Step Back History
When White Supremacists Declared War on America
Born in the fires of Vietnam, the White Power movement decided in 1983 to overthrow the government of the United States. But to do so, you need recruits, weapons, organization, and money. This is how they tried to build it.
Visual Learning Systems
Exploring Blood Vessels
This video explains the network of pipes in the human body, known as blood vessels. It describes the different types of vessels, including arteries, veins, and capillaries, and their functions in carrying oxygen-rich blood away from the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Authentication
Older network authentication protocols such as Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP) have been deprecated in favor of protocols such as Kerberos and Extensible Authentication...
Institute for New Economic Thinking
Domenico Delli Gatti: Instability in Financial Markets 1/5
Domenico Delli Gatti, Professor of Economics, Catholic University Milan speaking at the breakout panel entitled "Instability in Financial Markets: Sources and Remedies" at the Institute for New Economic Thinking's (INET) Paradigm Lost...
Curated Video
routing protocols : Benefits of link state routing and Drawbacks of link state routing
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Benefits of link state routing and...
IDG TECHtalk
Election security concerns: Voting machines, malware and misinformation
Americans are days away from the 2020 Presidential Election and have been casting early ballots at an all-time high. Cybersecurity experts and election officials have probably implemented election security measures by now. But it’s not...
Institute for New Economic Thinking
Leanne Ussher and Sorin Solomon - Financial Fragility in a Network of Trade Credit
The physicist Sorin Solomon begins to feel dizzy when the economist Leanne Ussher talks econ lingo. Yet he listens, because the two of them have found a productive area of collaboration: some economic phenomena, they find, can be...
Institute for New Economic Thinking
How Elite Financial Networks Rule the World
The identities of the world’s most powerful people, and the corporations and institutions they run, are well known. What’s poorly understood is a key driving force behind elites’ power: their ability to build, and capitalize on,...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Backdoor Attacks
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to...
Curated Video
routing protocols : OSPF Hierarchy - Multiple areas
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: OSPF Hierarchy - Multiple areas
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Log Files
Log files can provide valuable insights related to suspicious network, host or application activity, but only if log file integrity can be ensured. Centralized logging in the enterprise on a secured logging host ensures an accurate copy...
Science360
New cyber-physical system enables drone-carried broadband in disaster zones - Science Nation
Networked UAVs: Arming drones with Wi-Fi to support emergency response With support from the National Science Foundation, electrical engineer Yan Wan and a team at the University of Texas at Arlington are developing a new generation of...
Curated Video
Bug Bounty Program Certification 3.1: Overview of Preparation Steps
In this video, we will have a look at the preparation steps. • Explore various technologies • Learn about ports and services information • Explore vulnerability scanning and tools
IDG TECHtalk
How to deploy secure Windows computing resources remotely
As remote work becomes more prevalent and, likely, permanent, you need secure deployment processes in place for devices connecting to Windows networks.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 9 Exam Question Review
Critical infrastructure IT systems can sometimes be vulnerable to attacks. In this episode, a scenario is presented in which the best solution must be implemented to protect Programmable Logic Controllers (PLCs). This clip is from the...
Curated Video
Describe cyber attacks that could affect a computer system or network : Overview of Network Security
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Curated Video
Data Science and Machine Learning with R - Starting a Data Science Career Section Overview
This video explains section overview of data science and career. This clip is from the chapter "Starting a Career in Data Science" of the series "Data Science and Machine Learning with R from A-Z Course [Updated for 2021]".This section...
Curated Video
CISSP®- Risk Management - Assessment Part 2
This is the second part of a two-part video that shows how to assess and manage risks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
NASA
The Invisible Network: 01. Ascension | NASA's The Invisible Network Podcast
Just south of the equator lies a tiny plot of volcanic soil, a thousand miles from the nearest continent. This bizarre, remote island had mammoth importance to America’s first efforts in space.
Curated Video
Apache Maven Beginner to Guru - Introduction to Maven Settings
This video introduces you to Maven settings. This clip is from the chapter "Maven Repositories" of the series "Apache Maven: Beginner to Guru".This section provides an explanation of Maven repositories.
APMonitor
Introduction to OT Cybersecurity
Cybersecurity is the protection of networks and computer systems, including hardware and software, against cyberattacks. Of particular interest to engineers is the computer control of physical systems that monitor and control...
The Wall Street Journal
Activists At The Office
Employees at some of the world's largest companies are demanding equality and corporate action. The Memo LLC's Minda Harts and former Riot Games writer Indu Reddy discuss who today's CEOs answer to and what employees expect from...
Curated Video
Bug Bounty Program Certification 1.1: The Course Overview
This video provides an overview of the entire course.
Next Animation Studio
LINE partnering with ICON to create blockchain ecosystem
Japan's largest messaging app LINE announced around mid-May a partnership with the South Korean blockchain project ICON.