Hi, what do you want to do?
Vlogbrothers
Does Human Life Have Real Meaning?
In which John discusses whether human life has real meaning (and if constructed meaning is less real than derived meaning), thinks about thinking, offers to attend pretty much any wedding with an open bar, reveals his favorite two-digit...
Curated Video
Firewalls and Security Appliances
Any type of server appliance intended to safeguard computer networks from unauthorized traffic is referred to as a security appliance.
Curated Video
Wireshark D4 V7 - ICMPv6 Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 7: ICMPv6 deep-dive
Curated Video
Remote Work Security
The video provides you with tips on how to safely work remotely (home, cafe, any place)
Curated Video
How to Attack Modern Wireless Networks - Introduction
This video is a general overview on how to attack wireless networks
Curated Video
Attack a Router Using Medusa
In this video, you will learn how to run an online password attack on a router using Medusa on KALI.
<br<br/>/>
Use this ethically !!!
Use this ethically !!!
Curated Video
Publish Your Weapons Online
This video will teach you how to prepare your lab for a real world attack
Curated Video
LAB 6: How to Hide the Wireless SSID
I will show you how to hide your WiFi SSID to protect your network
Curated Video
Email and Browser Security
Enhance defenses against and detection of threats from web and email channels, as these provide chances for attackers to directly influence human behavior. This video will show you how to follow such techniques
Curated Video
Wireshark D5 V4 - HTTP analysisDHCP analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 4: DHCP analysis
Curated Video
LAB 11: NMAP Tool
We will download and install ZENMAP, which is the GUI version of NMAP
Curated Video
Introduction to Cloud Computing - The Need for Cloud Computing
This video explains the need for cloud computing.<br<br/>/>
This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
Curated Video
gRPC [Golang] Master Class Build Modern API and Microservices - [Theory] SSL Security
[Hands-On] gRPC Advanced Features Deep Dive: [Theory] SSL Security
<
br/>
This clip is from the chapter "[Hands-On] gRPC Advanced Features Deep Dive" of the series "gRPC [Golang] Master Class: Build Modern API and Microservices".In...
<
br/>
This clip is from the chapter "[Hands-On] gRPC Advanced Features Deep Dive" of the series "gRPC [Golang] Master Class: Build Modern API and Microservices".In...
Curated Video
routing protocols : Types of Routing Protocols -Distance Vector, Link State
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols.
Routing Introduction: Types of Routing Protocols...
Routing Introduction: Types of Routing Protocols...
Curated Video
routing protocols : EIGRP - advanced distance vector routing protocol and Administrative Distance
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols.
Routing Introduction: EIGRP - advanced distance...
Routing Introduction: EIGRP - advanced distance...
Curated Video
Do Microwaves Interfere With WiFi Signals?
Yes. Microwaves and radio waves are physically the same, i.e. both are forms of electromagnetic radiation. Some microwave rays can leak out and interfere with WiFi signals. We are basically constantly surrounded by electromagnetic...
Curated Video
routing protocols : Benefits of link state routing and Drawbacks of link state routing
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols.
Routing Introduction: Benefits of link state...
Routing Introduction: Benefits of link state...
Curated Video
CISSP®- Risk Management - Assessment Part 1
This is the first part of a two-part video that shows how to assess and manage risks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Curated Video
Migrating to Angular 2 (Video 2)
Angular 2 is a technical and conceptual overhaul of its hugely popular predecessor, AngularJS. This means that for developers who have built and maintained applications with AngularJS, and need to transition projects across to...
Curated Video
routing protocols : OSPF Hierarchy - Multiple areas
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols.
Routing Introduction: OSPF Hierarchy - Multiple...
Routing Introduction: OSPF Hierarchy - Multiple...
Curated Video
Bug Bounty Program Certification 3.1: Overview of Preparation Steps
In this video, we will have a look at the preparation steps. • Explore various technologies • Learn about ports and services information • Explore vulnerability scanning and tools
Kids’ Poems and Stories With Michael Rosen
Don't - Kids Poems and Stories With Michael Rosen
Michael Rosen performing the poem Don't. This poem comes from ‘Mustard, Custard, Grumble Belly and Gravy’ (Bloomsbury Children’s Books).<br/>