Instructional Video2:12
Curated Video

Practical Cyber Hacking Skills for Beginners - Section Preview-5

Higher Ed
This video briefly outlines the section concepts, including a typical home network setup, DHCP and DNS, commands used in them, TCP versus UDP, and firewalls and hardening networks to prevent attacks.
Instructional Video8:19
Curated Video

Risk Management for Cyber Security Managers - Implementation of Security Controls

Higher Ed
This lesson will look at the practical methods available to implement security controls in order to avoid/mitigate risks.
Instructional Video3:56
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Anonymizer

Higher Ed
In this video, we will look at the tools and software used to make activity on the Internet untraceable.
Instructional Video9:54
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Working with Security Groups

Higher Ed
You might wonder how you can control who has access to the EC2 instances you implement. One method is with the use of security groups and this video introduces the concept.
Instructional Video6:26
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Security Groups Overview

Higher Ed
If you have worked around networking for a while, you have probably heard of groups or security groups. AWS offers security groups, but they are different from the traditional concept, and this video explains how.
Instructional Video3:39
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Dumping Database Table Entries Demo

Higher Ed
This is a demo video on how to dump database table entries. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section...
Instructional Video4:40
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - The Basics of Sqlmap Demo

Higher Ed
This is a demo video of the basics of Sqlmap. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on how...
Instructional Video7:54
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Dealing with Threats

Higher Ed
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This video covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Instructional Video7:41
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Windows Firewall

Higher Ed
Like all operating systems, Windows comes with a built-in software firewall. Unlike the firewall on your router, this firewall only protects a single system. It's important for techs – and the users they support – to understand how to...
Instructional Video10:35
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Firewall Configuration

Higher Ed
Setting up a hardware firewall is an obvious first step to making sure your network is protected. Even the most basic router has several different types of firewall settings – without proper configuration, you will either leave your...
Instructional Video8:29
Curated Video

Linux Operating System: A Complete Linux Guide for Beginners - Firewall

Higher Ed
In this video, we will discuss about firewall. This clip is from the chapter "Networking" of the series "Linux Operating System: A Complete Linux Guide for Beginners".In this section, we will cover networking, learn how to check our IP...
Instructional Video7:05
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - Network Firewalls

Higher Ed
Let's understand network firewalls, security devices used to stop or mitigate unauthorized access to private networks connected to the Internet, especially intranets.
Instructional Video3:15
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - Introduction to Firewalls

Higher Ed
You will now learn the basics of firewalls. Firewalls use stateful filtering to keep track of all incoming and outgoing connections.
Instructional Video2:35
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - Introduction to Security Groups

Higher Ed
This lecture illustrates in detail security groups. You will learn about some of the key characteristics of a security group.
Instructional Video20:02
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - Hosted Software Firewalls UFW

Higher Ed
Learn how to use UFW (Uncomplicated Firewall) to manage your firewall on Ubuntu, Debian, or Arch Linux.
Instructional Video3:39
Curated Video

Real-World DevOps Project From Start to Finish - iRedMail - Part 3

Higher Ed
In this video, we take a deep dive into advanced configurations of iRedMail and learn to implement anti-spam measures, enable SSL/TLS encryption for secure communication, and establish effective backup strategies to safeguard your email...
Instructional Video4:12
Curated Video

Real-World DevOps Project From Start to Finish - Docker - Part 3

Higher Ed
This video will teach us about Docker's best practices and optimization techniques. We will discover strategies for building efficient Docker images, managing container resources, and securing our Docker environment. This clip is from...
Instructional Video7:23
Curated Video

Real-World DevOps Project From Start to Finish - Security - SSH Daemon, iptables, SSH Config, LISH Console

Higher Ed
This video provides in-depth insights into securing the DevOps environment through various measures such as securing the SSH daemon, configuring iptables for firewall protection, optimizing SSH configuration for enhanced security, and...
Instructional Video0:54
Curated Video

Detection and Response tools

Higher Ed
This video will introcude you to many technologies that serve to help you identify threatrs and respond to them
Instructional Video6:59
Curated Video

Dissecting FTP

Higher Ed
In this tutorial, you will learn the modes FTP functions under as well as their security architecture.
Instructional Video3:59
Curated Video

How Does Port Scanning Work

Higher Ed
In this video, you will learn the two main techniques used in port scanning. We will be mainly using NMAP tool
Instructional Video6:49
Curated Video

Wireshark D5 V2 - HTTP analysisFTP analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 2: FTP analysis
Instructional Video0:38
Curated Video

Managed Services

Higher Ed
An MSSP (managed security service provider) offers outsourced management and monitoring of security systems and equipment. Managed firewall, intrusion detection, virtual private network, vulnerability screening, and anti-viral services...
Instructional Video3:41
Curated Video

Firewalls and Security Appliances

Higher Ed
Any type of server appliance intended to safeguard computer networks from unauthorized traffic is referred to as a security appliance.