Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Introduction to Security Groups
This lecture illustrates in detail security groups. You will learn about some of the key characteristics of a security group.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Hosted Software Firewalls UFW
Learn how to use UFW (Uncomplicated Firewall) to manage your firewall on Ubuntu, Debian, or Arch Linux.
Curated Video
Real-World DevOps Project From Start to Finish - iRedMail - Part 3
In this video, we take a deep dive into advanced configurations of iRedMail and learn to implement anti-spam measures, enable SSL/TLS encryption for secure communication, and establish effective backup strategies to safeguard your email...
Curated Video
Real-World DevOps Project From Start to Finish - Docker - Part 3
This video will teach us about Docker's best practices and optimization techniques. We will discover strategies for building efficient Docker images, managing container resources, and securing our Docker environment. This clip is from...
Curated Video
Real-World DevOps Project From Start to Finish - Security - SSH Daemon, iptables, SSH Config, LISH Console
This video provides in-depth insights into securing the DevOps environment through various measures such as securing the SSH daemon, configuring iptables for firewall protection, optimizing SSH configuration for enhanced security, and...
Curated Video
Detection and Response tools
This video will introcude you to many technologies that serve to help you identify threatrs and respond to them
Curated Video
Dissecting FTP
In this tutorial, you will learn the modes FTP functions under as well as their security architecture.
Curated Video
How Does Port Scanning Work
In this video, you will learn the two main techniques used in port scanning. We will be mainly using NMAP tool
Curated Video
Wireshark D5 V2 - HTTP analysisFTP analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 2: FTP analysis
Curated Video
Managed Services
An MSSP (managed security service provider) offers outsourced management and monitoring of security systems and equipment. Managed firewall, intrusion detection, virtual private network, vulnerability screening, and anti-viral services...
Curated Video
Firewalls and Security Appliances
Any type of server appliance intended to safeguard computer networks from unauthorized traffic is referred to as a security appliance.
Curated Video
Bypass Firewalls by Tunneling Data and Commands over DNS new
This video will teach you how to setup a Command and Control center to bypass firewall rules and control the victim over DNS traffic, which in many cases is not suspicious to anyone monitoring a network traffic.
Curated Video
Identity and Data Protection Tools
This video will introcude you to many technologies that serve to protect your identiy and protect your data online
Curated Video
Endpoint Protection Tools
This video will introcude you to many technologies that serve to protect your endpoints and workstations
Curated Video
Modern Security Solutions
This video will introcude you to the state of the art cyber security tools such as IAM, DLP, CASB, WAF, SIEM
Curated Video
LAB 3: How to Enable a Firewall
I will show you how to enable the firewall on your Windows OS
Curated Video
Introduction to Cloud Computing - What is SAAS , PAAS, and IAAS
This video explains SAAS, PAAS, and IAAS. This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
Curated Video
Cloud and Network Protection tools
This video will introcude you to many technologies that serve to protect your cloud and network
Curated Video
Structural Design Patterns in Modern C++ - Handle-Body
This video discusses the handle-body idiom. This clip is from the chapter "Bridge Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the bridge design pattern. You will also learn about...
Curated Video
Learn JMeter from Scratch on Live Applications - Performance Testin - Step- by-Step Example to Run Tests on the Slave Machine from the Client Machine
This video presents an example of how to run tests on the slave machine from the client machine. This clip is from the chapter "JMeter Distributed Mode in Running Tests in Slave Machines" of the series "Learn JMeter from Scratch on Live...
Curated Video
How to Protect Your Data
This video introduces different techniques on how to protect your data
Curated Video
Bring Your Own Device (BYOD) Security
The video highlights the security you need to implement when you bring your personal device to work
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Personnel Risk and Policies
Hiring the right employees and contractors for the job always matters. Enacting internal security controls such as background checks, mandatory vacations, job rotation, and separation of duties goes a long way in ensuring the integrity...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Risk Management Concepts
A risk management framework aids in identifying and managing risks and is sometimes required for compliance with data privacy regulations such as GDPR and HIPAA. Organization security policies are often influenced by data privacy...