Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - HTTP, HTTPS, SSL, and TLS
Here, you will learn about the hypertext transfer protocol, hypertext transfer protocol secure, secure sockets layer, and transport layer security, and how each one works.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Ethernet 101
This lesson will look at the ethernet protocol, referred to as the IEEE 802.3 protocol.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Hubs, Switches, and Routers
This video will look at hubs, switches, and routers, how they connect to network devices, and how they establish network connections.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - MAC Addresses and IP Addresses
In this video, we will understand machine access control and Internet Protocol addresses.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Welcome to the Course
This video outlines an introduction about the author as he explains what you will learn as the course advances and the topics covered in general.
Curated Video
Practical Cyber Hacking Skills for Beginners - Firewall and IDS Evasion Techniques
In this video, we will understand a firewall and the intrusion detecting system in NMAP for a packet or probe coming specifically from NMAP.
Curated Video
Practical Cyber Hacking Skills for Beginners - NMAP Port States
This video will teach us about the six port states: open, closed, filtered, unfiltered, closed/filtered, and open/filtered.
Curated Video
Practical Cyber Hacking Skills for Beginners - Windows 10 Firewall Demo
This video walks us through the built-in firewall of the Windows 10 operating system. The advantages of using the firewall, and how it protects the operating system.
Curated Video
Practical Cyber Hacking Skills for Beginners - Hardening Networks
Here, you will learn how to harden networks. What devices and protocols are available to harden a network from being hacked?
Curated Video
Practical Cyber Hacking Skills for Beginners - Introduction to NAT
This video is a detailed introduction to Network Address Translation, allowing computers to share the same public IP address.
Curated Video
Practical Cyber Hacking Skills for Beginners - Section Preview-5
This video briefly outlines the section concepts, including a typical home network setup, DHCP and DNS, commands used in them, TCP versus UDP, and firewalls and hardening networks to prevent attacks.
Curated Video
Risk Management for Cyber Security Managers - Implementation of Security Controls
This lesson will look at the practical methods available to implement security controls in order to avoid/mitigate risks.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Anonymizer
In this video, we will look at the tools and software used to make activity on the Internet untraceable.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - What Is Social Engineering?
Here, you will learn more about gaining unauthorized access to buildings, systems, and networks by exploiting the human psyche.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Working with Security Groups
You might wonder how you can control who has access to the EC2 instances you implement. One method is with the use of security groups and this video introduces the concept.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Security Groups Overview
If you have worked around networking for a while, you have probably heard of groups or security groups. AWS offers security groups, but they are different from the traditional concept, and this video explains how.
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Dumping Database Table Entries Demo
This is a demo video on how to dump database table entries. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - The Basics of Sqlmap Demo
This is a demo video of the basics of Sqlmap. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on how...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Dealing with Threats
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This video covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Windows Firewall
Like all operating systems, Windows comes with a built-in software firewall. Unlike the firewall on your router, this firewall only protects a single system. It's important for techs – and the users they support – to understand how to...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Firewall Configuration
Setting up a hardware firewall is an obvious first step to making sure your network is protected. Even the most basic router has several different types of firewall settings – without proper configuration, you will either leave your...
Curated Video
Linux Operating System: A Complete Linux Guide for Beginners - Firewall
In this video, we will discuss about firewall. This clip is from the chapter "Networking" of the series "Linux Operating System: A Complete Linux Guide for Beginners".In this section, we will cover networking, learn how to check our IP...
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Network Firewalls
Let's understand network firewalls, security devices used to stop or mitigate unauthorized access to private networks connected to the Internet, especially intranets.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Introduction to Firewalls
You will now learn the basics of firewalls. Firewalls use stateful filtering to keep track of all incoming and outgoing connections.