Latest Videos
[nodejs.04] How to integrate a MariaDB database into a Node.js project
Julien Code
185 views·2 months ago
[11] Installing and understanding MariaDB and PhpMyAdmin on a Debian 13 VM
Julien Code
388 views·2 months ago
[JS.08] Learn to code in Object-Oriented Programming with Javascript
Julien Code
785 views·2 years ago
[CS05] Cyber Attaque de type credential stuffing (bourrage d’identifiants)
Julien Code
1.1K views·2 years ago
[UBS11] Principe de base d'un modèle en intelligence artificielle ( IA )
Julien Code
857 views·2 years ago
![[nodejs.06] Managing your users' connections with Node.js](https://i.ytimg.com/vi/QLT1IaO3LF4/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLCZnw0Czet2VVQOXs1DUhidqm56Gw)
![[nodejs.05] Coder une jointure N-N en API Web](https://i.ytimg.com/vi/nVrhN7oHdyg/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLDgahp0Ddpl9CvVi-_Vm3lnUA_JyQ)
![[nodejs.04] How to integrate a MariaDB database into a Node.js project](https://i.ytimg.com/vi/9313rGEVLhs/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLCwNmt5Uc-Y4dOrzDESJlYrSeuqyw)
![[nodejs.03] Calling GET and POST APIs from our web application using the fetch() method](https://i.ytimg.com/vi/QMkVB4b_PKI/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLCL23oGAbcgsD6R9YdqaGGX4M3Lgw)
![[11] Installing and understanding MariaDB and PhpMyAdmin on a Debian 13 VM](https://i.ytimg.com/vi/lrZouBgh4Wc/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLChmLwaGkcfgxbY6T4XB5lQS28Buw)
![[nodejs.02] Creating a POST route and testing with PostMan](https://i.ytimg.com/vi/KzPIPiVXezE/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAiA9mRFAwTw0dG6BHwO5do_NJjIw)
![[CS06] Pentesting 1, demonstration of a web attack and securing the Speaky.fr application](https://i.ytimg.com/vi/y_xTq0AJ2FY/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLCdPqugL5vUtEpvc0FI9Lq9e-pJEA)
![[Node.js.01] Node.js Starting an API Project with Express](https://i.ytimg.com/vi/04r9uCTd-Xk/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLC_d7rLGjh1eD2nPaEXukArp8bEZg)
![[JS.09] Comment créer une classe Javascript](https://i.ytimg.com/vi/bKLkULy8Ft0/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLDRp1XgKHRnTQm7RDd0Nj_JFCpfjg)

![[JS.08] Learn to code in Object-Oriented Programming with Javascript](https://i.ytimg.com/vi/T6abJZDKV4w/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLD6porpWZ4QJpWiuoCKYDu-Qs4XGQ)
![[R13] HTTP étude des requêtes et réponses de ce protocole](https://i.ytimg.com/vi/CHp89jImK_M/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLCBSDihnu5ENGklXRYAeHYBOx0Jxw)
![[CS05] Cyber Attaque de type credential stuffing (bourrage d’identifiants)](https://i.ytimg.com/vi/8yUFHnIBuIU/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLDBpTVVA6oACQvo8axVc_DaLmBOig)
![[React04] Données entre Composant réact Parents et Enfants, comment les passer](https://i.ytimg.com/vi/ddzzKpJ7thU/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAXrhvmZII1fPu6tJ_JH3NRsdSG1Q)
![[React03] Comprendre JSX. variable , condition et boucle](https://i.ytimg.com/vi/mXvDRPniWM0/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAFgJGSiFbS3JCoviIQpdLrvBFLUQ)
![[React02] comment coder son premier composant React.js](https://i.ytimg.com/vi/dCyVAjtA5DY/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLBQp2fsYblZzionO1r3-BsS6-7DpA)
![[React01] comment installer et comprendre le Framwork React.js](https://i.ytimg.com/vi/qKAUuejvCg4/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLB21z1P77QDZlDVMi1iAZ8x5_sXdQ)
![[tuto] Installer une VM Security Onion 2.4 sur VirtualBox 7](https://i.ytimg.com/vi/7SI9m_iT6bo/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLBU_6x29_bn6iBPxa8_2WBdVYaEKw)
![[UBS17] Les Menaces Industrielles en Cybersécurité](https://i.ytimg.com/vi/yBLSJXaq_g8/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAMBaSl2j7LXI1CBQ2qm-tuvh39XQ)
![[UBS16] La Cybersécurité dans les réseaux industriels](https://i.ytimg.com/vi/W_J9kflfi7c/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLBSvD9NlopZM8nWynvv1gAV75JzVg)
![[UBS15] Cybersécurité le CTI Cyber Threat Intelligence](https://i.ytimg.com/vi/iFFKVQJkaog/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLDF2BCVGdaJp6Q0MYm7BgWFCKe3lQ)
![[UBS14] Les logs et leurs importances dans la cybersécurité](https://i.ytimg.com/vi/dzZoAPIdpjQ/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLA_TrpJUermaMGlWkAwgbXsr7-s8g)
![[UBS13] SIEM et SOC cybersécurité](https://i.ytimg.com/vi/Ero6zPCI_pk/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLCc5DY0MTFS-58lV8iorIU_pbvVNw)
![[UBS12] Attaques et défenses des IA en cybersécurité](https://i.ytimg.com/vi/SfNzBjh77QE/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAaXdG2lq5hM5it0GkS2Jdcu2ALbA)
![[UBS11] Principe de base d'un modèle en intelligence artificielle ( IA )](https://i.ytimg.com/vi/vU5IVLNAoOg/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAlCXsJFejN0bfOWgxcjFRfY53B6Q)
![[UBS10] L'évolution de IA et les risques en cybersécurité](https://i.ytimg.com/vi/rQsCu8vP1o4/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLCX04_-C4QkfXTmmMgxERP7acfIZQ)
![[UBS09] Qualité logiciel Formation CyberSécurité Semaine 4 Partie 2](https://i.ytimg.com/vi/gW-uJUvdU6w/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLDifZLbq0c9ZgH0LtaOkurjwuHdEw)
![[UBS08] C'est quoi un Malware CyberSécurité Semaine 4 Partie 1](https://i.ytimg.com/vi/NoHgbuJFUcc/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLA6s0PMcLSFb2vTzU6PxXPCYX5oqw)
![[UBS07] Cyberdéfence Nationale ANSII Formation CyberSécurité Semaine 3 Partie 3](https://i.ytimg.com/vi/N4i_xn5rAwM/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLD92Aivgp7dkMXLPHrhrZm8-VcrfA)
![[UBS06] Droit des SSI et lutte cybercriminel Formation CyberSécurité Semaine 3 Partie 2](https://i.ytimg.com/vi/6R8OwBHCzUQ/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAWhLHwuKn7hU7fcbqN7QxMhPt9tg)