Instructional Video0:46
All In One Social Media

Don't Create Another Piece Of Social Media Content WITHOUT these 3 Tools!

Higher Ed
Don't Create Another Piece Of Social Media Content WITHOUT these 3 Tools!
Instructional Video11:04
All In One Social Media

Tools that are worth EVERY PENNY as a Video Creator

Higher Ed
As we all tighten up our budgets there are some tools that are worth every penny and are a MUST for every video creator.
Instructional Video7:53
Curated Video

Father's Day Vocabulary Game | Brain Break | Hidden picture

Pre-K - K
Celebrate Father's Day with a fun vocabulary game! In this brain break activity, you will be challenged to find the hidden picture by correctly guessing words related to fathers and their special day. This game is not only entertaining...
Instructional Video21:29
Curated Video

AWS Security Boiled Down

Higher Ed
A general overview about AWS security architecture and tools. Learn more about VPC, EC2, S3, AIM, Security Groups, and NACLs. This video will give you a quick jump into cloud security.
Instructional Video1:29
Curated Video

Password Tools and Tips

Higher Ed
General tips and tools for password generation and storage
Instructional Video3:54
Curated Video

Steps to plan a successfull pentest

Higher Ed
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Instructional Video8:11
Curated Video

Hack Active Directory Database

Higher Ed
Hack the NTDS.DIT database using shadow copies, registry command, and powershell commands
Instructional Video4:06
Curated Video

Backdoor Tools Explained

Higher Ed
This video will explain how to create backdoors to attack web applications
Instructional Video1:51
Curated Video

LAB 7: How to Create Strong Passwords

Higher Ed
I will help you get started with tools to generate and store strong passwords
Instructional Video4:47
Curated Video

Collect and Visualize Data with Maltego

Higher Ed
This video will explain the poweful OSINT application called Maltego, and how you can leverage it in collecting open source data on your victim.
Instructional Video7:11
Curated Video

How to Attack Modern Wireless Networks - Introduction

Higher Ed
This video is a general overview on how to attack wireless networks
Instructional Video15:20
Curated Video

Hacking with Termux

Higher Ed
A simple tool for ethical hacking is Termux. There are numerous tools for Termux available online, so we've compiled a list of the top hacking tools for Termux along with instructions on how to use each one.
Instructional Video1:41
Curated Video

Why KALI

Higher Ed
Kali is a powerful pentest box, in this video we will explain the reasons behind its fame
Instructional Video9:11
Curated Video

Introduction to Cloud Computing - Benefits of Cloud Computing

Higher Ed
This video explains the benefits of cloud computing. This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
Instructional Video3:57
Curated Video

Modern Web Design with HTML5, CSS3, and JavaScript - Exploring Bootstrap Components

Higher Ed
This video focuses on the various Bootstrap components. This clip is from the chapter "Exploring Rapid Web Design with the Bootstrap 4 Frontend Framework" of the series "Modern Web Design with HTML5, CSS3, and JavaScript".This section...
Instructional Video1:32
Curated Video

Ultimate ASP.NET 5 Web API Development Guide - Introduction

Higher Ed
This video shows what you will learn in this course, an overview of the entire course, and the basics of API. This clip is from the chapter "Introduction to the Course" of the series "Ultimate ASP.NET Core Web API Development Guide".This...
Instructional Video5:15
Curated Video

Modern Web Design with HTML5, CSS3, and JavaScript - Tools and Resources

Higher Ed
This video highlights the required tools and resources to create a website. This clip is from the chapter "Creating a Simple Website from Scratch" of the series "Modern Web Design with HTML5, CSS3, and JavaScript".This section explains...
Instructional Video7:04
Curated Video

Learn JMeter from Scratch on Live Applications - Performance Testin - JMeter Tool Overview

Higher Ed
This video provides an overview of the JMeter tool. This clip is from the chapter "Introduction" of the series "Learn JMeter from Scratch on Live Applications - Performance Testing".This section provides an introduction to JMeter and its...
Instructional Video6:45
Packt

Learn JMeter from Scratch on Live Applications - Performance Testin - Advantages of JMeter over Other Performance Testing Tools

Higher Ed
This video explains the advantages of JMeter over other performance testing tools. This clip is from the chapter "Introduction" of the series "Learn JMeter from Scratch on Live Applications - Performance Testing".This section provides an...
Instructional Video11:57
Curated Video

Learn JMeter from Scratch on Live Applications - Performance Testin - JMeter Introduction

Higher Ed
This video provides an introduction to JMeter. This clip is from the chapter "Introduction" of the series "Learn JMeter from Scratch on Live Applications - Performance Testing".This section provides an introduction to JMeter and its...
Instructional Video12:41
Curated Video

How to Prepare and Present Your Report final mp4 new

Higher Ed
This video will teach you how to professionally present your findings to a client
Instructional Video0:52
Curated Video

I WONDER - How Did Stone Age People Make Tools?

Pre-K - 5th
This video is answering the question of how did Stone Age People make tools.
Instructional Video1:07
Curated Video

Monitoring activities control

Higher Ed
In this video, we will be discussing the importance of monitoring activities control in any organization. We will explore the various methods and tools used to monitor and control activities, including software solutions and manual...
Instructional Video3:22
Curated Video

Data masking control

Higher Ed
In this video, we will be discussing data masking control and how it can help protect sensitive information. Data masking is the process of obscuring or hiding certain data elements within a database or application. This can include...