Curated Video
AZ-204 Developing for Microsoft Azure Exam Prep - Creating a Test User and Testing the Application
This video explains how to create a test user and test the application. This clip is from the chapter "AZ-204 Azure Authentication" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section focuses on AZ-204 Azure...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Case Study: Microsoft Yammer Social Network
This is a case study of the security testing of Microsoft Yammer social network. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Curated Video
Microsoft Project 2021 From Beginners to Advanced - Overtime
In this video, we will focus on dealing with overtime scheduling in project management. We will discover strategies for managing and accounting for overtime hours within project tasks. This clip is from the chapter "Costs" of the series...
Curated Video
AZ-204 Developing for Microsoft Azure Exam Prep - Testing a Structured Query Language (SQL) Database
This video explains how to test an SQL database. This clip is from the chapter "AZ-204 Structured Query Language (SQL) Database" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section introduces you to AZ-204 SQL...
Curated Video
AZ-204 Developing for Microsoft Azure Exam Prep - Testing the Application Programming Interface (API)
This video explains how to test the API. This clip is from the chapter "Consuming Azure Services" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section explains how to consume Azure services.
Curated Video
Pass the Hash with Mimikatz on Windows
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Curated Video
Active Directory with Windows Server 2016 - GPO Linking
Learn about implementing GPOs at forest, domain, user, and resource levels. Understand the hierarchy of GPO implementation and the processing order. This clip is from the chapter "Create and Manage Group Policy" of the series "Active...