Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
146 results
Join us to learn the fundamentals of Python! It's one of the most popular and beginner-friendly programming languages, and is ...
67 views
5 months ago
Hacking SourceLair - Getting pygit2 to work.
657 views
7 years ago
Introductory CS courses often use scripting languages such as Python. A notional machine is a predictive set of abstractions ...
93 views
7 months ago
Security has gone from a curiosity to a phenomenon in the last decade. Fortunately for us, despite the rise of memory-safe, ...
13,402 views
10 years ago
Apache Spark is one of the major players if not the leader when it comes to distributed computing and processing. Want to use ...
5,446 views
5 years ago
In recent years, the use of internet-connected devices has become more prevalent in the healthcare sector, particularly as a ...
2,435 views
2 years ago
Take a look at weaknesses in Point of sale systems and the foundation of hotel key data and the Property management systems ...
5,539 views
9 years ago
Rogue access points provide attackers with powerful capabilities, but in 2016 modern privacy protections such as HTTPS ...
3,061 views
Ethical hacking involves an authorized attempt to get unauthorized access to a computer system or any software application, ...
21 views
3 years ago
You are interested in wireless hacking but have no idea where to start? In this talk you will learn about the current state of ...
7,241 views
Everyone knows that databases are the crown jewels from a hacker's point of view, but what if you could use a database as the ...
2,367 views
6 years ago
There's an escalating arms race between bots and the people who protect sites from them. Bots, or web scrapers, can be used to ...
10,487 views
With insecure low frequency RFID access control badges still in use at businesses around the world and high frequency NFC ...
22,055 views
While traveling through airports, we usually don't give a second thought about why our boarding passes are scanned at various ...
15,399 views
In this video we hear the story how Ezequiel Pereira found a critical vulnerability in Google Cloud and was awarded $164674 in ...
1,076,957 views
Traditionally the cyber attacker has an asymmetric advantage over the cyber defender. But does it have to be that way?
1,605 views
Our current administration lists "Defend Critical Infrastructure" as the #1 item in the 2023 National Cybersecurity Strategy.
2,156 views
So, you think you want to be a penetration tester, or you already are and don't understand what the difference between you and all ...
57,513 views
Materials Available ...
5,356 views
Athletes are competing in virtual cycling by riding real bikes on stationary trainers which power the in-game athletic performance.
135,246 views