Instructional Video3:54
Curated Video

Beyond The Textbooks

12th - Higher Ed
Physicist Paul Steinhardt, Princeton University, describes his early experiences that led him on the road towards the discovery of so-called quasicrystals, a new state of matter.
Instructional Video4:12
Curated Video

The Mentalizing Brain

12th - Higher Ed
UCL developmental psychologist Uta Frith describes how she used brain scanning technology to illustrate that the brain uses specific networks when involved in so-called “mentalizing activities” central to understanding autism.
Instructional Video5:12
Curated Video

Out of Thin Air

12th - Higher Ed
Psychologist and memory scientist Elizabeth Loftus (UC Irvine) describes her confusion at the scientific basis for so-called "repressed memory therapy," and how her puzzlement led to future research avenues.
Instructional Video5:12
Curated Video

Networks, Limbic Tissue & Memory

12th - Higher Ed
Cognitive scientist Lisa Feldman Barrett (Northeastern) highlights the key roles that brain networks play in key areas of cognition, including memory.
Instructional Video2:41
Global Health with Greg Martin

How to survive your MPH

Higher Ed
If you're about to or have started a Master of Public Health degree or MSc Public Health, then this video will talk you through what you need to do to get the most out of the experience. Public Health includes health promotion, health...
Instructional Video3:58
Curated Video

Wireshark D2 V7 - Global prefrences

Higher Ed
DAY TWO - We will explore Wireshark interface in details - Video 7: Configure global preferences
Instructional Video7:02
Curated Video

Wireshark D4 V4 - IPv4 Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 4: IPv4 deep-dive
Instructional Video6:52
Curated Video

Wireshark D2 V6 - Statistics Menu

Higher Ed
DAY TWO - We will explore Wireshark interface in details - Video 6: Statistics menu
Instructional Video3:54
Curated Video

Steps to plan a successfull pentest

Higher Ed
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Instructional Video15:32
Curated Video

Create a Simple SIEM

Higher Ed
Learn the basic feature of SIEM solutions; logs aggregation using Powershell commands.
Instructional Video3:43
Curated Video

Identify a DNS Zone Transfer Vulnerability

Higher Ed
Learn how to check for the DNS zone transfer vulnerability, a serious weakness that might lead to fully leaking your domain information.
Instructional Video2:35
Curated Video

Wireshark D1 V2 - Wireshark Throughout History

Higher Ed
DAY ONE - We will introduce Wireshark and setup our environment - Video 2: Wireshark throughout history
Instructional Video4:40
Curated Video

Types of Attackers and Cybersecurity Professionals

Higher Ed
In the field of information security, there are three well-known categories of hackers: black hats, white hats, and grey hats. In an effort to set themselves apart from one another and distinguish the good hackers from the evil, hackers...
Instructional Video3:40
Curated Video

Wireshark D3 V1 - How is traffic captured

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 1: How is traffic captured
Instructional Video2:46
Curated Video

How to Detect Attacks

Higher Ed
standard software and files that won't run or open. Without your knowledge, files have been removed or their contents have changed. Passwords have unexpectedly changed, you discover. Unknown software arrives or starts installing all of a...
Instructional Video2:30
Curated Video

Security Playbooks Benefits

Higher Ed
A cybersecurity playbook is a comprehensive, company-wide guideline that specifies exactly what steps to take in the event of data loss.
Instructional Video4:09
Curated Video

Why a Regular Domain User Can be a Real Security Threat

Higher Ed
In this video you will learn about the reasons why a regular domain user can be a real danger to your environment, and why those generic and shared Active Directory accounts should not exist.
Instructional Video6:49
Curated Video

Wireshark D5 V2 - HTTP analysisFTP analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 2: FTP analysis
Instructional Video2:48
Curated Video

Wireshark D1 V1 - Master Wireshark Overview

Higher Ed
DAY ONE - We will introduce Wireshark and setup our environment - Video 1: Overview
Instructional Video0:38
Curated Video

Managed Services

Higher Ed
An MSSP (managed security service provider) offers outsourced management and monitoring of security systems and equipment. Managed firewall, intrusion detection, virtual private network, vulnerability screening, and anti-viral services...
Instructional Video3:58
Curated Video

Wireshark D5 V7 - HTTP analysisTroubleshoot your network

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 7: Troubleshoot your network
Instructional Video3:41
Curated Video

Firewalls and Security Appliances

Higher Ed
Any type of server appliance intended to safeguard computer networks from unauthorized traffic is referred to as a security appliance.
Instructional Video3:09
Curated Video

Wireshark D3 V7 - Expressions and buttons

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 7: Expressions and buttons
Instructional Video5:43
Curated Video

No Password !! No Issue, You Can Still Hack

Higher Ed
No Password !! No Issue, You Can Still Hack