So you think you want to be a penetration tester.
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 93 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/36214 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
Statistical hypothesis testingBitUniverse (mathematics)Slide ruleHacker (term)Right angleProcess (computing)Level (video gaming)Self-organizationGreatest elementInformation security
02:13
WordStatistical hypothesis testingProcess (computing)BitStatistical hypothesis testingInheritance (object-oriented programming)Software testingRight angleFamilyArchaeological field surveyLecture/Conference
04:09
Statistical hypothesis testingMultiplication signMereologyBitExpert systemProcess (computing)NumberWebsitePlastikkarteJSON
07:20
NeuroinformatikProcess (computing)Multiplication signMessage passingStatistical hypothesis testingBitRight angleHacker (term)Elasticity (physics)CuboidTelecommunicationSlide ruleInternetworkingEuler anglesPhysical systemModal logicSoftware testingSystem administratorCausalityGoodness of fitRegulärer Ausdruck <Textverarbeitung>Lecture/Conference
15:01
Process (computing)System callBitLevel (video gaming)Self-organizationVideo gameLine (geometry)CryptographyPlanningSocial engineering (security)Modal logicInformation securitySpeech synthesisCuboidStatistical hypothesis testingClient (computing)Goodness of fitControl flowPhysicalismGroup actionAdaptive behaviorVulnerability (computing)MereologyOrder (biology)Hacker (term)Limit (category theory)Electronic mailing list1 (number)LinearizationRight angleTraffic reportingMultiplication signPerturbation theoryComputer clusterClosed setInsertion lossCausalityInformationFitness function
23:10
Set (mathematics)Client (computing)Process (computing)CryptographyFormal grammarPlanningBitWordMultiplication signPoint (geometry)Traffic reportingGodSingle-precision floating-point formatTwitterBoss CorporationSystem administratorExclusive orLine (geometry)SoftwareNichtlineares GleichungssystemElectronic mailing listPivot elementIP addressVulnerability (computing)Water vaporWeb pageCausalityForm (programming)Statistical hypothesis testingRight angleInsertion lossPhysical systemAmsterdam Ordnance DatumDivisorWebsiteLecture/Conference
31:19
Statistical hypothesis testingMultiplication signLevel (video gaming)SoftwareSoftware testingArithmetic meanClient (computing)Dependent and independent variablesDifferent (Kate Ryan album)Point (geometry)Right angleMoment (mathematics)LengthLatent heatVulnerability (computing)Server (computing)Film editingPhysical systemPublic key certificateVector potentialScripting languageGoodness of fitIncidence algebraCausalityLecture/Conference
36:37
NeuroinformatikPhysical systemGroup actionControl flowFormal languageTraffic reportingInstance (computer science)Process (computing)WebsiteDampingVulnerability (computing)Set (mathematics)SoftwareVideo gameClient (computing)Dependent and independent variablesStaff (military)Incidence algebraCoprocessorModule (mathematics)WritingComputer programmingFundamental theorem of algebraMultiplication signWhiteboardSoftware testingInformation securityCybersexLecture/Conference
41:56
Computer animation
Transcript: English(auto-generated)