Curated Video
Create a machine learning model of a real-life process or object : Improving the Network with Better Activation Functions and Dropout
From the section: Regression Task Airbnb Prices in New York. We will use a real-world Airbnb dataset that contains data about New York properties for rent in 2019 on Airbnb, including their price. It is a simple dataset and makes a good...
National Institute of Standards and Technology
Vint Cerf: The past, present and future of the internet
Donna Dodson, Associate Director and Chief Cyber Security Advisor, and Vint Cerf, Chief Internet Evangelist for Google and former NIST VCAT member, have a wide-ranging discussion about the past, present and future of the internet,...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cloud Deployment Models
Virtualization alone does not constitute cloud computing; a number of characteristics such as resource pooling and metered usage must also be involved. This episode discusses public, private, hybrid, and community clouds. This clip is...
Curated Video
routing protocols : How do routers determine the best route?
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: How do routers determine the best route?
The Wall Street Journal
Voya Financial's Raj Badhwar on Innovative Security For a Remote Workf
Voya Financial CISO, Raj Badhwar, outlines his approach to innovative cybersecurity for a distributed workforce.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network and Port Address Translation
Network Address Translation (NAT) maps external public IPs to internal private IPs to protect the true identity of servers. Port Address Translation (PAT) allows multiple internal network clients with private IPs to access the Internet...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Shells
Shells allow technicians to enter commands, such as a Linux bash shell or a Windows command prompt. Reverse shells are the result of infected victim machines that reach out to an attacker station. This clip is from the chapter "Tools of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Incident Response Plans (IRPs)
An IRP provides guidance on how security incidents are dealt with effectively while they are occurring. The IRP includes roles, responsibilities, a contact list and escalation procedures. IRPs should be updated periodically through...
XKA Digital
Why you need to build a good network
Gwen's business experience intertwines periods of corporate life and self-employment. She set up Networking Culture in 1996 and works with a wide range of organisations helping them and their employees to build, nurture and leverage...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Network Documentation
This video explains some internal documentation needed for a network. This clip is from the chapter "Building a Real-World Network" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Industrial Control Systems
CISSP Domain 3: System Architecture and Engineering: Industrial Control Systems This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
IDG TECHtalk
What the Colonial Pipeline ransomware attack suggests about critical infrastructure security
The largest fuel pipeline in the United States, Colonial Pipeline, halted operations because of a ransomware attack. The attack was carried out by the cybercriminal group DarkSide. Much of the pipeline remains offline, although the...
Encyclopaedia Britannica
Did You Know? The History of the Internet
Discover how the Internet grew to connect billions of people worldwide.
The Wall Street Journal
Raj Samani and Hugh Thompson Discuss The Year In Hacks
McAfee's Chief Scientist Raj Samani and Hugh Thompson, Managing Partner at Crosspoint Capital Partners, look back at the major cyber incidents of the past year, and the lessons that can be learned from them.
Science360
Happy Birthday NSF!
For more than six decades, the National Science Foundation has funded science and engineering research that has led to discoveries and innovations that transformed our world. In episode 53, Charlie and Jordan celebrate by picking a few...
All In One Social Media
How To Make A Linkedin Company Page 2020
In ths video, learn how to create a Linkedin Company page 2020 so you can grow your brand on Linkedin.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Physical Security Lab
A full IT security audit always includes physical security. In this episode, physical security considerations are presented. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
CISSP®- Risk - Attackers and Types of Attacks - Part 2
This is the second part of a two-part video that explains risk attackers and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Blockchain Central
Faster Than Bitcoin??? | Blockchain Central
This week on Blockchain Central: we'll take a closer look at a cryptocurrency known as Dash and find out what are the masternodes, InstantSend and PrivateSend.
The Wall Street Journal
The 5G Sprint
The ultrafast cellular networks that will enable autonomous vehicles and AI-driven applications are fast becoming a reality. Youngky Kim of Samsung Electronics and Simon Segars of ARM sit down with WSJ's Yun-Hee Kim.
Curated Video
routing protocols : Static vs. Dynamic Routing
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Static vs. Dynamic Routing
The Wall Street Journal
Distributing Food During Global Disasters
Chef José Andrés and filmmaker Ron Howard discuss the public and private sector’s role in feeding towns and cities during global disasters, with a specific focus on the war in Ukraine.
Packt
Handling Errors
Asynchronous Node.js (Weather App): Handling Errors This clip is from the chapter "Asynchronous Node.js (Weather App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In this section, you will learn about Asynchronous...