Podcast20:19
NASA

Small Steps, Giant Leaps: Episode 64, Space Communications and Navigation Small Steps, Giant Leaps

Pre-K - Higher Ed
NASA Space Communications and Navigation Chief Engineer Neil Mallik discusses how SCaN keeps the universe connected.
Instructional Video8:42
Packt

CompTIA Network+ Certification N10-007: The Total Course - Fiber Optic Cabling

Higher Ed
This video explains the different types of fiber used in modern networks and includes references to connector types you will see as a network technician. This clip is from the chapter "Cabling and Topology" of the series "CompTIA...
Instructional Video8:54
Curated Video

Python for Network Forensics 5.1: Enumeration

Higher Ed
In this video, we will begin to think as an attacker and learn how to enumerate devices on a network. • Learn the basics of calling system commands in Python • Learn how to enumerate network devices • Using Python, build an application...
Instructional Video12:21
Institute for New Economic Thinking

Ian Goldin: The Global Market and Nation States (3/7)

Higher Ed
The video shows the panel Sovereignty and Institutional Design in the Global Age at INET's Bretton Woods Conference on April 9, 2011. The speaker in this segment is Ian Goldin, Director of the James Martin 21st Century School-Oxford...
Instructional Video3:40
All In One Social Media

[HOW TO] Connect With The Right People on Linkedin 2022

Higher Ed
We all want to Connect With The Right People on Linkedin so that we can make more valuable connections to grow our business. But with all the spam and bots and just accepting every Linkedin Connection that comes your way, it can make...
Instructional Video2:31
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Grey-Box Adversarial with Example

Higher Ed
From the section: Testing Image Classification.In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one category of...
Instructional Video18:31
Curated Video

Describe network protocols : UDP Echo Server

Higher Ed
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. In this video, we will look at how to create a UDP echo server. • Get...
Instructional Video5:03
Curated Video

Networking Strategies for Veteran Entrepreneurs

Higher Ed
In this video, successful business owners and veterans share their tips and advice on the importance of networking and building relationships. They explain how maintaining connections with fellow veterans and professionals can lead to...
Instructional Video5:09
Packt

CompTIA Network+ Certification N10-007: The Total Course - Standard Business Documentation

Higher Ed
This video explains how to work with standard business documentation. This clip is from the chapter "Managing Risk" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn to work with...
Instructional Video5:40
IDG TECHtalk

Microsoft Defender for Business | What security admins need to know

Higher Ed
The new Microsoft Defender for Business makes important Windows security features more available to small businesses.
Instructional Video6:09
Blockchain Central

Cardano - The Third Generation of Blockchain | Blockchain Central

Higher Ed
This week on Blockchain Central: we'll take a closer look at the blockchain technology called Cardano, what are the features of the third generation blockchains and how can it revolutionize the industry. Make sure to watch till the end...
Instructional Video25:18
The Wall Street Journal

10 Years Out

Higher Ed
A discussion of how cybersecurity will influence public acceptance of emerging technology and how hackers could seek to subvert world-changing innovations.
Instructional Video7:17
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Backpropagation Training

Higher Ed
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Backpropagation Training
Instructional Video6:23
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing Network Access

Higher Ed
Securing networks restricts access to the network while securing services on the network. 802.1x network edge devices can limit network access. Rogue DHCP servers can be mitigated with DHCP snooping configurations. Secure remote server...
Instructional Video8:02
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Protocol Analyzers

Higher Ed
Network traffic can be captured, saved, and analyzed using a properly placed hardware or software network protocol analyzer such as the free Wireshark tool. Capture analysis can result in identifying indicators of compromise or the use...
Instructional Video3:33
IDG TECHtalk

Reviewing software risks on your Windows network

Higher Ed
Set aside some time to inventory and analyze the software and settings on your network to identify risks.
Instructional Video10:09
Zach Star

Computer Engineering Careers and Subfields

12th - Higher Ed
This video covers various subfields of computer engineering and what careers you can get in those fields. Computer engineering is basically the combination of electrical engineering and computer science, which means a lot of these jobs...
Instructional Video3:35
Blockchain Central

Drastic Price Drop in 2018 - EXPLAINED

Higher Ed
This week on Blockchain Central: we’ll see what’s been going on with the Crypto market lately, analyze why it’s been dipping and show you a few potential reasons for that recent slump.
Instructional Video5:19
Blockchain Central

Blockchain In Gaming

Higher Ed
This week on Blockchain Central: we will look into how Blockchain technology will disrupt the Gaming Industry using the example of Gamer Token - a global marketplace which allows players and developers to create, buy, and sell unique...
Instructional Video5:20
Curated Video

Describe cyber attacks that could affect a computer system or network : Types of man-in-the-middle Attack

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will know about what is...
Instructional Video3:59
TLDR News

Renationalising Britains Railway: Johnson's Plans to Reform British Trains - TLDR News

12th - Higher Ed
Yesterday Johnson's government announced their plans to partially renationalize the British Railway with the new Great British Railway. In this video, we explain the history of the British rail system and how this is going to...
Instructional Video7:37
Financial Times

China, Russia and the new space race

Higher Ed
China and Russia have signed a deal to build a Moon base together as they seek to rival the US in orbit, on the Moon and beyond. The FT's global China editor James Kynge and Moscow bureau chief Henry Foy look at how their partnership...
Instructional Video4:19
IDG TECHtalk

How to manage and secure administrator accounts

Higher Ed
Administrator accounts have wide access to data and systems. Here’s how to protect them from abuse or compromise.
Instructional Video15:11
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Security models and concepts

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Security models and concepts. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture...