Instructional Video5:42
Curated Video

Create a machine learning model of a real-life process or object : Improving the Network with Better Activation Functions and Dropout

Higher Ed
From the section: Regression Task Airbnb Prices in New York. We will use a real-world Airbnb dataset that contains data about New York properties for rent in 2019 on Airbnb, including their price. It is a simple dataset and makes a good...
Instructional Video16:34
National Institute of Standards and Technology

Vint Cerf: The past, present and future of the internet

9th - 12th
Donna Dodson, Associate Director and Chief Cyber Security Advisor, and Vint Cerf, Chief Internet Evangelist for Google and former NIST VCAT member, have a wide-ranging discussion about the past, present and future of the internet,...
Instructional Video8:46
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cloud Deployment Models

Higher Ed
Virtualization alone does not constitute cloud computing; a number of characteristics such as resource pooling and metered usage must also be involved. This episode discusses public, private, hybrid, and community clouds. This clip is...
Instructional Video3:32
Curated Video

routing protocols : How do routers determine the best route?

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: How do routers determine the best route?
Instructional Video14:28
The Wall Street Journal

Voya Financial's Raj Badhwar on Innovative Security For a Remote Workf

Higher Ed
Voya Financial CISO, Raj Badhwar, outlines his approach to innovative cybersecurity for a distributed workforce.
Instructional Video6:50
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network and Port Address Translation

Higher Ed
Network Address Translation (NAT) maps external public IPs to internal private IPs to protect the true identity of servers. Port Address Translation (PAT) allows multiple internal network clients with private IPs to access the Internet...
Instructional Video6:18
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Shells

Higher Ed
Shells allow technicians to enter commands, such as a Linux bash shell or a Windows command prompt. Reverse shells are the result of infected victim machines that reach out to an attacker station. This clip is from the chapter "Tools of...
Instructional Video6:01
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Incident Response Plans (IRPs)

Higher Ed
An IRP provides guidance on how security incidents are dealt with effectively while they are occurring. The IRP includes roles, responsibilities, a contact list and escalation procedures. IRPs should be updated periodically through...
Instructional Video2:00
XKA Digital

Why you need to build a good network

Higher Ed
Gwen's business experience intertwines periods of corporate life and self-employment. She set up Networking Culture in 1996 and works with a wide range of organisations helping them and their employees to build, nurture and leverage...
Instructional Video9:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations

Higher Ed
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
Instructional Video6:33
Packt

CompTIA Network+ Certification N10-007: The Total Course - Network Documentation

Higher Ed
This video explains some internal documentation needed for a network. This clip is from the chapter "Building a Real-World Network" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn...
Instructional Video3:08
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Industrial Control Systems

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Industrial Control Systems This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Instructional Video20:54
IDG TECHtalk

What the Colonial Pipeline ransomware attack suggests about critical infrastructure security

Higher Ed
The largest fuel pipeline in the United States, Colonial Pipeline, halted operations because of a ransomware attack. The attack was carried out by the cybercriminal group DarkSide. Much of the pipeline remains offline, although the...
Instructional Video2:26
Encyclopaedia Britannica

Did You Know? The History of the Internet

Pre-K - Higher Ed
Discover how the Internet grew to connect billions of people worldwide.
Instructional Video30:08
The Wall Street Journal

Raj Samani and Hugh Thompson Discuss The Year In Hacks

Higher Ed
McAfee's Chief Scientist Raj Samani and Hugh Thompson, Managing Partner at Crosspoint Capital Partners, look back at the major cyber incidents of the past year, and the lessons that can be learned from them.
Instructional Video3:55
Science360

Happy Birthday NSF!

12th - Higher Ed
For more than six decades, the National Science Foundation has funded science and engineering research that has led to discoveries and innovations that transformed our world. In episode 53, Charlie and Jordan celebrate by picking a few...
Instructional Video4:33
All In One Social Media

How To Make A Linkedin Company Page 2020

Higher Ed
In ths video, learn how to create a Linkedin Company page 2020 so you can grow your brand on Linkedin.
Instructional Video2:57
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Physical Security Lab

Higher Ed
A full IT security audit always includes physical security. In this episode, physical security considerations are presented. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video10:43
Curated Video

CISSP®- Risk - Attackers and Types of Attacks - Part 2

Higher Ed
This is the second part of a two-part video that explains risk attackers and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Instructional Video5:51
Blockchain Central

Faster Than Bitcoin??? | Blockchain Central

Higher Ed
This week on Blockchain Central: we'll take a closer look at a cryptocurrency known as Dash and find out what are the masternodes, InstantSend and PrivateSend.
Instructional Video21:35
The Wall Street Journal

The 5G Sprint

Higher Ed
The ultrafast cellular networks that will enable autonomous vehicles and AI-driven applications are fast becoming a reality. Youngky Kim of Samsung Electronics and Simon Segars of ARM sit down with WSJ's Yun-Hee Kim.
Instructional Video5:19
Curated Video

routing protocols : Static vs. Dynamic Routing

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Static vs. Dynamic Routing
Instructional Video28:32
The Wall Street Journal

Distributing Food During Global Disasters

Higher Ed
Chef José Andrés and filmmaker Ron Howard discuss the public and private sector’s role in feeding towns and cities during global disasters, with a specific focus on the war in Ukraine.
Instructional Video18:43
Packt

Handling Errors

Higher Ed
Asynchronous Node.js (Weather App): Handling Errors This clip is from the chapter "Asynchronous Node.js (Weather App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In this section, you will learn about Asynchronous...