Instructional Video2:35
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - Introduction to Security Groups

Higher Ed
This lecture illustrates in detail security groups. You will learn about some of the key characteristics of a security group.
Instructional Video20:02
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - Hosted Software Firewalls UFW

Higher Ed
Learn how to use UFW (Uncomplicated Firewall) to manage your firewall on Ubuntu, Debian, or Arch Linux.
Instructional Video3:39
Curated Video

Real-World DevOps Project From Start to Finish - iRedMail - Part 3

Higher Ed
In this video, we take a deep dive into advanced configurations of iRedMail and learn to implement anti-spam measures, enable SSL/TLS encryption for secure communication, and establish effective backup strategies to safeguard your email...
Instructional Video4:12
Curated Video

Real-World DevOps Project From Start to Finish - Docker - Part 3

Higher Ed
This video will teach us about Docker's best practices and optimization techniques. We will discover strategies for building efficient Docker images, managing container resources, and securing our Docker environment. This clip is from...
Instructional Video7:23
Curated Video

Real-World DevOps Project From Start to Finish - Security - SSH Daemon, iptables, SSH Config, LISH Console

Higher Ed
This video provides in-depth insights into securing the DevOps environment through various measures such as securing the SSH daemon, configuring iptables for firewall protection, optimizing SSH configuration for enhanced security, and...
Instructional Video0:54
Curated Video

Detection and Response tools

Higher Ed
This video will introcude you to many technologies that serve to help you identify threatrs and respond to them
Instructional Video6:59
Curated Video

Dissecting FTP

Higher Ed
In this tutorial, you will learn the modes FTP functions under as well as their security architecture.
Instructional Video3:59
Curated Video

How Does Port Scanning Work

Higher Ed
In this video, you will learn the two main techniques used in port scanning. We will be mainly using NMAP tool
Instructional Video6:49
Curated Video

Wireshark D5 V2 - HTTP analysisFTP analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 2: FTP analysis
Instructional Video0:38
Curated Video

Managed Services

Higher Ed
An MSSP (managed security service provider) offers outsourced management and monitoring of security systems and equipment. Managed firewall, intrusion detection, virtual private network, vulnerability screening, and anti-viral services...
Instructional Video3:41
Curated Video

Firewalls and Security Appliances

Higher Ed
Any type of server appliance intended to safeguard computer networks from unauthorized traffic is referred to as a security appliance.
Instructional Video6:10
Curated Video

Bypass Firewalls by Tunneling Data and Commands over DNS new

Higher Ed
This video will teach you how to setup a Command and Control center to bypass firewall rules and control the victim over DNS traffic, which in many cases is not suspicious to anyone monitoring a network traffic.
Instructional Video1:00
Curated Video

Identity and Data Protection Tools

Higher Ed
This video will introcude you to many technologies that serve to protect your identiy and protect your data online
Instructional Video1:03
Curated Video

Endpoint Protection Tools

Higher Ed
This video will introcude you to many technologies that serve to protect your endpoints and workstations
Instructional Video0:31
Curated Video

Modern Security Solutions

Higher Ed
This video will introcude you to the state of the art cyber security tools such as IAM, DLP, CASB, WAF, SIEM
Instructional Video2:28
Curated Video

LAB 3: How to Enable a Firewall

Higher Ed
I will show you how to enable the firewall on your Windows OS
Instructional Video4:55
Curated Video

Introduction to Cloud Computing - What is SAAS , PAAS, and IAAS

Higher Ed
This video explains SAAS, PAAS, and IAAS. This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
Instructional Video0:55
Curated Video

Cloud and Network Protection tools

Higher Ed
This video will introcude you to many technologies that serve to protect your cloud and network
Instructional Video2:08
Curated Video

Structural Design Patterns in Modern C++ - Handle-Body

Higher Ed
This video discusses the handle-body idiom. This clip is from the chapter "Bridge Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the bridge design pattern. You will also learn about...
Instructional Video11:08
Curated Video

Learn JMeter from Scratch on Live Applications - Performance Testin - Step- by-Step Example to Run Tests on the Slave Machine from the Client Machine

Higher Ed
This video presents an example of how to run tests on the slave machine from the client machine. This clip is from the chapter "JMeter Distributed Mode in Running Tests in Slave Machines" of the series "Learn JMeter from Scratch on Live...
Instructional Video2:03
Curated Video

How to Protect Your Data

Higher Ed
This video introduces different techniques on how to protect your data
Instructional Video2:52
Curated Video

Bring Your Own Device (BYOD) Security

Higher Ed
The video highlights the security you need to implement when you bring your personal device to work
Instructional Video10:22
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Personnel Risk and Policies

Higher Ed
Hiring the right employees and contractors for the job always matters. Enacting internal security controls such as background checks, mandatory vacations, job rotation, and separation of duties goes a long way in ensuring the integrity...
Instructional Video7:24
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Risk Management Concepts

Higher Ed
A risk management framework aids in identifying and managing risks and is sometimes required for compliance with data privacy regulations such as GDPR and HIPAA. Organization security policies are often influenced by data privacy...