Curated Video
Execute a Phishing Attack
In this video, you will learn how to plan and execute a phishing attack using the SET tool
Curated Video
Hack an Android Phone
In this video, you will learn how to hack into an android phone by deploying a malicious application. Gain total control over the mobile phone and manage it through Armitage on KALI.
Curated Video
Firewalls and Security Appliances
Any type of server appliance intended to safeguard computer networks from unauthorized traffic is referred to as a security appliance.
Curated Video
Hashing in a Nutshell
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Curated Video
Writing a Narrative: Part 1 Structure & Elements
An Introduction to narratives. Part 1 in our series 'Planning & Writing a Narrative'. This video explains the basic structure of narratives and identifies the story elements.
Curated Video
SSL Interception
In this video, we will intercept SSL traffic by decrypting the SSL tunnel between an APK and a server
Curated Video
Install a Backdoor
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor. Use this approach ethically !!!
Curated Video
Writing a Narrative: Part 2 Language Elements
An Introduction to narratives. Part 2 in our series 'Planning & Writing a Narrative'. This video explains common language elements such as noun groups, text connectives and use of adverbs.
Curated Video
Perform a DNS Spoofing Attack
This video will teach you how to perform a DNS spoofing attack, and how to take user's URL request to a crafted web application of your own
Curated Video
Hack an Android Phone with Armitage
In this video, we will actually hack an Android phone by deploying our payload using Armitage, which is a GUI for metasploit framework.
Curated Video
How to Write an Information Report
An introduction to writing information reports. This video details the structure of an information report (introduction, body, conclusion, bibliography) as well as the language features used within an information report (present tense,...
Curated Video
Organized More Clear Signing in ASL | Listing and Ordering
Often when we describe something or give instruction it requires a list. In this video you'll learn how to structure descriptions that involve multiple instances. After this your signing will be clearer and more organized. There are...
Curated Video
History Hook: Belsen concentration camp 1945
National Archives: This video explores primary source material relating to the Belsen concentration camp Join Ela as she introduces a document related to the Bergen-Belsen concentration camp and the holocaust in Nazi Germany.
Curated Video
Bouncing back from challenges - Building resilience
This video defines resilience and describes common traits of resilient people. The video goes on to offer advice on how to develop a resilient mindset.
The Learning Depot
Surface Level Features of Expository Text | Improve Your Reading Comprehension
Effective readers use the characteristics of text to their advantage. Whether consciously or subconsciously, knowing how to use these cues to your advantage will help you to strategically read and engage with text at a more effective...
The Learning Depot
How To Answer Multiple Choice Questions | Strategies for Finding the Correct Answer Part 2
Multiple-choice questions can be tricky because they test your ability to think critically. There are strategies, however, to increase your chances of finding the best answer when taking multiple-choice tests. In this lesson, you'll...
The Learning Depot
Analytical and Expository Thesis Statements
In this video, we take a look at the analytical and expository thesis statements and compare them to the argumentative thesis statement. The purpose of your paper will determine your thesis statement. Examples are given.
Curated Video
Update, Upgrade, and Alias Commands
This video will show you how to keep your pentest box up-to-date
Curated Video
The Victorian Fireside
National Archives: The warmth and cosiness of a seat by the hearth in Victorian Britain was provided by more than just a well-laid fire. At the heart of the 19th-century home, the fireplace and its surrounds were a carefully curated...
Curated Video
Structural Design Patterns in Modern C++ - Smart Proxy
This video focuses on the smart proxy. This clip is from the chapter "Proxy Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the proxy design pattern.
Curated Video
Structural Design Patterns in Modern C++ - Pointer to IMPLementation (Plmpl) - Part I
This is the first part of the two-part video that explains the PImpl idiom. This clip is from the chapter "Bridge Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the bridge design pattern....
Brave Wilderness
Armored Lizard BITES HARD!
Mark encounters a feisty shingleback lizard on his first expedition to Western Australia! Unfortunately, the poor lizard is absolutely covered in blood sucking ticks…so Mark risks his fingers to try to remove them one by one. Will he...
Curated Video
Spark Programming in Python for Beginners with Apache Spark 3 - Execution Methods - How to Run Spark Programs?
In this video, we will cover execution methods and learn how to run Spark programs. This clip is from the chapter "Spark Execution Model and Architecture" of the series "Spark Programming in Python for Beginners with Apache Spark 3".In...