Instructional Video7:55
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Installing and Troubleshooting a Motherboard

Higher Ed
Installing a motherboard into a case is part science and part art. Science comes first. The motherboard must match the case's form factor, and the motherboard and parts must be compatible. Then, the art: the subtle crafts of preparing...
Instructional Video4:37
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - 32-Bit Versus 64-Bit Computing

Higher Ed
As technology evolves, the industry sets standards to define milestones. There is possibly no standard more prolific than 32-bit and 64-bit computing. Every piece of hardware and software released in the last three decades follows either...
Instructional Video9:01
Curated Video

PowerShell for Automating Administration - How to Hide Date Time Using PowerShell

Higher Ed
This video will help you hide date and time in the taskbar using PowerShell in a Windows 11 machine. This clip is from the chapter "PowerShell Automation Concepts" of the series "PowerShell for Automating Administration".This section...
Instructional Video8:47
Curated Video

PowerShell for Automating Administration - Software Installations with PowerShell – Part 1

Higher Ed
This video explains PowerShell and helps you understand ways to install and download the applications/tools with the help of PowerShell. This clip is from the chapter "PowerShell to Install Software on Multiple Remote Computers" of the...
Instructional Video5:05
Curated Video

Python Bootcamp in a Day - Python Programming for Beginners - Saving the Results - Working with Files

Higher Ed
This video explains saving the results and working with files. This clip is from the chapter "Saving the Results - Working with Files" of the series "Python Bootcamp in a Day - Python Programming for Beginners".This section explains...
Instructional Video2:34
Curated Video

Python Bootcamp in a Day - Python Programming for Beginners - Return Statement

Higher Ed
This video explains the return statement. This clip is from the chapter "Breaking Up Larger Programs, Part 1" of the series "Python Bootcamp in a Day - Python Programming for Beginners".This section explains breaking up larger programs.
Instructional Video8:55
Curated Video

Deep Learning - Convolutional Neural Networks with TensorFlow - Data Augmentation

Higher Ed
In this video, you will learn about data augmentation. This clip is from the chapter "Convolutional Neural Networks (CNNs)" of the series "Deep Learning - Convolutional Neural Networks with TensorFlow".In this section, we will cover a...
Instructional Video9:08
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Installing Wireless and Cloud Printers

Higher Ed
Many printers today come with wireless capabilities and can connect directly to an infrastructure or ad hoc 80 2.11 network. This episode looks at manual and automatic setup options, plus how to connect a printer for cloud-based...
Instructional Video6:05
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Sharing Printers

Higher Ed
It rarely makes sense for every computer in an office or lab to have its own dedicated printer. This episode looks at printer sharing and security options in Windows, so techs can set up, maintain, and remove shared printers. Mike also...
Instructional Video12:24
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Laser Printers

Higher Ed
Laser printers provide excellent print output on paper in both black and white and full color. Laser printers use a fairly complicated printing process that techs should understand. This episode details the processes and components for...
Instructional Video7:22
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Mobile Synchronization

Higher Ed
Synchronization keeps data up to date on each of your mobile devices and other connected devices. This episode explores syncing to the desktop, automobile, cloud, and more. This clip is from the chapter "Book Chapter 25 - Maintaining and...
Instructional Video9:23
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Mobile Devices and E-Mail

Higher Ed
Corporate or ISP e-mail setup requires various configuration options, such as POP or IMAP for incoming mail and SMTP for outgoing mail. S/MIME was a way to encrypt e-mail attachments. Standard Google or Apple accounts are set up with a...
Instructional Video6:09
Curated Video

Recommender Systems with Machine Learning - Item Model and Memory-Based Collaborative Filtering

Higher Ed
This video helps you with the item model and memory-based collaborative filtering. This clip is from the chapter "Basic of Recommender Systems" of the series "Recommender Systems with Machine Learning".This section focuses on the basics...
Instructional Video5:07
Curated Video

Recommender Systems with Machine Learning - Recommender Systems Process and Goals

Higher Ed
This video helps you understand the process and goals of recommender systems. This clip is from the chapter "Motivation for Recommender System" of the series "Recommender Systems with Machine Learning".This section focuses on recommender...
Instructional Video5:22
Curated Video

Linux Operating System: A Complete Linux Guide for Beginners - Killing a Process

Higher Ed
In this video, you will learn how to kill a process. This clip is from the chapter "Process and Memory" of the series "Linux Operating System: A Complete Linux Guide for Beginners".In this section, we will cover process and memory.
Instructional Video2:36
Curated Video

Linux Operating System: A Complete Linux Guide for Beginners - Process (ps and top)

Higher Ed
In this video, we will discuss about process (ps and top). This clip is from the chapter "Process and Memory" of the series "Linux Operating System: A Complete Linux Guide for Beginners".In this section, we will cover process and memory.
Instructional Video4:04
Curated Video

Linux Operating System: A Complete Linux Guide for Beginners - Course Outline

Higher Ed
In this video, we will go through the course outline and understand what is covered in the course. This clip is from the chapter "Introduction" of the series "Linux Operating System: A Complete Linux Guide for Beginners".In this section,...
Instructional Video6:43
Curated Video

Chatbots for Beginners: A Complete Guide to Build Chatbots - Project: Conversational Chatbot Development with Machine Learning: Lemmatization and Processed Text

Higher Ed
In this video, we will look at the project's next step, the lemmatization process, using the WordNet lemmatizer and the NLTK library for the conversational chatbot. This clip is from the chapter "Basics of Chatbots with Machine Learning...
Instructional Video6:27
Curated Video

Chatbots for Beginners: A Complete Guide to Build Chatbots - Machine Learning-Based Chatbots: NLTK Features

Higher Ed
Let's explore the Natural Language Toolkit, a library used for specific tasks related to natural language processing, including tokenization, filtering words, stemming, lemmatization, chunking/chinking, and entity recognition. This clip...
Instructional Video4:27
Curated Video

Chatbots for Beginners: A Complete Guide to Build Chatbots - Overview of Chatbots: Mechanism of Chatbots

Higher Ed
Let's understand the mechanism of how a chatbot works. It needs a predefined goal or objective to function, draft potential solution flows, validate examples, define the solution flows, and launch the chatbot. This clip is from the...
Instructional Video7:06
Curated Video

CISSP Crash Course - Security in the SDLC

Higher Ed
This video explains security in the SDLC, methodologies, and maturity models. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Instructional Video3:03
Curated Video

CISSP Crash Course - Patch and Vulnerability Management

Higher Ed
This video explains the patch and vulnerability management process. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video19:35
Curated Video

CISSP Crash Course - Risk Management

Higher Ed
This video explains risk management, risk response, and types of risk controls. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and...
Instructional Video7:58
Curated Video

CISSP Crash Course - Investigation Requirements

Higher Ed
This video explains investigation requirements and the types of investigations. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and...