1. Mini Merlin - Prototype Electronics Engineer Testing

    02:58

    from Mini Merlin / Added

    4 Plays / / 0 Comments

    The Mini Merlin started as an idea and sketch on the back of a napkin. It turned into a full blown schematic, manufactured PCB (printed circuit board), assembly of all components, and into a completed prototype. This video is our Electronics Engineer testing the Mini Merlin prototype in the office after production to make sure everything electronically functions as we wanted it to for recharging the battery, programming, resetting to factory defaults, sensing motion, sending text messages to your phone, and the functionality of the lights.

    + More details
    • CEH 18 Buffer Overflows

      01:05:00

      from Expanding Security / Added

      Taking advantage of someone else's programming mistakes is done by exploiting unprotected memory space.

      + More details
      • CEH 21 Business relevance

        34:38

        from Expanding Security / Added

        Besides the technical skills and deviousness that you must obtain as an ethical hacker must also realize you are being paid to perform a service.

        + More details
        • CEH 14 Hacking Web Applications

          30:16

          from Expanding Security / Added

          There are many different types of custom applications designed for the web. We should investigate the components of these applications.

          + More details
          • CEH 17 Intrusion Detection

            30:35

            from Expanding Security / Added

            As an ethical hacker incidents teams may be watching your every move. We need to understand how these systems Will communicate to the on site blue team.

            + More details
            • CEH 20 Metasploit Basics

              35:07

              from Expanding Security / Added

              As a professional penetration tester you will need to understand automation tools that will allow you to take the previously learned skills and apply them in an enterprise environment.

              + More details
              • CEH 15 SQL Injection

                25:55

                from Expanding Security / Added

                Under every good web application lies a database waiting to be exploited.

                + More details
                • CEH 16 Wireless

                  32:29

                  from Expanding Security / Added

                  802.11 Communications are the norm today. Understanding the basic wireless LAN, the types of security used, and how to break that security is one of the key skills of an ethical hacker.

                  + More details
                  • CEH 10 Social Engineering

                    21:45

                    from Expanding Security / Added

                    Convincing a user to act against the security policy of the organization maybe done face-to-face or via email and finally a false website.

                    + More details
                    • CEH 12 Session Hijacking

                      42:32

                      from Expanding Security / Added

                      Due to the abstraction between layers it is possible to exploit a valid computer communication to gain unauthorized access to information or services in a computer system.

                      + More details

                      What are Tags?

                      Tags

                      Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."