Instructional Video0:56
All In One Social Media

Paid vs Organic Social Media Marketing - what you need to know

Higher Ed
Paid vs Organic Social Media Marketing - what you need to know
Instructional Video0:41
All In One Social Media

Long Text Posts vs Videos

Higher Ed
Long Text Posts vs Videos
Instructional Video21:29
Curated Video

AWS Security Boiled Down

Higher Ed
A general overview about AWS security architecture and tools. Learn more about VPC, EC2, S3, AIM, Security Groups, and NACLs. This video will give you a quick jump into cloud security.
Instructional Video14:46
Curated Video

25 Gate Drivers | Power Electronics

Higher Ed
25 Gate Drivers | Power Electronics
Instructional Video4:12
Curated Video

Hack Using a Rogue Access Point

Higher Ed
In this tutorial, you will learn how to create a fake wireless access point and use it to hack the users logged on to it. We will use WiFi Pineapple device.
Instructional Video3:59
Curated Video

How Does Port Scanning Work

Higher Ed
In this video, you will learn the two main techniques used in port scanning. We will be mainly using NMAP tool
Instructional Video4:06
Curated Video

Backdoor Tools Explained

Higher Ed
This video will explain how to create backdoors to attack web applications
Instructional Video7:11
Curated Video

How to Attack Modern Wireless Networks - Introduction

Higher Ed
This video is a general overview on how to attack wireless networks
Instructional Video3:56
Curated Video

Wi-Fi Security

Higher Ed
You will learn how to protect your home WiFi and be vigilant when you are using public Wifi
Instructional Video1:53
Curated Video

Extract APKs From Your Phone

Higher Ed
You will learn how to export any Android application that exists on your phone and reverse engineer it in your lab
Instructional Video10:45
Curated Video

Netcat on KALI and Windows Simplified

Higher Ed
In this video, you will learn how to easily use all the features of the powerful independent networking utility, NETCAT on Kali Linux. <b<br/>r/>

Use this ethically !!!
Instructional Video9:58
Curated Video

Create an IoT WIFI Jammer

Higher Ed
This video will show you how to create a hardware WiFi jammer to disrupt the wireless connetivity in a certain area
Instructional Video2:55
Curated Video

SSL Interception with Fake Access Point

Higher Ed
You will practice Man-In-The-Middle attack and intercept SSL traffic
Instructional Video2:45
Curated Video

Muslim Songs For Kids | Yay! We Get To Pray! ☀️ MiniMuslims

K - 5th
Yay! We Get To Pray! Lyrics:

Before we start our
day
we wash our s
leep away
At Faj
r
we will say:
<
br/>Yay! We get to
pray!
Five times a

day!
And connect w
ith Allah...
Instructional Video10:45
Curated Video

Netcat Simplified

Higher Ed
Netcat is a simple networking utility, however it can be leveraged to powerfully exploit victims. In this video you will learn how to set it up and use it
Instructional Video4:15
Curated Video

Hotspot with Fake Facebook Page

Higher Ed
In this video, you will learn how to use a fake access point to lure people into connecting to it by presenting them with a fake Facebook page
Instructional Video11:33
Curated Video

Learn ASP.NET MVC and Entity Framework (Database First) - Adding a Project to GitHub

Higher Ed
This video demonstrates how to add a project to GitHub.
<
br/>
This clip is from the chapter "Source and Package Management" of the series "Learn ASP.NET MVC and Entity Framework (Database First)".In this section, you will learn...
Instructional Video1:16
Curated Video

How to Secure Wireless Networks

Higher Ed
This video will show you how to hide your SSID on your WiFi network
Instructional Video6:44
Curated Video

Spark Programming in Python for Beginners with Apache Spark 3 - Spark Data Sources and Sinks

Higher Ed
In this video, we will cover Spark data sources and sinks.
<
br/>
This clip is from the chapter "Spark Data Sources and Sinks" of the series "Spark Programming in Python for Beginners with Apache Spark 3".In this section, you will...
Instructional Video12:31
Curated Video

Introduction to Cloud Computing - The Need for Cloud Computing

Higher Ed
This video explains the need for cloud computing.<br<br/>/>

This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
Instructional Video4:09
Curated Video

How to Identify a Solution Set for Linear Inequalities

9th - 12th
This video teaches how to graph a system of linear inequalities to find a solution. The teacher explains how to graph each inequality and how to determine the overlapping area where both inequalities intersect.
Instructional Video8:23
The Learning Depot

Catenative Verbs | A Chain of Verbs

12th - Higher Ed
Catenative verbs are verbs that connect to other verb forms and form a chain; thus their name catenative because in Latin, catena means chain. A catenative verb will link or connect to other verbs to form a chain of verbs. And in theory,...
Instructional Video3:25
Curated Video

High Five Facts - Joints

Pre-K - 5th
This video explores five fun facts about joints.
Instructional Video6:08
Curated Video

Modern Web Design with HTML5, CSS3, and JavaScript - Learning to Code in HTML

Higher Ed
This video demonstrates how to start coding in HTML.
<
br/>
This clip is from the chapter "Introduction to Getting Started with Web Design" of the series "Modern Web Design with HTML5, CSS3, and JavaScript".This section provides an...