Instructional Video4:39
Curated Video

AZ-204 Developing for Microsoft Azure Exam Prep - Creating a Test User and Testing the Application

Higher Ed
This video explains how to create a test user and test the application. This clip is from the chapter "AZ-204 Azure Authentication" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section focuses on AZ-204 Azure...
Instructional Video1:31
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Case Study: Microsoft Yammer Social Network

Higher Ed
This is a case study of the security testing of Microsoft Yammer social network. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Instructional Video5:59
Curated Video

Microsoft Project 2021 From Beginners to Advanced - Overtime

Higher Ed
In this video, we will focus on dealing with overtime scheduling in project management. We will discover strategies for managing and accounting for overtime hours within project tasks. This clip is from the chapter "Costs" of the series...
Instructional Video3:59
Curated Video

AZ-204 Developing for Microsoft Azure Exam Prep - Testing a Structured Query Language (SQL) Database

Higher Ed
This video explains how to test an SQL database. This clip is from the chapter "AZ-204 Structured Query Language (SQL) Database" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section introduces you to AZ-204 SQL...
Instructional Video2:17
Curated Video

AZ-204 Developing for Microsoft Azure Exam Prep - Testing the Application Programming Interface (API)

Higher Ed
This video explains how to test the API. This clip is from the chapter "Consuming Azure Services" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section explains how to consume Azure services.
Instructional Video6:32
Curated Video

Pass the Hash with Mimikatz on Windows

Higher Ed
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Instructional Video4:50
Curated Video

Active Directory with Windows Server 2016 - GPO Linking

Higher Ed
Learn about implementing GPOs at forest, domain, user, and resource levels. Understand the hierarchy of GPO implementation and the processing order. This clip is from the chapter "Create and Manage Group Policy" of the series "Active...
Instructional Video1:13
Curated Video

God Mode on Windows 10

Higher Ed
redpython.{ED7BA470-8E54-465E-825C-99712043E01C}