Decoding the OSI Model: Layers and Threats
Pertia Technologies
Decoding the OSI Model: Layers and Threats
5:32
Why Shift Left Testing is a Game-Changer in DevOps?
Pertia Technologies
Why Shift Left Testing is a Game-Changer in DevOps?
1:14
Quality Engineering:The Key to Flawless Software
Pertia Technologies
Quality Engineering:The Key to Flawless Software
0:24
Mastering databases|Easy way to learn databases|10th CBSE|Databases for beginners
Pertia Technologies
Mastering databases|Easy way to learn databases|10th CBSE|Databases for beginners
33:10
Mastering CSS JS and HTML with JSFiddle - Beginner's Guide|HTML tutorial for beginners
Pertia Technologies
Mastering CSS JS and HTML with JSFiddle - Beginner's Guide|HTML tutorial for beginners
2:51
Top 10 Web Applications Vulnerabilities explained with examples | OWASP top 10|Top 10 Security Risks
Pertia Technologies
Top 10 Web Applications Vulnerabilities explained with examples | OWASP top 10|Top 10 Security Risks
23:12
What is Web Application|Difference Between Website and Web Application|Web Basics|Web Technologies
Pertia Technologies
What is Web Application|Difference Between Website and Web Application|Web Basics|Web Technologies
8:00
Shift Left Testing | Shift Left Testing Demystified
Pertia Technologies
Shift Left Testing | Shift Left Testing Demystified
3:13
OSI Model Explained | OSI Animation | Open System Interconnection Model | OSI 7 layers
Pertia Technologies
OSI Model Explained | OSI Animation | Open System Interconnection Model | OSI 7 layers
2:44
Defend Your Digital Castle - Cybersecurity Awareness Video - Pertia Technologies
Pertia Technologies
Defend Your Digital Castle - Cybersecurity Awareness Video - Pertia Technologies
11:10
मुलांची सायबर स्क्वॉड: ऑनलाइन सुरक्षिततेच्या सफरातील आवाजणे
Pertia Technologies
मुलांची सायबर स्क्वॉड: ऑनलाइन सुरक्षिततेच्या सफरातील आवाजणे
1:19
Kids' Cyber Squad: Adventures in Online Safety
Pertia Technologies
Kids' Cyber Squad: Adventures in Online Safety
1:19
Top 10 Vulnerability Assessment and Penetration Testing Must-Haves - The essential toolkit
Pertia Technologies
Top 10 Vulnerability Assessment and Penetration Testing Must-Haves - The essential toolkit
1:35
5 Reasons businesses should implement ISO 27001
Pertia Technologies
5 Reasons businesses should implement ISO 27001
2:53
DVWA Pentesting | File Upload |Security Level High
Pertia Technologies
DVWA Pentesting | File Upload |Security Level High
6:14
DVWA Pentesting | Reflected XSS
Pertia Technologies
DVWA Pentesting | Reflected XSS
10:19
DVWA Pentesting| File Inclusion All Levels Covered
Pertia Technologies
DVWA Pentesting| File Inclusion All Levels Covered
13:13
DVWA Pentesting| CSFR | Security  All Levels covered
Pertia Technologies
DVWA Pentesting| CSFR | Security All Levels covered
12:03
DVWA Pentesting| Command Execution Security Level High
Pertia Technologies
DVWA Pentesting| Command Execution Security Level High
5:03
DVWA Pentesting| Command Execution Security level Low
Pertia Technologies
DVWA Pentesting| Command Execution Security level Low
5:03
DVWA |BruteForceAttack using Burpsuite
Pertia Technologies
DVWA |BruteForceAttack using Burpsuite
10:18
How to install Windows VM on Mac using Virtual Box ?
Pertia Technologies
How to install Windows VM on Mac using Virtual Box ?
