Curated Video
Macbeth 2.3 Interview: Macbeth and Lady Macbeth
This video provides a detailed analysis of a key scene in Act 2 of Shakespeare's "Macbeth," where the aftermath of King Duncan's murder unfolds. It highlights the interaction between Macbeth, Lennox, and Macduff at Macbeth's castle...
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Introduction to Linux
In this video, we will focus on Linux, starting with the Linux overview.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Adding SSH Public Keys to Linode
In this video, we will understand how to add an SSH public key to the Linode Cloud Manager.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Tools Needed - Windows installer/binary, macOS installer/binary, and Linux binaries
In this video, you will learn the tools we need to develop our React program, including Windows installer/binary, macOS installer/binary, and Linux binaries.
Curated Video
Build a Super Advanced Trading Bot on DYDX Hosted on AWS with Python - Launch EC2 Instance
In this video, we will demonstrate how to launch an AWS EC2 instance for deploying your trading bot. You will learn how to select the appropriate instance type, configure the instance settings, and launch the EC2 instance. This step is...
Curated Video
ChatGPT Voice-Powered Chatbot Build with React and FastAPI - Python and Node Version Installation Checks
In this video, we will ensure that you have the correct Python and Node versions installed for your project, and we will walk you through installation checks. This clip is from the chapter "Environment Setup - Frontend and Backend" of...
Curated Video
Real-World DevOps Project From Start to Finish - Configuring DNS on Linux
This video covers editing configuration files, configuring DNS caching, and troubleshooting common DNS issues. By the end of this section, you will have the necessary knowledge and skills to properly configure DNS on Linux systems to...
Curated Video
Real-World DevOps Project From Start to Finish - VPS
This video covers selecting a VPS provider, provisioning a virtual server, configuring networking and security settings, and accessing the VPS remotely. We will have a solid understanding of effectively utilizing VPS resources to host...
Curated Video
Real-World DevOps Project From Start to Finish - First Steps
This video covers fundamental steps such as setting up a development environment, configuring tools and dependencies, and establishing project goals. You will lay the groundwork for the DevOps journey, ensuring a foundation for...
Curated Video
Real-World DevOps Project From Start to Finish - Course Overview
This clip is from the chapter "Introduction" of the series "Real-World DevOps Project From Start To Finish".This section introduces the course and outlines the objectives and goals of the course. You will understand what to expect, the...
Curated Video
AWS Tutorial AWS Solutions Architect and SysOps Administrator - How to Install AWS CLI on Linux
This video demonstrates how to install AWS CLI on Linux. This clip is from the chapter "AWS CLI - Manage AWS Services and Resources Through AWS CLI" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This...
Curated Video
Machine Learning using Raspberry Pi: AlphaGo Edition
Need something to do while staying at home? Today, we're running a machine learning model on a Raspberry Pi 4 to show that you don't need huge computational resources to do machine learning projects.
Curated Video
Get Started with Linux Commands
This video will teach you the basic commands we will use in this course
Curated Video
Cracking WPA and WPA2 new 2
This video will explain the difference between two famous wireless protocols, and will show you a technique on cracking the passwords by deauthenticating users connected to a specific SSID
Curated Video
Dynamic Analysis
This video will explain Dynamic malware analysis in details, which is a runtime approach for analyzing malicious activities
Curated Video
Threat Modeling
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized. In this video, you will learn about...
Curated Video
SE Attack Vectors
This video will explain the various attack vectors used in social engineering
Curated Video
Static vs Dynamic Malware Analysis
The video will explain the main differences between two major approaches in analyzing malware. Static and Dynamic.
Curated Video
Open-source Intelligence (OSINT)
In this video, you will learn about OSINT (Open-source intelligence), which is a multi-methods methodology for collecting, analyzing and making decisions about data accessible in publicly available sources to be used in an intelligence...
Curated Video
Web Applications Security Overview
This video will highlight the security concerns when it comes to web applications
Curated Video
Reverse Engineer an Android Application
This is a hands on tutorial on how to reverse engineer an Android application
Curated Video
Understand Color Codings
This video will teach you the difference in Linux terminal color coding