Curated Video
Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Curated Video
Bug Bounty Program Certification 5.5: Perform Brute Force Attack on File Transfer Protocol
This video will help you perform brute force attack on file transfer protocol. • Setup FTP in Windows10 machine • Explore Hydra commands for brute force attack • Learn about brute force attack on FTP to get login credentials
Curated Video
Cloud Native Development on Azure with Java 2.6: Deploy Your App to an Azure App Service Instance
In this video, we will show you how to deploy the Spring Boot app to Azure. So, you will be able to migrate your locally running app to Azure Web Apps. • Created an Azure web application hosted within the Azure App Service • Use the KUDU...
Curated Video
Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4
Exam questions. • Practice questions • Solutions • Explanation of answer
Curated Video
.NET Core Microservices - Entity Models for Shopping Cart API
This video explains the entity models for shopping cart API. This clip is from the chapter "Shopping Cart API Service" of the series ".NET Core Microservices - The Complete Guide (.NET 6 MVC)".In this section, you will learn about...
Curated Video
.NET Core Microservices - Configuring Clients in Identity Server
This video explains configuring clients in identity server. This clip is from the chapter "Identity Server" of the series ".NET Core Microservices - The Complete Guide (.NET 6 MVC)".In this section, you will learn about identity server.
Curated Video
.NET Core Microservices - AutoMapper Configuration in Product API
This video explains the concept of AutoMapper configuration in product API. This clip is from the chapter "Products API Advance Setup" of the series ".NET Core Microservices - The Complete Guide (.NET 6 MVC)".In this section, you will...
Curated Video
.NET Core Microservices - Configure Shopping Cart API with New Methods
This video explains how to configure shopping cart API with new methods. This clip is from the chapter "Consume Coupon API" of the series ".NET Core Microservices - The Complete Guide (.NET 6 MVC)".In this section, you will learn about...
Curated Video
Learn and Master C Programming - #include': Angle Brackets (<>) versus Double Quotes ("")
In C, the angle brackets ask the C preprocessor to look for a header file in a directory other than the current one. This clip is from the chapter "Preprocessor Directives" of the series "Learn and Master C Programming For Absolute...
Curated Video
Learn and Master C Programming - Pointers and Strings: Beware of Attempting to Modify Read-Only Memory!
We will learn about strings and pointers and how to avoid pointer-related issues like access violation when we try to modify a string that is stored inside read-only (or write-protected) memory. This clip is from the chapter "Pointers"...
Curated Video
Learn and Master C Programming - Working with single-dimension arrays in C/C++
We will see how we can declare and process a single-dimensional array in C/C++. This clip is from the chapter "Arrays" of the series "Learn and Master C Programming For Absolute Beginners!".In this section, we will look at how to declare...
Curated Video
Ensemble Machine Learning Techniques 4.2: AdaBoost Algorithm
This video aims to teach the viewer details about one of the Boosting techniques called AdaBoost. • We go into the details of the AdaBoost algorithm • We see how to calculate model coefficients • We see how to calculate model weights
Curated Video
Ensemble Machine Learning Techniques 5.1: Overview of Stacking Technique
This video talks about a commonly used and helpful ensemble technique called stacking. • We get an introduction to stacking technique • We discuss how stacking works • Look at a similar approach to stacking called blending
Curated Video
Python for Network Forensics 2.3: Querying the Registry
In this video, we will become familiar with the Windows registry and how the key:value data store maintains OS configuration data. • Learn how to interact with the registry using regedit • Use Python to interact with the registry by...
Packt
Advanced Computer Vision Projects 3.3: Multi-Person Pose Detection
In this video, we run a more advanced model to count the number of people and extract poses from more complex images. • Run more advanced ArtTrack model • Apply to model to multiperson images • Visualize the results
Curated Video
Java 11 Programming for Beginners 1.1: The Course Overview
This video provides an overview of the entire course.
Curated Video
Serverless JavaScript Projects 3.1: Sign Up for Twilio and Determine the SMS Phone Number
We need a Twilio account and a project built in Twilio with a phone number to SMS to. • Sign in to twilio.com and sign up for account • Build a project in Twilio for SMS messaging • Get the phone number that will be used to send SMS...
Curated Video
Learning D3.JS 5.0 9.3: Drawing a Path Between Two Points
In this video, we will learn how to draw a path between nodes. • Create more variables inside the main function • Create nodes and circles • Create labels for the nodes
Curated Video
Learning D3.JS 5.0 4.2: What Is Data?
In this video, we will learn what data is in D3.js. • Get a general idea of what data is • Get a deeper understanding of data • Understand how to have data in D3.js
Curated Video
Learning D3.JS 5.0 2.5: Creating Lines
In this video, we will learn how to create lines. • Code a line • Fix the problem with not viewing the line • Find out how to set many shapes inside the same SVG
Curated Video
Bug Bounty Program Certification 13.4: Certification Exam Practice Questions – Part 3
Exam questions. • Practice questions • Solutions • Explanation of answer
Curated Video
Bug Bounty Program Certification 9.3: Non-persistent Attack on Websites Frontend
In this video, you will perform non - persistent attack on websites. • Setup Lab using Mutillidae Buggy web application for non-persistent attack • Explore non-persistent XSS attack using popup box generation • Learn about cookie...
Curated Video
Bug Bounty Program Certification 7.2: Install DVWA Framework In Kali Linux
This video will help you host DVWA (Buggy Application). • Explore DVWA application • Download DVWA in Kali Linux • DVWA hosting in server
Curated Video
Bug Bounty Program Certification 7.1: Install Web Server in Kali Linux
In this video, you will learn about Xampp installation. • Learn about Xampp • Download Xampp server in Kali Linux • Installation of Xampp server in Kali Linux OS