.
Instructional Video6:21
Curated Video

Hack WPA2 Wireless Networks

Higher Ed
In this tutorial, you will learn how to crack into WPA and WPA2 wireless networks using various tools like aircrack-ng.
Instructional Video8:21
Curated Video

Lab 1 Task 4 LTSPICE Models and Library

Higher Ed
Lab 1 Task 4 LTSPICE Models and Library Walid Issa
Instructional Video9:27
Curated Video

50 Sports and Activities Signs in ASL

3rd - Higher Ed
Today we're teaching you about 50 sports and activities signs including a few sentences that you can practice using these signs with. Most sports signs are iconic, meaning the signs look like your acting out the action of that word. If...
Instructional Video9:18
Curated Video

How to Write an Information Report

6th - Higher Ed
An introduction to writing information reports. This video details the structure of an information report (introduction, body, conclusion, bibliography) as well as the language features used within an information report (present tense,...