Hi, what do you want to do?
Curated Video
Bug Bounty Program Certification 3.4: Find Bugs Using Network Vulnerability Scanner
This video explores Nessus installation steps.<br/>
• Download Nessus network vulnerabil<br/>ity scanner
• Install <br/>process of Nessus tool
• Learn about basic scanning using Nessus
• Download Nessus network vulnerabil<br/>ity scanner
• Install <br/>process of Nessus tool
• Learn about basic scanning using Nessus
Curated Video
C++ Developer - Getting Started on macOS or Linux with CodeBlocks IDE
This video focuses on getting started on macOS or Linux with CodeBlocks IDE.
r/>
This clip is from the chapter "Getting Started" of the series "The Complete C++ Developer Course".This section introduces the learning objectives...
r/>
This clip is from the chapter "Getting Started" of the series "The Complete C++ Developer Course".This section introduces the learning objectives...
IDG TECHtalk
Intel's anti-Mac ads: What's next for Intel?
It's been a year since rumors began to swirl that Apple would sever its ties with Intel, and a few months since that transition became official. Apple has released a few Apple Silicon/M1 Macs already, and there's more in the pipeline....
IDG TECHtalk
How to reset the Kerberos password in Active Directory
Changing the Kerberos password will help prevent golden ticket attacks on Active Directory.
IDG TECHtalk
What you need to know about Microsoft’s Advanced Auditing
Advanced Auditing is a powerful new tool that will help track down attacker activities in Microsoft Windows environments—if you have the right license.
IDG TECHtalk
How to protect your network from OAuth-enabled cloud-based attacks
Check your OAuth third-party authentication privileges in Microsoft 365 and Azure to prevent unauthorized access.
IDG TECHtalk
How to make Remote Desktop Protocol more secure
Many organizations are using Microsoft’s RDP to set up remote workers. Use these tweaks to better protect those connections.
IDG TECHtalk
How to disable basic or legacy authentication to set up MFA in Office 365
Microsoft recommends setting up multi-factor authentication in Windows 10 for better security, but you have to disable basic or legacy authentication first.
Packt
Installing MongoDB on Windows
MongoDB and Promises (Task App): Installing MongoDB on Windows
<
br/>
This clip is from the chapter "MongoDB and Promises (Task App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In this section, you will...
<
br/>
This clip is from the chapter "MongoDB and Promises (Task App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In this section, you will...
Packt
DesiredCapabilities and RemoteWebDriver Importance
This video focuses on the importance of DesiredCapabilities and RemoteWebDriver.
<
br/>
This clip is from the chapter "Cross Browser Testing with Selenium Grid" of the series "Selenium WebDriver with Java - Basics to Advanced and...
<
br/>
This clip is from the chapter "Cross Browser Testing with Selenium Grid" of the series "Selenium WebDriver with Java - Basics to Advanced and...
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Overview of Azure Services
In this video, we will cover an overview of Azure services.
r/>
This clip is from the chapter "Azure Services - An Overview" of the series "AZ-104: Microsoft Azure Administrator Full Course".In this section, we will cover a...
r/>
This clip is from the chapter "Azure Services - An Overview" of the series "AZ-104: Microsoft Azure Administrator Full Course".In this section, we will cover a...
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Azure Site Recovery
In this video, we will cover Azure site recovery.
r/>
This clip is from the chapter "Data Protection" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains data protection and its agenda along...
r/>
This clip is from the chapter "Data Protection" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains data protection and its agenda along...
Curated Video
C++ Programming By Example - Running Your First GUI Application
In what ways can you run your GUI application?
• Run the app through Visual S
tudio
• Run the app through
PowerShell
• Run the app throug
h
File Explorer
This clip is from the chapter "Getting Acquainted...
• Run the app through Visual S
tudio
• Run the app through
PowerShell
• Run the app throug
h
File Explorer
This clip is from the chapter "Getting Acquainted...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Web App Vulnerability Scanning
This episode shows how specialized web application vulnerability scanning tools can be used to identity security flaws in a web application.
r/>
This clip is from the chapter "Securing Dedicated Systems" of the series "CompTIA...
r/>
This clip is from the chapter "Securing Dedicated Systems" of the series "CompTIA...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Documenting Logs
This video helps you examine the various log files that technicians can use to troubleshoot networks. This clip is from the chapter "Network Monitoring" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Windows Name Resolution
This video explains how Windows machines figure out names of other computers on the network, through processes such as NetBIOS and LLMNR. This clip is from the chapter "Network Naming" of the series "CompTIA Network+ Certification...
Packt
CompTIA Network+ Certification N10-007: The Total Course - The HOSTS File
This video explains the concept of the host file. This clip is from the chapter "Network Naming" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will understand the concept of DNS, how to...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Physical security part 3
CISSP Domain 3: System Architecture and Engineering: Physical security part 3.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
Curated Video
The Complete Practical Docker Guide - Container Processes and Resources
This video demonstrates the container processes and resources.
r/>
This clip is from the chapter "What is Docker and Docker Components" of the series "The Complete Practical Docker Guide".This section focuses on Docker and its...
r/>
This clip is from the chapter "What is Docker and Docker Components" of the series "The Complete Practical Docker Guide".This section focuses on Docker and its...
Curated Video
Java Programming for Complete Beginners - Java 16 - Step 00 - Installing Java - Overview
This video provides an overview of the entire section.
r/>
This clip is from the chapter "Installing Java" of the series "Java Programming for Complete Beginners - Java 16".In this section, we will install Java and set a path...
r/>
This clip is from the chapter "Installing Java" of the series "Java Programming for Complete Beginners - Java 16".In this section, we will install Java and set a path...
Curated Video
Java Programming for Complete Beginners - Java 16 - Eclipse Tip - Templates - sysout, main, fore, ifelse
In this video, we will learn about Eclipse Tip - Templates - sysout, main, fore, ifelse.
r/>
This clip is from the chapter "Loops" of the series "Java Programming for Complete Beginners - Java 16".In this section, we will...
r/>
This clip is from the chapter "Loops" of the series "Java Programming for Complete Beginners - Java 16".In this section, we will...
Curated Video
Bug Bounty Program Certification 9.2: Persistent Attack on Website Frontend
In this video, learn how to perform persistent attack on websites. • Learn how to setup Lab using Mutillidae Buggy web application for persistent attack • Insert a phish website inside another website • Divert a web application to...
Curated Video
C++ Developer - Section Overview - Getting Started
This video provides an overview of the course.<br<br/>/>
This clip is from the chapter "Getting Started" of the series "The Complete C++ Developer Course".This section introduces the learning objectives of this course.
This clip is from the chapter "Getting Started" of the series "The Complete C++ Developer Course".This section introduces the learning objectives of this course.