Curated Video
Linux Network Administration - chronyd - newer Version of NTP
This video explains the chronyd daemon, the latest daemon that is used nowadays to replace the NTP daemon.
Curated Video
Linux Network Administration - Network Time Protocol - NTP
This video explains the Network Time Protocol (NTP), which helps synchronise the computer's time to another server.
Curated Video
Linux Network Administration - Hostname and IP Lookup
This video explains how to find the IP address if you have the hostname.
Curated Video
Linux Network Administration - curl and ping Commands
This video explains the curl and ping commands in Linux and why we need them for troubleshooting issues.
Curated Video
Linux Network Administration - Network Files and Commands
This video explains network files and commands that helps us configure the machine.
Curated Video
Linux Network Administration - Enabling Internet in Linux
This video explains how to enable internet access in the virtual machine.
Curated Video
Fundamentals of Secure Software - Vulnerable and Outdated Components
This video explores using components with known vulnerabilities.
Curated Video
A Detailed Guide to the OWASP Top 10 - API10:2023 Unsafe Consumption of APIs
In this video, we will delve into the dangers of Unsafe Consumption of APIs, emphasizing the need for secure API usage practices.
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Identify Legit Apps
In this video, the author shares a few tips on how to successfully navigate Google Play Store and download the right kind of application to help you identify legit apps and spot the fake apps out there. This clip is from the chapter...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Google Account - Part 2
In part 2 of the video, which focuses on securing your Google account, you will look at signing into other sites part of the security. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Google Account
In this video, you will learn to secure your Google account. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section focuses on...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Protecting Yourself Against SIM Card Swap Fraud
In this video, you will learn how to protect yourself against SIM card swap fraud. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section talks about...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Two-Factor Authentications
In this video, you will learn about two-factor authentication, which is used to add an extra layer of security when logging into an account. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Introduction to Cookies
In this video, you will be introduced to web cookies, which are pieces of text stored by a web server on your hard disk. This clip is from the chapter "Internet and Browsing Security" of the series "The Absolute Beginners Guide to...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Browser Security - Brave Browser
In this video, you will dive into the realm of browser security, focusing on the specific features and tools available for enhancing security while using the Brave Browser. This clip is from the chapter "Internet and Browsing Security"...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Internet Privacy Tools
In this video, the author talks about a few tools that you might want to start using if you are going to take your privacy seriously online; one such tool that you will learn is the Brave browser. This clip is from the chapter "Internet...
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Federated Directory Services
Active Directory Federation Services (ADFS) allows you to pass-through the authentication of a local AD logon to access AWS resources. This video explores the concept.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Why Use AWS?
What can AWS do for you? Should your business transition to AWS? What are the costs and benefits? Find out in this video.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Configuring Route 53 Lab
Do you need to manage DNS solutions within your AWS cloud? If so, Route 53 is the tool you will use. This video explores the capabilities and features of Route 53.
Curated Video
The Art of Doing - Web Development for Beginners - Forms
In this video, you will learn how to create HTML forms using the form tag and add different input elements to them. This clip is from the chapter "Advanced HTML Tags" of the series "The Art of Doing - Web Development for Beginners".In...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Summary-2
This video helps you with the summary of the entire section. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - How to Prevent Google Indexing from Happening
This video demonstrates how to prevent Google Indexing from happening. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Case Study: Microsoft Yammer Social Network
This is a case study of the security testing of Microsoft Yammer social network. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Insecure HTTP Web Pages
This video talks about how to find insecure HTTP web pages using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...