Instructional Video7:45
Curated Video

Linux Fundamentals - Creating and Extracting Compressed Archive Using tar and gzip

Higher Ed
In This video demonstrates how to create and extract compressed archive using tar and gzip. This clip is from the chapter "Compressing and Sorting in Linux" of the series "Linux Fundamentals".This section provides an overview of the tar...
Instructional Video8:52
Curated Video

Linux Fundamentals - Copying and Moving Files and Directories

Higher Ed
This video demonstrates how to copy and move files and directories. This clip is from the chapter "Files and Directories Management in Linux" of the series "Linux Fundamentals".This section will start off with introducing you to files...
Instructional Video8:12
Curated Video

Linux Fundamentals - Connecting to the Linux Server Remotely Using Secure Shell (SSH)

Higher Ed
This video explains how to connect to the Linux server remotely using SSH. This clip is from the chapter "Networking in Linux" of the series "Linux Fundamentals".This section introduces you to networking in Linux. Then, you will learn...
Instructional Video8:12
Curated Video

Linux Fundamentals - Command Options

Higher Ed
This video focuses on command options. This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux on macOS and...
Instructional Video6:41
Curated Video

Linux Fundamentals - Getting Help on Commands Using the Man Utility

Higher Ed
This video focuses on getting help on commands using the man utility. This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how...
Instructional Video6:32
Curated Video

Linux Fundamentals - Executing Additional Commands inside the Find Operation

Higher Ed
This video explains how to execute additional commands inside the find operation. This clip is from the chapter "Search Operations in Linux" of the series "Linux Fundamentals".This section explains the find command. You will also learn...
Instructional Video6:38
Curated Video

Linux Fundamentals - Enabling Secure Shell (SSH) on the Linux Server

Higher Ed
This video demonstrates how to enable SSH on the Linux server. This clip is from the chapter "Networking in Linux" of the series "Linux Fundamentals".This section introduces you to networking in Linux. Then, you will learn about Internet...
Instructional Video9:36
Curated Video

Linux Fundamentals - Listing Files and Directories

Higher Ed
This video explains how to list files and directories. This clip is from the chapter "Files and Directories Management in Linux" of the series "Linux Fundamentals".This section will start off with introducing you to files and directories...
Instructional Video10:06
Curated Video

Linux Fundamentals - Linux File System Structure and Navigation

Higher Ed
This section explains the Linux file system structure and focuses on navigation. This clip is from the chapter "Files and Directories Management in Linux" of the series "Linux Fundamentals".This section will start off with introducing...
Instructional Video11:01
Curated Video

Linux Fundamentals - How to Send Data to STDIN and Redirect STDOUT and STDERR?

Higher Ed
This video demonstrates how to send data to STDIN and redirect STDOUT and STDERR. This clip is from the chapter "Data Streams and Piping in Linux" of the series "Linux Fundamentals".This section will introduce you to the data streams and...
Instructional Video9:59
Curated Video

Linux Fundamentals - Exploring IP Address Settings

Higher Ed
This video explores IP address settings. This clip is from the chapter "Networking in Linux" of the series "Linux Fundamentals".This section introduces you to networking in Linux. Then, you will learn about Internet Protocol (IP) and...
Instructional Video14:18
Curated Video

Linux Fundamentals - Creating Users Using the useradd Command

Higher Ed
This video demonstrates how to create users using the useradd command. This clip is from the chapter "User Management and Permissions in Linux" of the series "Linux Fundamentals".This section explains user management in Linux. After...
Instructional Video9:36
Curated Video

Linux Fundamentals - Command Arguments

Higher Ed
This video focuses on command arguments. This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux on macOS and...
Instructional Video14:07
Curated Video

Linux Fundamentals - Changing Permissions

Higher Ed
This video demonstrates the process of changing permissions. This clip is from the chapter "User Management and Permissions in Linux" of the series "Linux Fundamentals".This section explains user management in Linux. After that, you will...
Instructional Video10:02
Curated Video

Linux Fundamentals - Changing Ownership of the File

Higher Ed
This video demonstrates how to change the ownership of the file. This clip is from the chapter "User Management and Permissions in Linux" of the series "Linux Fundamentals".This section explains user management in Linux. After that, you...
Instructional Video12:41
Curated Video

How to Prepare and Present Your Report final mp4 new

Higher Ed
This video will teach you how to professionally present your findings to a client
Instructional Video1:24
Curated Video

Android Platform

Higher Ed
This video explains Android platform in general. It is a pre-requisite before going ahead with the other videos.
Instructional Video3:13
Curated Video

Injection

Higher Ed
SQL injection is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Instructional Video1:08
Curated Video

Broken Access Control

Higher Ed
This video will explain the broken access attack vector on web applications and how can attackers leverage this vulnerability to gain unauthorized access
Instructional Video1:54
Curated Video

Android Security Architecture

Higher Ed
A very important video that details the security architecture of an APK app and how it interacts with the Android platform
Instructional Video1:55
Curated Video

Ethical Hacking with Kali Linux Introduction

Higher Ed
This video is an introduction on ethical hacking
Instructional Video6:50
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Access Control Schemes

Higher Ed
Controlling access to resources begins with policies governing how credentials are managed. Permissions to use resources can be configured through Attribute-Based Access Control (ABAC), Role-Based Access Control (RBAC), Discretionary...
Instructional Video5:24
Packt

Introduction to computer hardware and software : New Installation - First Drive

Higher Ed
From the section: Implementing Mass Storage. Here, we learn to implement mass storage. A brand-new system doesn’t have a bootable drive with an installed operating system. In this episode you will go through the process of setting up an...
Instructional Video13:03
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Intrusion Detection and Prevention Systems (IDS/IPS)

Higher Ed
Intrusion detection can detect, log, report, and send alerts when suspicious activity is detected on a host or on the network, whereas intrusion prevention can be configured to stop the suspicious activity. Anomaly detection can be...