Curated Video
Practical Cyber Hacking Skills for Beginners - Target Reconnaissance
In this video, you will learn how to perform reconnaissance based on a specific target, usually, a location, understand the groundwork and infrastructure involved, and the possibilities of being able to hack.
Curated Video
Practical Cyber Hacking Skills for Beginners - Crawling, Auditing, and Generating Reports with Burp Suite
In this video, we will look at AltoroMutual, a testing website developed by IB, specifically for testing against vulnerabilities on the internet to different types of attacks.
Curated Video
Practical Cyber Hacking Skills for Beginners - Understanding Databases and SQL
In this lesson, we will look at databases and structured query language (SQL) and how they can be used to manipulate and retrieve data.
Curated Video
Practical Cyber Hacking Skills for Beginners - Introduction to Zenmap
This video demonstrates using Zenmap, the graphical user interface for NMAP, to scan different networks.
Curated Video
Practical Cyber Hacking Skills for Beginners - Scanning Techniques
This video elaborates on NMAP's different techniques for scanning networks using the available network probes.
Curated Video
Practical Cyber Hacking Skills for Beginners - Host Discovery Controls - Part 2
This video continues where we left off, understanding the host discovery controls and the scanning techniques used briefly.
Curated Video
Practical Cyber Hacking Skills for Beginners - Host Discovery Controls
In this lesson, we will look at the different probes used by the NMAP, including ICMP Echo request, TCP Syn packet to port 443, TCP ACK packet to port 80, and ICMP timestamp request.
Curated Video
Practical Cyber Hacking Skills for Beginners - Working with DHCP Commands
This video takes us through the different commands to operate the DHCP and protect a system or network from attacks.
Curated Video
Practical Cyber Hacking Skills for Beginners - The Hacking Methodology
Here, you will learn more about the different hacking methodologies that hackers employ to cause harm to a system or a network and also understand the possibilities of minimizing the attacks.
Curated Video
Practical Cyber Hacking Skills for Beginners - Social Engineering
This video discusses social engineering concepts, understanding the human psyche, and how hackers manipulate the human mind to hack.
Curated Video
Build and Learn ASP.NET 6.0 Blazor Hands-On - The Program Class and Host Object
This lecture explains the hosting process of a Blazor application where the Program class main method is the entry point to the application. This clip is from the chapter "Create a CRUD Application in Blazor" of the series "Build and...
Curated Video
AI for Teachers with ChatGPT - Creating Projects and Rubrics
In this video, you will unlock the potential of Chat GPT in creating exciting projects and developing rubrics that foster creativity and critical thinking. This clip is from the chapter "Introduction to the Course" of the series "AI for...
Curated Video
Risk Management for Cyber Security Managers - Ethical Hacking and Pen Testing
In this video, we will discuss ethical hacking and penetration testing and how we can use these techniques to mitigate cyber risks in an organization.
Curated Video
Risk Management for Cyber Security Managers - Information Classification
In this lesson, you will learn how to classify information to understand how to mitigate risks in the most efficient manner.
Curated Video
Learn Midjourney For Your Future 6 Figure Career - Is Midjourney Ethically Correct?
In this video, we will understand the problems of ethical dimensions that we could face while using Midjourney. We will understand how using the content generated by Midjourney can pose ethical problems such as stealing art illegally and...
Curated Video
The Story You Tell Yourself: Understanding Your Narrative Identity
The story you tell yourself about your life has immense power. This is your narrative identity – it shapes how you think, feel, and act. In this video, psychiatrist Dr. Tracey Marks helps you understand the key elements of your...
Curated Video
Practical Cyber Hacking Skills for Beginners - NMAP Scripting
In this video, we will look at the different scripts used in NMAP, programs, or codes used to check the vulnerability of networks and other functional availabilities.
Curated Video
Landmarks - Temple Mount
TEMPLE MOUNT THE TEMPLE MOUNT, ALSO KNOWN AS THE NOBLE SANCTUARY , IS A RELIGIOUS SITE IN THE OLD CITY OF JERUSALEM. IT S THE HOLIEST SITE FOR JUDAISM, BUT ALSO HOLDS GREAT SIGNIFICANCE IN THE MUSLIM AND CHRISTIAN WORLD. TODAY BOTH...
Curated Video
What If Our Clothes Could Disrupt Surveillance Cameras?
What do you get when you combine mass surveillance with A.I.? It’s a dystopia that’s already a reality in places across the world. Fashion designers are pushing back, crafting clothing and accessories that trick facial recognition...
Curated Video
Valence Electrons & Lewis Dot Diagrams - what are they and how do I draw them?
Valence electrons are the electrons in the outermost energy level of an atom. They are important because they are involved in the chemical bonding of our elements which helps determine the reactivity of elements. In order to be stable,...
Curated Video
Why does chemistry happen?! Element Stability and the Octet Rule!
Why does chemistry happen?? Why do ions form?? Why do elements bond together?? These are all important questions and the answer comes back to one very important principle in chemistry and that is element stability. Elements are stable...
Great Big Story
Cherokee trails, Lamar Marshall’s mission to preserve history
Lamar Marshall, also known as Nanohe Dewatiski, dedicates his life to mapping and preserving Cherokee trails, connecting modern generations with their ancestors' sacred paths.
Science ABC
AM vs FM Radio: Which Modulation Rocks Your Ears?
Amplitude Modulation, commonly abbreviated as AM, is a common method of broadcasting radio signals. This method dates back to the 1870s, i.e., the time when we first discovered that information in the form of audio production can be...
Curated Video
Data
A collection of pieces of information, organised and categorised for some purpose. A Twig Science Glossary Film. Key scientific terms defined in just 60 seconds using stunning images and concise textual definitions. Twig Science Glossary...