Instructional Video5:04
Curated Video

Wireshark D4 V6 - ICMPv4 Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 6: ICMPv4 deep-dive
Instructional Video1:13
Curated Video

Port Scanning

Higher Ed
An application called a port scanner scans a server or host for open ports. Administrators may use such an application to check the network security policies, and attackers may use it to discover network services operating on a host and...
Instructional Video1:19
Curated Video

Honeypots

Higher Ed
A network-attached system called a "honeypot" is put up as a ruse to entice online criminals and detect, block, and research efforts to hack into systems and obtain illegal access.
Instructional Video2:02
Curated Video

Wireshark D4 V1 - 3 way handshake

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 1: 3-way handshake
Instructional Video4:06
Curated Video

Wireshark D3 V3 - How is traffic capturedCapture Options

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 3: Capture options
Instructional Video1:19
Curated Video

Wireshark D2 V8 - Confguration profiles

Higher Ed
DAY TWO - We will explore Wireshark interface in details - Video 8: Configuration profiles
Instructional Video1:40
Curated Video

Discover SMB Vulnerabilities

Higher Ed
Learn how to scan the network for SMB Signing vulnerabilities using the RunRinger python tool
Instructional Video8:42
Curated Video

Threats and Vulnerabilities

Higher Ed
In cybersecurity, a vulnerability is a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system. After exploiting a vulnerability, a cyberattack can run malicious code, install malware and even...
Instructional Video3:12
Curated Video

Wireshark D1 V3 - Setup Wireshark

Higher Ed
DAY ONE - We will introduce Wireshark and setup our environment - Video 3: Setup Wireshark
Instructional Video3:55
Curated Video

High Five Facts - Veins and Arteries

Pre-K - 5th
This video explores five fun facts about veins and arteries.
Instructional Video4:25
Curated Video

Wireshark D2 V5 - Toolbars

Higher Ed
DAY TWO - We will explore Wireshark interface in details - Video 5: Toolbars
Instructional Video1:50
Curated Video

LAB 11: NMAP Tool

Higher Ed
We will download and install ZENMAP, which is the GUI version of NMAP
Instructional Video5:39
Brainwaves Video Anthology

Lisa McClennon - Leadership

Higher Ed
Lisa McClennon is a Certified Fraud Examiner, Certified Corporate Compliance and Ethics Professional, and a Certified Leading Professional in Ethics and Compliance. She holds a BSc in Criminal Justice, an MSc in Human Relations and...
Instructional Video12:31
Curated Video

Introduction to Cloud Computing - The Need for Cloud Computing

Higher Ed
This video explains the need for cloud computing. This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
Instructional Video15:49
Packt

Hands-On Continuous Integration and Automation with Jenkins - Create Resources on AWS

Higher Ed
This video introduces AWS resources and jargon and shows how to create a VPC and security group and launch an EC2 instance. • Introduce AWS jargon • Create a VPC and a security group • Launch an EC2 instance This clip is from the chapter...
Instructional Video5:25
Curated Video

Spark Programming in Python for Beginners with Apache Spark 3 - Data Frame Partitions and Executors

Higher Ed
In this video, we will cover data frame partitions and executors. This clip is from the chapter "Spark Programming Model and Developer Experience" of the series "Spark Programming in Python for Beginners with Apache Spark 3".In this...
Instructional Video7:56
Curated Video

Structural Design Patterns in Modern C++ - Using Composition Instead of Inheritance

Higher Ed
This video explains how to use composition instead of inheritance. This clip is from the chapter "Decorator Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the decorator design pattern.
Instructional Video4:11
Curated Video

Structural Design Patterns in Modern C++ - Remote Proxy Introduction

Higher Ed
This video introduces you to the remote proxy. This clip is from the chapter "Proxy Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the proxy design pattern.
Instructional Video8:47
Curated Video

gRPC [Golang] Master Class Build Modern API and Microservices - HTTP/2

Higher Ed
[Theory] gRPC Internals Deep Dive: HTTP/2 This clip is from the chapter "[Theory] gRPC Internals Deep Dive" of the series "gRPC [Golang] Master Class: Build Modern API and Microservices".In this section, you are going learn about gRPC.
Instructional Video4:00
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - Encryption 101

Higher Ed
This video explains the concept of encryption in Amazon Web Services (AWS). This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about...
Instructional Video3:18
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - VPC Endpoints

Higher Ed
This video explains how to use VPC endpoints to support the Amazon Web Services (AWS) service. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you...
Instructional Video2:38
Curated Video

Cyber Security Issues

Higher Ed
This video sheds the light on some ethical issues of cyber security jobs
Instructional Video2:41
Curated Video

Security Best Practices

Higher Ed
This video will help you follow a cyber security hygiene in your personal and business life
Instructional Video10:05
Curated Video

Introduction to IT and Cybersecurity: Web Infrastructure

Higher Ed
Part 7/16 of Introduction to IT and Cybersecurity series: This video explains the basic building blocks of the Internet, including definitions of terms like ISP, NAP, IP address, DNS, URL, protocol, cloud service provider, server, and...