Instructional Video8:24
Curated Video

Linux Network Administration - chronyd - newer Version of NTP

Higher Ed
This video explains the chronyd daemon, the latest daemon that is used nowadays to replace the NTP daemon.
Instructional Video5:08
Curated Video

Linux Network Administration - Network Time Protocol - NTP

Higher Ed
This video explains the Network Time Protocol (NTP), which helps synchronise the computer's time to another server.
Instructional Video5:35
Curated Video

Linux Network Administration - Hostname and IP Lookup

Higher Ed
This video explains how to find the IP address if you have the hostname.
Instructional Video9:58
Curated Video

Linux Network Administration - curl and ping Commands

Higher Ed
This video explains the curl and ping commands in Linux and why we need them for troubleshooting issues.
Instructional Video9:28
Curated Video

Linux Network Administration - Network Files and Commands

Higher Ed
This video explains network files and commands that helps us configure the machine.
Instructional Video3:03
Curated Video

Linux Network Administration - Enabling Internet in Linux

Higher Ed
This video explains how to enable internet access in the virtual machine.
Instructional Video7:28
Curated Video

Fundamentals of Secure Software - Vulnerable and Outdated Components

Higher Ed
This video explores using components with known vulnerabilities.
Instructional Video3:57
Curated Video

A Detailed Guide to the OWASP Top 10 - API10:2023 Unsafe Consumption of APIs

Higher Ed
In this video, we will delve into the dangers of Unsafe Consumption of APIs, emphasizing the need for secure API usage practices.
Instructional Video12:25
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Identify Legit Apps

Higher Ed
In this video, the author shares a few tips on how to successfully navigate Google Play Store and download the right kind of application to help you identify legit apps and spot the fake apps out there. This clip is from the chapter...
Instructional Video3:20
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Google Account - Part 2

Higher Ed
In part 2 of the video, which focuses on securing your Google account, you will look at signing into other sites part of the security. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute...
Instructional Video4:51
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Google Account

Higher Ed
In this video, you will learn to secure your Google account. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section focuses on...
Instructional Video9:11
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Protecting Yourself Against SIM Card Swap Fraud

Higher Ed
In this video, you will learn how to protect yourself against SIM card swap fraud. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section talks about...
Instructional Video7:37
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Two-Factor Authentications

Higher Ed
In this video, you will learn about two-factor authentication, which is used to add an extra layer of security when logging into an account. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to...
Instructional Video9:09
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Introduction to Cookies

Higher Ed
In this video, you will be introduced to web cookies, which are pieces of text stored by a web server on your hard disk. This clip is from the chapter "Internet and Browsing Security" of the series "The Absolute Beginners Guide to...
Instructional Video9:36
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Browser Security - Brave Browser

Higher Ed
In this video, you will dive into the realm of browser security, focusing on the specific features and tools available for enhancing security while using the Brave Browser. This clip is from the chapter "Internet and Browsing Security"...
Instructional Video6:39
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Internet Privacy Tools

Higher Ed
In this video, the author talks about a few tools that you might want to start using if you are going to take your privacy seriously online; one such tool that you will learn is the Brave browser. This clip is from the chapter "Internet...
Instructional Video9:22
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Federated Directory Services

Higher Ed
Active Directory Federation Services (ADFS) allows you to pass-through the authentication of a local AD logon to access AWS resources. This video explores the concept.
Instructional Video2:41
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Why Use AWS?

Higher Ed
What can AWS do for you? Should your business transition to AWS? What are the costs and benefits? Find out in this video.
Instructional Video12:59
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Configuring Route 53 Lab

Higher Ed
Do you need to manage DNS solutions within your AWS cloud? If so, Route 53 is the tool you will use. This video explores the capabilities and features of Route 53.
Instructional Video14:08
Curated Video

The Art of Doing - Web Development for Beginners - Forms

Higher Ed
In this video, you will learn how to create HTML forms using the form tag and add different input elements to them. This clip is from the chapter "Advanced HTML Tags" of the series "The Art of Doing - Web Development for Beginners".In...
Instructional Video3:26
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Summary-2

Higher Ed
This video helps you with the summary of the entire section. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section...
Instructional Video1:47
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - How to Prevent Google Indexing from Happening

Higher Ed
This video demonstrates how to prevent Google Indexing from happening. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Instructional Video1:31
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Case Study: Microsoft Yammer Social Network

Higher Ed
This is a case study of the security testing of Microsoft Yammer social network. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Instructional Video3:13
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Insecure HTTP Web Pages

Higher Ed
This video talks about how to find insecure HTTP web pages using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...