Curated Video
Wireshark D4 V6 - ICMPv4 Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 6: ICMPv4 deep-dive
Curated Video
Port Scanning
An application called a port scanner scans a server or host for open ports. Administrators may use such an application to check the network security policies, and attackers may use it to discover network services operating on a host and...
Curated Video
Honeypots
A network-attached system called a "honeypot" is put up as a ruse to entice online criminals and detect, block, and research efforts to hack into systems and obtain illegal access.
Curated Video
Wireshark D4 V1 - 3 way handshake
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 1: 3-way handshake
Curated Video
Wireshark D3 V3 - How is traffic capturedCapture Options
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 3: Capture options
Curated Video
Wireshark D2 V8 - Confguration profiles
DAY TWO - We will explore Wireshark interface in details - Video 8: Configuration profiles
Curated Video
Discover SMB Vulnerabilities
Learn how to scan the network for SMB Signing vulnerabilities using the RunRinger python tool
Curated Video
Threats and Vulnerabilities
In cybersecurity, a vulnerability is a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system. After exploiting a vulnerability, a cyberattack can run malicious code, install malware and even...
Curated Video
Wireshark D1 V3 - Setup Wireshark
DAY ONE - We will introduce Wireshark and setup our environment - Video 3: Setup Wireshark
Curated Video
High Five Facts - Veins and Arteries
This video explores five fun facts about veins and arteries.
Curated Video
Wireshark D2 V5 - Toolbars
DAY TWO - We will explore Wireshark interface in details - Video 5: Toolbars
Curated Video
LAB 11: NMAP Tool
We will download and install ZENMAP, which is the GUI version of NMAP
Brainwaves Video Anthology
Lisa McClennon - Leadership
Lisa McClennon is a Certified Fraud Examiner, Certified Corporate Compliance and Ethics Professional, and a Certified Leading Professional in Ethics and Compliance. She holds a BSc in Criminal Justice, an MSc in Human Relations and...
Curated Video
Introduction to Cloud Computing - The Need for Cloud Computing
This video explains the need for cloud computing. This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
Packt
Hands-On Continuous Integration and Automation with Jenkins - Create Resources on AWS
This video introduces AWS resources and jargon and shows how to create a VPC and security group and launch an EC2 instance. • Introduce AWS jargon • Create a VPC and a security group • Launch an EC2 instance This clip is from the chapter...
Curated Video
Spark Programming in Python for Beginners with Apache Spark 3 - Data Frame Partitions and Executors
In this video, we will cover data frame partitions and executors. This clip is from the chapter "Spark Programming Model and Developer Experience" of the series "Spark Programming in Python for Beginners with Apache Spark 3".In this...
Curated Video
Structural Design Patterns in Modern C++ - Using Composition Instead of Inheritance
This video explains how to use composition instead of inheritance. This clip is from the chapter "Decorator Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the decorator design pattern.
Curated Video
Structural Design Patterns in Modern C++ - Remote Proxy Introduction
This video introduces you to the remote proxy. This clip is from the chapter "Proxy Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the proxy design pattern.
Curated Video
gRPC [Golang] Master Class Build Modern API and Microservices - HTTP/2
[Theory] gRPC Internals Deep Dive: HTTP/2 This clip is from the chapter "[Theory] gRPC Internals Deep Dive" of the series "gRPC [Golang] Master Class: Build Modern API and Microservices".In this section, you are going learn about gRPC.
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - Encryption 101
This video explains the concept of encryption in Amazon Web Services (AWS). This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about...
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - VPC Endpoints
This video explains how to use VPC endpoints to support the Amazon Web Services (AWS) service. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you...
Curated Video
Cyber Security Issues
This video sheds the light on some ethical issues of cyber security jobs
Curated Video
Security Best Practices
This video will help you follow a cyber security hygiene in your personal and business life
Curated Video
Introduction to IT and Cybersecurity: Web Infrastructure
Part 7/16 of Introduction to IT and Cybersecurity series: This video explains the basic building blocks of the Internet, including definitions of terms like ISP, NAP, IP address, DNS, URL, protocol, cloud service provider, server, and...