Curated Video
Linux Network Administration - Enabling Internet in Linux
This video explains how to enable internet access in the virtual machine.
Curated Video
Linux Network Administration - Linux CentOS8 Installation
This video explains the installation of CentOS8 onto your system.
Curated Video
Linux Network Administration - Creating First Virtual Machine
This video explains how to create a virtual machine on the VirtualBox.
Curated Video
Linux PAM Security Administration - PAM File Configuration Format
This video explains the format of every PAM file configuration.
Curated Video
Linux PAM Security Administration - The Importance of PAM
This video explains the importance of PAM and why it is necessary.
Curated Video
Linux PAM Security Administration - Linux CentOS Installation
This video explains the installation process of CentOS 8 onto your system.
Curated Video
Linux PAM Security Administration - Creating First Virtual Machine
This video explains how to create your first virtual machine.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Dedicated Instances
Dedicated instances are the final "special" kind of AWS EC2 instance. This video explains their operation.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Elastic Block Store (EBS)
While S3 and Glacier can be used to store files, what do you do when you need storage for a virtual machine (an instance) in Amazon Web Services (AWS)? The answer is in the AWS Elastic Block Store (EBS) service. This video introduces the...
Curated Video
AutoCAD 2023 Masterclass - Produce Amazing Site Plans Quickly - How to Install AutoCAD 2D on Your PC
In this video, we will walk you through the process of installing AutoCAD 2D on your PC. You will learn step-by-step instructions on how to install the software, set up the required configurations, and activate your license. We will also...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 1 (Part2)
This is the first of the two-part video on exploiting race conditions for case 2. Here, you would be looking at how the hackers use another race condition for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Summary-1
This video helps you with the summary of this section. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Security Policies
NTFS permissions control files and folders, but there are plenty of other resources that need control. Security policies control factors such as login attempts, printer access, and password length/complexity. This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - MMC and Additional Tools
Let's get familiar with Microsoft Management Console (MMC) and create our own custom framework for managing our PC. This clip is from the chapter "Working with Operating Systems" of the series "CompTIA A+ Certification Core 2...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Upgrading macOS
Upgrading macOS is simple. Follow along with the author in this video to find out how to upgrade to the newest version of macOS. This clip is from the chapter "Installing and Upgrading Operating Systems" of the series "CompTIA A+...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Windows 10 Editions and Features
There are important differences between Windows 10 Home, Pro, Pro for Workstations, and Enterprise. This video reviews the versions and feature differences. This clip is from the chapter "Installing and Upgrading Operating Systems" of...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 1 (Part2)
This is the first of the two-part video on exploiting race conditions for case 2. Here, you would be looking at how the hackers use another race conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Malware in Action
This video demonstrates some destructive malware and ransomware applications to give you an idea of what to look for when you suspect a system has been infected. WARNING! If you attempt these at home, be sure you're in a sandbox or...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Troubleshooting Wireless Connections
There are few worse feelings than a wireless connection that just doesn't…connect. In situations like this, good tech will have the right tools and skills to diagnose and repair the issue. This clip is from the chapter "Wireless...
Curated Video
Deep Learning - Artificial Neural Networks with Tensorflow - ANN for Regression
In this video, we will understand regression in ANN. This clip is from the chapter "Feedforward Artificial Neural Networks" of the series "Deep Learning - Artificial Neural Networks with TensorFlow".In this section, we will cover...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Cooling Your System
Previously we discussed the types of heat sinks, fans, and liquid cooling that are used to lower component and system temperatures. Now we will look at keeping your system cool through even the most difficult of tasks. This clip is from...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Troubleshooting Wireless Connections
There are few worse feelings than a wireless connection that just doesn't...connect. In situations like this, good techs will have the right tools and skills to diagnose and repair the issue. This clip is from the chapter "Book Chapter...
Curated Video
Kafka for Developers - Data Contracts Using Schema Registry - Producer and Consumer Messages Using CLI
In this video, you will learn to produce and consume messages using Docker Compose. This clip is from the chapter "Kafka Setup and Demo in Local Using Docker" of the series "Kafka for Developers - Data Contracts Using Schema Registry".In...
Curated Video
Kafka for Developers - Data Contracts Using Schema Registry - Set Up Kafka Broker and Zookeeper Using Docker Compose
In this video, you will learn to set up Kafka Broker and Zookeeper using Docker Compose. This clip is from the chapter "Kafka Setup and Demo in Local Using Docker" of the series "Kafka for Developers - Data Contracts Using Schema...