33:26
How to install Kali Linux on Mac using Virtual Box | Unlock the Secrets of Kali Linux
Pertia Technologies
How to install Kali Linux on Mac using Virtual Box | Unlock the Secrets of Kali Linux
25:46
VAPT | Pentesting|Information Gathering|Network Scanning|Nmap|Zenmap|Ethical Hacking
Pertia Technologies
VAPT | Pentesting|Information Gathering|Network Scanning|Nmap|Zenmap|Ethical Hacking
5:53
VAPT | Pentesting|Information Gathering and Reconnaissance|Recon-ng|Nikto| web security testing
Pertia Technologies
VAPT | Pentesting|Information Gathering and Reconnaissance|Recon-ng|Nikto| web security testing
29:55
VAPT| Pentesting|VAPT process overview|Ethical hacking|Web Security Testing
Pertia Technologies
VAPT| Pentesting|VAPT process overview|Ethical hacking|Web Security Testing
17:17
Types Of Cyberattacks You Need To Be Aware Of | Cyberattacks | Cybersecurity
Pertia Technologies
Types Of Cyberattacks You Need To Be Aware Of | Cyberattacks | Cybersecurity
1:16
Flutter App Test Automation poc | Appium Flutter Driver| Flutter Finder
Pertia Technologies
Flutter App Test Automation poc | Appium Flutter Driver| Flutter Finder
11:00
Flutter application automation demo|Appium Flutter driver
Pertia Technologies
Flutter application automation demo|Appium Flutter driver
1:05
Information Security Introduction|ISO 27001:2013|Cybersecurity|Information Security Tutorial|Infosec
Pertia Technologies
Information Security Introduction|ISO 27001:2013|Cybersecurity|Information Security Tutorial|Infosec
14:13
Build Mobile App in 5 minutes| No Code Mobile App Development
Pertia Technologies
Build Mobile App in 5 minutes| No Code Mobile App Development
6:02
Create Realtime Dashboards with Ninox| Ninox Tutorial
Pertia Technologies
Create Realtime Dashboards with Ninox| Ninox Tutorial
8:41
Data Visualization  How to Create Charts in Ninox | Ninox Tutorial 10
Pertia Technologies
Data Visualization How to Create Charts in Ninox | Ninox Tutorial 10
3:11
Integration of Ninox with GMAIL using Zapier|Ninox Integrations|Zapier|Ninox Tutorial 9
Pertia Technologies
Integration of Ninox with GMAIL using Zapier|Ninox Integrations|Zapier|Ninox Tutorial 9
10:46
Build Low Code Practice with Pertia Technologies
Pertia Technologies
Build Low Code Practice with Pertia Technologies
0:42
Appian tutorial| Approval of a form| Using user Input task| using subprocess
Pertia Technologies
Appian tutorial| Approval of a form| Using user Input task| using subprocess
9:23
Ninox |Tutorial 8| Sending an email from Ninox| Using sendEmail function
Pertia Technologies
Ninox |Tutorial 8| Sending an email from Ninox| Using sendEmail function
2:58
Ninox Learning Series| Tutorial 7 |Using Formula field in Ninox
Pertia Technologies
Ninox Learning Series| Tutorial 7 |Using Formula field in Ninox
4:11
Ninox Learning Series|Tutorial 6|How to protect database|data sorting|data filtering in Ninox
Pertia Technologies
Ninox Learning Series|Tutorial 6|How to protect database|data sorting|data filtering in Ninox
7:20
Ninox Learning Series| Tutorial 5| Customize data fields|
Pertia Technologies
Ninox Learning Series| Tutorial 5| Customize data fields|
13:10
Ninox Learning Series| Tutorial 4| How to add data fields to Ninox
Pertia Technologies
Ninox Learning Series| Tutorial 4| How to add data fields to Ninox
5:41
Ninox Learning Series| Tutorial 3| Using Ninox template
Pertia Technologies
Ninox Learning Series| Tutorial 3| Using Ninox template
3:07
Ninox Learning Series | Tutorial 2 | Ninox Overview
Pertia Technologies
Ninox Learning Series | Tutorial 2 | Ninox Overview
5:21
Ninox Learning Series - Tutorial 1| Introduction to Ninox | Registration to Ninox
Pertia Technologies
Ninox Learning Series - Tutorial 1| Introduction to Ninox | Registration to Ninox
3:25
Appian Tutorial for Beginners - Quick start | Appian POC | Appian tutorial for beginners
Pertia Technologies
Appian Tutorial for Beginners - Quick start | Appian POC | Appian tutorial for beginners
16:24
Leadership lessons from Bhagvadgita | Gita Jayanti
Pertia Technologies
Leadership lessons from Bhagvadgita | Gita Jayanti
7:12
FlekziTest - A Test Management Tool
Pertia Technologies
FlekziTest - A Test Management Tool
0:51
FlekziTest1.0 Overview
Pertia Technologies
FlekziTest1.0 Overview
0:56