Channel Avatar

FREE COURSES @UCdBsjpUp9I57dHA44rQucyg@youtube.com

549 subscribers - no pronouns :c

More from this channel (soon)


03:37
11.Prompt Priming Setting the Stage | ChatGPT and Prompt Engineering Mastery
01:15
10.Introduction to Section 3 | ChatGPT and Prompt Engineering Mastery
02:33
9.Balancing OpenEnded and ClosedEnded Questions | ChatGPT and Prompt Engineering Mastery
07:21
8.Sample Prompts Constructed with the Prompt Framework | ChatGPT and Prompt Engineering Mastery
02:20
7.Structuring Your Prompts Effectively Introduction to Prompt Framework | ChatGPT and Prompt
01:43
6.Clarity and Specificity | ChatGPT and Prompt Engineering Mastery
01:01
5.Inroduction to Section 2 | ChatGPT and Prompt Engineering Mastery
01:14
4.Realistic Expectations | ChatGPT and Prompt Engineering Mastery
02:22
3.What is Prompt Engineering | ChatGPT and Prompt Engineering Mastery
01:26
2.What Can ChatGPT Do For You | ChatGPT and Prompt Engineering Mastery
02:53
1.Welcome to Our Course | ChatGPT and Prompt Engineering Mastery
37:54
29.Merging and Upgrading To and With Windows Server 2022 | Mastering Windows Server
53:13
28.DNS | Mastering Windows Server
37:17
27.Active Directory Sites and Services | Mastering Windows Server
36:15
26.Active Directory Domains and Trusts | Mastering Windows Server
07:57
25.Working with Active Directory Administrative Center | Mastering Windows Server
45:49
24.Maintain The Database Of Active Directory | Mastering Windows Server
01:09:32
23.Group Policy Objects (GPOs) using Group Policy Management Console | Mastering Windows Server
35:28
22.How to Manage and Control AD From a Client Machine (RSAT) | Mastering Windows Server
01:18:19
21.Active Directory Users and Computers In Depth | Mastering Windows Server
06:52
20.A Brief Overview Of All Active Directory Consoles | Mastering Windows Server
06:27
19.Installing AD back on Server1 The Proper Way | Mastering Windows Server
08:15
18.Demoting Both DCs | Mastering Windows Server
23:52
17.RODC | Mastering Windows Server
06:29
16.Getting AD Back on the 1st Server To Continue | Mastering Windows Server
34:09
15.Removing Active Directory (Demoting a DCGC) | Mastering Windows Server
56:04
14.FSMO Roles | Mastering Windows Server
18:54
13.The Difference between 1st and 2nd Server Including Replication | Mastering Windows Server
54:45
12.Installing Active Directory On Multiple Windows Server for Redundancy | Mastering Windows Server
07:01
11.Testing Connectivity Between all Systems (Server 2019,10) | Mastering Windows Server
11:51
10.Change Computer and Server Names and Setting Up IP Addresses | Mastering Windows Server
11:18
9.Installing Two Copies of Windows 10 Part2 | Mastering Windows Server
04:35
8.Installing Two Copies of Windows 10 Part1 | Mastering Windows Server
06:43
7.Installing Windows Server 2019 Part2 | Mastering Windows Server
08:19
6.Installing Windows Server 2019 Part1 | Mastering Windows Server
08:11
5.Download the ISOs of Windows Server | Mastering Windows Server
01:20
4.Download and Install VMware Player Part2 | Mastering Windows Server
06:20
3.Download and Install VMware Player Part1 | Mastering Windows Server
03:49
2.What is AD , DNS and GPOs | Mastering Windows Server
02:13
1.Intro To The Entire Course | Mastering Windows Server
00:36
Course Wrap Up
51:08
21.Foundations of Cryptography | Ethical Hacking
01:04:52
20.Cloud Computing Security | Ethical Hacking
24:36
19.OT Hacking | Ethical Hacking
30:48
18.IoT Hacking | Ethical Hacking
33:13
17.Mobile Platform Hacking | Ethical Hacking
01:01:05
16.Hacking Wireless Networks | Ethical Hacking
38:07
15.SQL Injection | Ethical Hacking
02:06:37
14.Hacking Web Applications | Ethical Hacking
33:38
13.Hacking Web Servers | Ethical Hacking
21:51
12.Evading Security Measures | Ethical Hacking
27:29
11.Session Hijacking | Ethical Hacking
23:05
10.Denial-of-Service | Ethical Hacking
29:22
9.Social Engineering | Ethical Hacking
51:14
8.Malware Threats | Ethical Hacking
01:07:48
7.Hacking Methodology | Ethical Hacking
29:47
6.Vulnerability Analysis | Ethical Hacking
45:42
5.Enumeration | Ethical Hacking
01:01:21
4.Scanning Networks | Ethical Hacking
01:14:35
3.Footprinting and Reconnaissance | Ethical Hacking