Curated Video
Linux Fundamentals - Creating and Extracting Compressed Archive Using tar and gzip
In This video demonstrates how to create and extract compressed archive using tar and gzip. This clip is from the chapter "Compressing and Sorting in Linux" of the series "Linux Fundamentals".This section provides an overview of the tar...
Curated Video
Linux Fundamentals - Copying and Moving Files and Directories
This video demonstrates how to copy and move files and directories. This clip is from the chapter "Files and Directories Management in Linux" of the series "Linux Fundamentals".This section will start off with introducing you to files...
Curated Video
Linux Fundamentals - Connecting to the Linux Server Remotely Using Secure Shell (SSH)
This video explains how to connect to the Linux server remotely using SSH. This clip is from the chapter "Networking in Linux" of the series "Linux Fundamentals".This section introduces you to networking in Linux. Then, you will learn...
Curated Video
Linux Fundamentals - Command Options
This video focuses on command options. This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux on macOS and...
Curated Video
Linux Fundamentals - Getting Help on Commands Using the Man Utility
This video focuses on getting help on commands using the man utility. This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how...
Curated Video
Linux Fundamentals - Executing Additional Commands inside the Find Operation
This video explains how to execute additional commands inside the find operation. This clip is from the chapter "Search Operations in Linux" of the series "Linux Fundamentals".This section explains the find command. You will also learn...
Curated Video
Linux Fundamentals - Enabling Secure Shell (SSH) on the Linux Server
This video demonstrates how to enable SSH on the Linux server. This clip is from the chapter "Networking in Linux" of the series "Linux Fundamentals".This section introduces you to networking in Linux. Then, you will learn about Internet...
Curated Video
Linux Fundamentals - Listing Files and Directories
This video explains how to list files and directories. This clip is from the chapter "Files and Directories Management in Linux" of the series "Linux Fundamentals".This section will start off with introducing you to files and directories...
Curated Video
Linux Fundamentals - Linux File System Structure and Navigation
This section explains the Linux file system structure and focuses on navigation. This clip is from the chapter "Files and Directories Management in Linux" of the series "Linux Fundamentals".This section will start off with introducing...
Curated Video
Linux Fundamentals - How to Send Data to STDIN and Redirect STDOUT and STDERR?
This video demonstrates how to send data to STDIN and redirect STDOUT and STDERR. This clip is from the chapter "Data Streams and Piping in Linux" of the series "Linux Fundamentals".This section will introduce you to the data streams and...
Curated Video
Linux Fundamentals - Exploring IP Address Settings
This video explores IP address settings. This clip is from the chapter "Networking in Linux" of the series "Linux Fundamentals".This section introduces you to networking in Linux. Then, you will learn about Internet Protocol (IP) and...
Curated Video
Linux Fundamentals - Creating Users Using the useradd Command
This video demonstrates how to create users using the useradd command. This clip is from the chapter "User Management and Permissions in Linux" of the series "Linux Fundamentals".This section explains user management in Linux. After...
Curated Video
Linux Fundamentals - Command Arguments
This video focuses on command arguments. This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux on macOS and...
Curated Video
Linux Fundamentals - Changing Permissions
This video demonstrates the process of changing permissions. This clip is from the chapter "User Management and Permissions in Linux" of the series "Linux Fundamentals".This section explains user management in Linux. After that, you will...
Curated Video
Linux Fundamentals - Changing Ownership of the File
This video demonstrates how to change the ownership of the file. This clip is from the chapter "User Management and Permissions in Linux" of the series "Linux Fundamentals".This section explains user management in Linux. After that, you...
Curated Video
How to Prepare and Present Your Report final mp4 new
This video will teach you how to professionally present your findings to a client
Curated Video
Android Platform
This video explains Android platform in general. It is a pre-requisite before going ahead with the other videos.
Curated Video
Injection
SQL injection is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
Broken Access Control
This video will explain the broken access attack vector on web applications and how can attackers leverage this vulnerability to gain unauthorized access
Curated Video
Android Security Architecture
A very important video that details the security architecture of an APK app and how it interacts with the Android platform
Curated Video
Ethical Hacking with Kali Linux Introduction
This video is an introduction on ethical hacking
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Access Control Schemes
Controlling access to resources begins with policies governing how credentials are managed. Permissions to use resources can be configured through Attribute-Based Access Control (ABAC), Role-Based Access Control (RBAC), Discretionary...
Packt
Introduction to computer hardware and software : New Installation - First Drive
From the section: Implementing Mass Storage. Here, we learn to implement mass storage. A brand-new system doesn’t have a bootable drive with an installed operating system. In this episode you will go through the process of setting up an...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Intrusion Detection and Prevention Systems (IDS/IPS)
Intrusion detection can detect, log, report, and send alerts when suspicious activity is detected on a host or on the network, whereas intrusion prevention can be configured to stop the suspicious activity. Anomaly detection can be...