Instructional Video9:39
Curated Video

Bug Bounty Program Certification 3.4: Find Bugs Using Network Vulnerability Scanner

Higher Ed
This video explores Nessus installation steps.<br/>
• Download Nessus network vulnerabil<br/>ity scanner
• Install <br/>process of Nessus tool
• Learn about basic scanning using Nessus
Instructional Video10:43
Curated Video

C++ Developer - Getting Started on macOS or Linux with CodeBlocks IDE

Higher Ed
This video focuses on getting started on macOS or Linux with CodeBlocks IDE.
r/>
This clip is from the chapter "Getting Started" of the series "The Complete C++ Developer Course".This section introduces the learning objectives...
Instructional Video24:21
IDG TECHtalk

Intel's anti-Mac ads: What's next for Intel?

Higher Ed
It's been a year since rumors began to swirl that Apple would sever its ties with Intel, and a few months since that transition became official. Apple has released a few Apple Silicon/M1 Macs already, and there's more in the pipeline....
Instructional Video4:03
IDG TECHtalk

How to reset the Kerberos password in Active Directory

Higher Ed
Changing the Kerberos password will help prevent golden ticket attacks on Active Directory.
Instructional Video6:35
IDG TECHtalk

What you need to know about Microsoft’s Advanced Auditing

Higher Ed
Advanced Auditing is a powerful new tool that will help track down attacker activities in Microsoft Windows environments—if you have the right license.
Instructional Video4:40
IDG TECHtalk

How to protect your network from OAuth-enabled cloud-based attacks

Higher Ed
Check your OAuth third-party authentication privileges in Microsoft 365 and Azure to prevent unauthorized access.
Instructional Video5:03
IDG TECHtalk

How to make Remote Desktop Protocol more secure

Higher Ed
Many organizations are using Microsoft’s RDP to set up remote workers. Use these tweaks to better protect those connections.
Instructional Video6:16
IDG TECHtalk

How to disable basic or legacy authentication to set up MFA in Office 365

Higher Ed
Microsoft recommends setting up multi-factor authentication in Windows 10 for better security, but you have to disable basic or legacy authentication first.
Instructional Video8:31
Packt

Installing MongoDB on Windows

Higher Ed
MongoDB and Promises (Task App): Installing MongoDB on Windows
<
br/>
This clip is from the chapter "MongoDB and Promises (Task App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In this section, you will...
Instructional Video16:22
Packt

DesiredCapabilities and RemoteWebDriver Importance

Higher Ed
This video focuses on the importance of DesiredCapabilities and RemoteWebDriver.
<
br/>
This clip is from the chapter "Cross Browser Testing with Selenium Grid" of the series "Selenium WebDriver with Java - Basics to Advanced and...
Instructional Video10:39
Curated Video

AZ-104: Microsoft Azure Administrator Full Course - Overview of Azure Services

Higher Ed
In this video, we will cover an overview of Azure services.
r/>
This clip is from the chapter "Azure Services - An Overview" of the series "AZ-104: Microsoft Azure Administrator Full Course".In this section, we will cover a...
Instructional Video3:49
Curated Video

AZ-104: Microsoft Azure Administrator Full Course - Azure Site Recovery

Higher Ed
In this video, we will cover Azure site recovery.
r/>
This clip is from the chapter "Data Protection" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains data protection and its agenda along...
Instructional Video1:52
Curated Video

C++ Programming By Example - Running Your First GUI Application

Higher Ed
In what ways can you run your GUI application?

• Run the app through Visual S
tudio
• Run the app through
PowerShell
• Run the app throug
h
File Explorer

This clip is from the chapter "Getting Acquainted...
Instructional Video26:57
Let's Tute

Scenery Mandala

9th - Higher Ed
In this video we will learn how to make mandala scenery designs
Instructional Video5:44
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Web App Vulnerability Scanning

Higher Ed
This episode shows how specialized web application vulnerability scanning tools can be used to identity security flaws in a web application.
r/>
This clip is from the chapter "Securing Dedicated Systems" of the series "CompTIA...
Instructional Video9:16
Packt

CompTIA Network+ Certification N10-007: The Total Course - Documenting Logs

Higher Ed
This video helps you examine the various log files that technicians can use to troubleshoot networks. This clip is from the chapter "Network Monitoring" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this...
Instructional Video11:23
Packt

CompTIA Network+ Certification N10-007: The Total Course - Windows Name Resolution

Higher Ed
This video explains how Windows machines figure out names of other computers on the network, through processes such as NetBIOS and LLMNR. This clip is from the chapter "Network Naming" of the series "CompTIA Network+ Certification...
Instructional Video3:46
Packt

CompTIA Network+ Certification N10-007: The Total Course - The HOSTS File

Higher Ed
This video explains the concept of the host file. This clip is from the chapter "Network Naming" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will understand the concept of DNS, how to...
Instructional Video10:13
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Physical security part 3

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Physical security part 3.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
Instructional Video5:55
Curated Video

The Complete Practical Docker Guide - Container Processes and Resources

Higher Ed
This video demonstrates the container processes and resources.
r/>
This clip is from the chapter "What is Docker and Docker Components" of the series "The Complete Practical Docker Guide".This section focuses on Docker and its...
Instructional Video0:52
Curated Video

Java Programming for Complete Beginners - Java 16 - Step 00 - Installing Java - Overview

Higher Ed
This video provides an overview of the entire section.
r/>
This clip is from the chapter "Installing Java" of the series "Java Programming for Complete Beginners - Java 16".In this section, we will install Java and set a path...
Instructional Video2:23
Curated Video

Java Programming for Complete Beginners - Java 16 - Eclipse Tip - Templates - sysout, main, fore, ifelse

Higher Ed
In this video, we will learn about Eclipse Tip - Templates - sysout, main, fore, ifelse.
r/>
This clip is from the chapter "Loops" of the series "Java Programming for Complete Beginners - Java 16".In this section, we will...
Instructional Video7:13
Curated Video

Bug Bounty Program Certification 9.2: Persistent Attack on Website Frontend

Higher Ed
In this video, learn how to perform persistent attack on websites. • Learn how to setup Lab using Mutillidae Buggy web application for persistent attack • Insert a phish website inside another website • Divert a web application to...
Instructional Video2:05
Curated Video

C++ Developer - Section Overview - Getting Started

Higher Ed
This video provides an overview of the course.<br<br/>/>

This clip is from the chapter "Getting Started" of the series "The Complete C++ Developer Course".This section introduces the learning objectives of this course.