Instructional Video3:16
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Sensitive Data in URLs

Higher Ed
This video talks about how to find sensitive data in URLs using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Instructional Video2:51
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Publicly Exposed Backup Files

Higher Ed
This video talks about how to find publicly exposed backup files using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Instructional Video3:56
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding SQL Syntax Errors

Higher Ed
This video talks about how to find SQL syntax errors using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Instructional Video2:53
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Directory Listings

Higher Ed
This video talks about how to find directory listings using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Instructional Video2:53
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-Web Application Security Testing with Google Hacking

Higher Ed
This video provides an introduction to the section. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on web...
Instructional Video16:36
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Auth | WelcomeView

Higher Ed
The WelcomeView is the first thing your users will see when they sign up for your Twitter Clone app, so it's important to make it welcoming, informative, and easy to use; in this video, we will show you how to design and implement a...
Instructional Video4:13
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Downloading Node.js

Higher Ed
This video helps you with downloading and installing Node.js and NPM.
Instructional Video5:31
Curated Video

The Art of Doing - Web Development for Beginners - Search Engine Project Part 3

Higher Ed
In this video, we will give style to our search engine name "Eramoogle", just like Google. You will learn how to add custom styles to text elements and align them according to the desired layout. This clip is from the chapter "CSS Layout...
Instructional Video3:57
Curated Video

The Art of Doing - Web Development for Beginners - Search Engine Preview

Higher Ed
In this video, we will take a quick preview of our project. You will learn how to create your own search engine layout, mimicking Google. This includes creating a thematic header, a search section, a news section with thumbnails for news...
Instructional Video4:27
Curated Video

ChatGPT for Creatives - How to Save Your Work Right Away

Higher Ed
In this video, the author talks about the importance of saving work while creating comics or manga. He also shares his personal experience of losing work and the lessons he learned from it. Finally, he offers practical tips on how to...
Instructional Video7:34
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Security

Higher Ed
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Instructional Video9:19
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Mobile Devices and E-Mail

Higher Ed
Corporate or ISP e-mail setup requires various configuration options, such as POP or IMAP for incoming mail and SMTP for outgoing mail. S/MIME was a way to encrypt e-mail attachments. Standard Google or Apple accounts are set up with a...
Instructional Video9:13
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Browser Security

Higher Ed
With the variety of browsers available to download, it's important to know where the trusted sources are. There are also many other important features to browsers such as extensions and plugins, settings, ad blockers, password managers,...
Instructional Video3:32
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Internet of Things (IoT)

Higher Ed
Author explores some of the latest and greatest networking technologies with the Internet of Things (IoT). He describes the three common wireless technologies used to connect to IoT devices, 802.11, Zigbee, and Z-wave. The author...
Instructional Video7:46
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Virtual Private Networks (VPNs)

Higher Ed
In this video, Author shows how Virtual Private Networks (VPNs) work and why people use VPN connections. He discusses the types of protocols and clients that make this work today and walks through a generic VPN setup. This clip is from...
Instructional Video13:40
Curated Video

React JS Masterclass - Go From Zero To Job Ready - Firebase Configuration / 164

Higher Ed
In this lesson, we will focus on the configuration part of the Firebase app. We will also work on receiving the information from the Firestore.
Instructional Video9:19
Curated Video

React JS Masterclass - Go From Zero To Job Ready - Firebase Setup / 163

Higher Ed
The Firebase Realtime Database is a cloud-hosted NoSQL database that lets you store and sync data between your users in real time. We will look at the setup and authentication.
Instructional Video5:27
Curated Video

React JS Masterclass - Go From Zero To Job Ready - Authentication - I / 263

Higher Ed
Firebase Authentication provides backend services, easy-to-use SDKs, and ready-made UI libraries to authenticate users to your app.
Instructional Video6:59
Curated Video

React JS Masterclass - Go From Zero To Job Ready - Firebase Introduction

Higher Ed
The Firebase Realtime Database lets you build rich, collaborative applications by allowing secure access to the database directly from client-side code.
Instructional Video4:31
Curated Video

Deep Learning - Artificial Neural Networks with Tensorflow - Why Keras?

Higher Ed
In this video, we will understand why we use Keras in this course and not TensorFlow 2. This clip is from the chapter "Machine Learning and Neurons" of the series "Deep Learning - Artificial Neural Networks with TensorFlow".In this...
Instructional Video5:45
Curated Video

Deep Learning - Computer Vision for Beginners Using PyTorch - Why Learn Any Programming Language

Higher Ed
In this video, we will first understand why we should learn any programming language. This clip is from the chapter "Optional Learning - Python Basics" of the series "Deep Learning - Computer Vision for Beginners Using PyTorch".In this...
Instructional Video8:07
Curated Video

Deep Learning - Computer Vision for Beginners Using PyTorch - Installing PyTorch

Higher Ed
In this video, you will learn how to install PyTorch using Google Colab ipynb. This clip is from the chapter "Diving into PyTorch" of the series "Deep Learning - Computer Vision for Beginners Using PyTorch".In this section, we will dive...
Instructional Video7:34
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Mobile Device Security

Higher Ed
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Instructional Video9:23
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Mobile Devices and E-Mail

Higher Ed
Corporate or ISP e-mail setup requires various configuration options, such as POP or IMAP for incoming mail and SMTP for outgoing mail. S/MIME was a way to encrypt e-mail attachments. Standard Google or Apple accounts are set up with a...