Instructional Video7:06
Curated Video

Risk Concept

Higher Ed
A general definition of risk, risk refers to the chance that an investment's actual return will differ from what is expected
Instructional Video1:18
Curated Video

Definitions

Higher Ed
The video introduces various terminology used in risk management
Instructional Video11:02
National Institute of Standards and Technology

Key to Security: Biometric Standards

9th - 12th
NIST develops and tests biometrics (e.g., fingerprint, face, iris, & multimodal) standards and technology that promote security, interoperability, and innovation. Four projects (in collaboration with the DHS and the FBI) are...
Instructional Video5:32
Curated Video

Detection and Identification of Plant Diseases

Higher Ed
In this lecture video, the speaker discusses the detection and identification of plant diseases. They explain how to detect signs of diseases in plants, such as stunted growth, spots on leaves, and discoloration, and how to identify...
Instructional Video5:19
Science360

Biometrics - Science of Innovation

12th - Higher Ed
A method for capturing and analyzing the vein patterns in the white part of the eye to help identify people. Biometrics has potential applications for driver's licenses, passports or computer identification control.



Provided...
Instructional Video3:17
Science360

Computer scientist sees new possibilities for ocular biometrics

12th - Higher Ed
While many of us rely on passwords to protect our identity, there's more sophisticated identity recognition technology called biometrics that we could use. Security measures that use biometrics rely on a person's unique characteristics...
Instructional Video8:01
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Identification, Authentication, and Authorization

Higher Ed
Authorization to access resources occurs after the successful proving of one's identity through authentication. This clip is from the chapter "Identity and Account Management" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video9:58
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Risk Response and Mitigation, Risk and Control Monitoring, and Control Reporting

Higher Ed
This video explains the concepts of risk response and mitigation; risk and control monitoring; and finally, risk and control reporting.
r/>
This clip is from the chapter "Certified Information Systems Security Professional...
Instructional Video7:25
TMW Media

Tarantula World: Determining a Name for a New Tarantula Species

K - 5th
How do scientists determine a new species of tarantula? How are the tarantulas scanned?<br/>
Tarantula World, Part 7
Instructional Video8:19
Neuro Transmissions

The Science Behind Jedi Mind Tricks

12th - Higher Ed
These aren't the droids you're looking for. But it is the video you're looking for! Jedi mind tricks are one of the most interesting incarnations of the Force. They seem almost magical. However, in this video, we see that Jedi mind...
Instructional Video1:22
Next Animation Studio

Remote ID system proposed for drones in U.S. airspace

12th - Higher Ed
The Federal Aviation Administration has proposed using remote identification for unmanned aircraft systems in the U.S. <br/>
Instructional Video4:47
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Enabling Multifactor Authentication

Higher Ed
Multifactor authentication (MFA) hardens user sign-in by requiring more than one factor, or category of authentication, such as something you know combined with something you have.
r/>
This clip is from the chapter "Identity...
Instructional Video8:22
Seven Dimensions

Office Security: Lessons Learned from a Theft

Higher Ed
In this video, an employee addresses a theft that occurred in their office and emphasizes the importance of security. They propose implementing stricter measures, such as ID checks and security lists, to ensure that only authorized...
Instructional Video16:42
APMonitor

LSTM Replaces SISO MPC

10th - Higher Ed
The purpose of this exercise is to automate a temperature control process with an LSTM network. The LSTM network is trained from a Model Predictive Controller (MPC). LSTM (Long Short Term Memory) networks are a special type of RNN...
Instructional Video4:06
Blockchain Central

Why Criminals Love Monero?

Higher Ed
This week on Blockchain Central: we’ll take a closer look at Monero, a cryptocurrency which has one of the best security systems among others and has a potential to become your personal bank. However, it still has downsides, which we...
Instructional Video6:44
Communication Coach Alex Lyon

Referent Power

Higher Ed
Referent Power (French & Raven) is one of the types or bases of power. We look at examples of referent power.

Referent power, according to French and Raven (1959), is social influence. Referent power describes the way a follower...
Instructional Video0:54
Next Animation Studio

MasterCard pushes for commuter biometrics at public transit systems

12th - Higher Ed
CCTV and gait analysis may come to US public transit to allow commuters to pay without using cards or passes. <br/>
Instructional Video5:12
TMW Media

Tarantula World: How to Save Tarantulas from Humans

K - 5th
Two doctors search the desert of Australia for unknown species of tarantulas. Why is it important to find these unknown species?
Instructional Video7:50
Curated Video

CISSP®- Risk Management - Identification

Higher Ed
This video discusses how to identify and manage risks.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Instructional Video11:22
Curated Video

CISSP®- IAAA - Part 1- Identification, Authentication, Authorization, and Accountability

Higher Ed
This is the first part of a two-part video that explains the concept of IAAA.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Instructional Video3:20
Curated Video

Learning D3.JS 5.0 3.5: Creating Clip Paths

Higher Ed
In this video, we will learn how to create clip paths. • Write a text path and • Write the and the • Connect everything and view the result
Instructional Video1:09
Next Animation Studio

China’s latest Taiwan mass incursion reveals worrying capability

12th - Higher Ed
The Chinese Communist Party’s cold war against Taiwan just got one step closer to going hot.
Instructional Video4:49
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - IAAA - Part 2 - Identification, Authentication, Authorization, and Accountability

Higher Ed
This is the second part of a two-part video that explains the concept of IAAA.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Instructional Video8:41
Curated Video

CISSP®- IAAA - Part 2 - Identification, Authentication, Authorization, and Accountability

Higher Ed
This is the second part of a two-part video that explains the concept of IAAA.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...