Hi, what do you want to do?
Curated Video
Describe cyber attacks that could affect a computer system or network : Installation of Virtual Machines
From the section: Introducing Network Security.This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Curated Video
Describe cyber attacks that could affect a computer system or network : The Course Overview
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Hough transform – practical example in python
From the section: Computer Vision Basics: Part 2. In this section, we’ll explore the some addtiional features of Computer Vision.<b<br/>r/>
Computer Vision Basics: Part 2: [Activity] Hough transform – practical example in python
Computer Vision Basics: Part 2: [Activity] Hough transform – practical example in python
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Python Basics: Looping and an Exercise
From the section: Python Crash Course [Optional]. In this section, we’ll continue diving into Python data structures with tuples and dictionaries, functions, Boolean Operations and Loops, and libraries like Pandas, MatPlotLib and...
Curated Video
How to Create an Interactive Game in PowerPoint
This video demonstrates how to create an interactive "Guess the Phrase" game show using Microsoft PowerPoint. The game involves students guessing letters to reveal a word related to a topic, making it an engaging resource for classroom...
Curated Video
Generate Random Words in PowerPoint from Text File
This video is a tutorial on how to create a resource using VBA in PowerPoint. The resource allows students to generate random pairs of words from a text file and challenges them to come up with a sentence connecting the two words. The...
Packt
Introduction to computer hardware and software : System Setup
From the section: Firmware. In this section, we learn about BIOS, POST and system setup. A small system-setup program built into the motherboard firmware enables techs to configure low-level features and options for the system’s...
Curated Video
Ensemble Machine Learning Techniques 4.2: AdaBoost Algorithm
This video aims to teach the viewer details about one of the Boosting techniques called AdaBoost. • We go into the details of the AdaBoost algorithm • We see how to calculate model coefficients • We see how to calculate model weights
Curated Video
Ensemble Machine Learning Techniques 5.1: Overview of Stacking Technique
This video talks about a commonly used and helpful ensemble technique called stacking. • We get an introduction to stacking technique • We discuss how stacking works • Look at a similar approach to stacking called blending
Curated Video
Python for Network Forensics 2.3: Querying the Registry
In this video, we will become familiar with the Windows registry and how the key:value data store maintains OS configuration data. • Learn how to interact with the registry using regedit • Use Python to interact with the registry by...
Packt
Advanced Computer Vision Projects 3.3: Multi-Person Pose Detection
In this video, we run a more advanced model to count the number of people and extract poses from more complex images. • Run more advanced ArtTrack model • Apply to model to multiperson images • Visualize the results
Curated Video
Java 11 Programming for Beginners 1.1: The Course Overview
This video provides an overview of the entire course.
Curated Video
Serverless JavaScript Projects 3.1: Sign Up for Twilio and Determine the SMS Phone Number
We need a Twilio account and a project built in Twilio with a phone number to SMS to. • Sign in to twilio.com and sign up for account • Build a project in Twilio for SMS messaging • Get the phone number that will be used to send SMS...
Curated Video
Learning D3.JS 5.0 9.3: Drawing a Path Between Two Points
In this video, we will learn how to draw a path between nodes. • Create more variables inside the main function • Create nodes and circles • Create labels for the nodes
Curated Video
Learning D3.JS 5.0 4.2: What Is Data?
In this video, we will learn what data is in D3.js. • Get a general idea of what data is • Get a deeper understanding of data • Understand how to have data in D3.js
Curated Video
Learning D3.JS 5.0 2.5: Creating Lines
In this video, we will learn how to create lines.<br/>
• <br/>Code a line
• Fix the problem wit<br/>h not viewing the line
• Find out how to se<br/>t many shapes inside the same SVG
• <br/>Code a line
• Fix the problem wit<br/>h not viewing the line
• Find out how to se<br/>t many shapes inside the same SVG
Curated Video
Bug Bounty Program Certification 13.4: Certification Exam Practice Questions – Part 3
Exam questions. • Practice questions • Solutions • Explanation of answer
Curated Video
Bug Bounty Program Certification 9.3: Non-persistent Attack on Websites Frontend
In this video, you will perform non - persistent attack on websites.
• Setup Lab using Mutillidae Buggy web application for non-persistent a
ttack
• Explore non-persistent XSS attack using popup box
generation
• Learn about...
• Setup Lab using Mutillidae Buggy web application for non-persistent a
ttack
• Explore non-persistent XSS attack using popup box
generation
• Learn about...
Curated Video
Bug Bounty Program Certification 7.2: Install DVWA Framework In Kali Linux
This video will help you host DVWA (Buggy Application). • Explore DVWA application • Download DVWA in Kali Linux • DVWA hosting in server
Curated Video
Bug Bounty Program Certification 7.1: Install Web Server in Kali Linux
In this video, you will learn about Xampp installation. • Learn about Xampp • Download Xampp server in Kali Linux • Installation of Xampp server in Kali Linux OS
Curated Video
Bug Bounty Program Certification 3.3: Find Open Ports and Services in Network
In this video, we will find open ports and services. • Use Nmap tool to find ports and services • Use Zenmap tool to provide information about ports and services • Explore various commands
Packt
Compare the breadth-first and depth-first search algorithms : Introduction to File Search Application
From the section: Shortest Time Search (Depth First Search). Understand the application that we will develop in this section by answering the questions.
• What is s
earch
• What is f
ile search
• H
ow does...
• What is s
earch
• What is f
ile search
• H
ow does...
Curated Video
Copy data from a data structure : Lists
From the section: Beginners Python. This section is about Installing Python, Python 3 vs Python 2, Variables, Strings etc.<b<br/>r/>
Beginners Python: Lists
Beginners Python: Lists
Packt
Evaluate the scalability and reliability of networks : Scalability and Reliability
From the section: Introduction to Computer Networks (ICND1). This Section introduces Computer Networks. This includes lectures on Physical Components, Topology, Speed etc.
Introduction to Computer Networks (ICND1):...
Introduction to Computer Networks (ICND1):...