NASA
Small Steps, Giant Leaps: Episode 64, Space Communications and Navigation Small Steps, Giant Leaps
NASA Space Communications and Navigation Chief Engineer Neil Mallik discusses how SCaN keeps the universe connected.
Packt
CompTIA Network+ Certification N10-007: The Total Course - Fiber Optic Cabling
This video explains the different types of fiber used in modern networks and includes references to connector types you will see as a network technician. This clip is from the chapter "Cabling and Topology" of the series "CompTIA...
Curated Video
Python for Network Forensics 5.1: Enumeration
In this video, we will begin to think as an attacker and learn how to enumerate devices on a network. • Learn the basics of calling system commands in Python • Learn how to enumerate network devices • Using Python, build an application...
Institute for New Economic Thinking
Ian Goldin: The Global Market and Nation States (3/7)
The video shows the panel Sovereignty and Institutional Design in the Global Age at INET's Bretton Woods Conference on April 9, 2011. The speaker in this segment is Ian Goldin, Director of the James Martin 21st Century School-Oxford...
All In One Social Media
[HOW TO] Connect With The Right People on Linkedin 2022
We all want to Connect With The Right People on Linkedin so that we can make more valuable connections to grow our business. But with all the spam and bots and just accepting every Linkedin Connection that comes your way, it can make...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Grey-Box Adversarial with Example
From the section: Testing Image Classification.In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one category of...
Curated Video
Describe network protocols : UDP Echo Server
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. In this video, we will look at how to create a UDP echo server. • Get...
Curated Video
Networking Strategies for Veteran Entrepreneurs
In this video, successful business owners and veterans share their tips and advice on the importance of networking and building relationships. They explain how maintaining connections with fellow veterans and professionals can lead to...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Standard Business Documentation
This video explains how to work with standard business documentation. This clip is from the chapter "Managing Risk" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn to work with...
IDG TECHtalk
Microsoft Defender for Business | What security admins need to know
The new Microsoft Defender for Business makes important Windows security features more available to small businesses.
Blockchain Central
Cardano - The Third Generation of Blockchain | Blockchain Central
This week on Blockchain Central: we'll take a closer look at the blockchain technology called Cardano, what are the features of the third generation blockchains and how can it revolutionize the industry.
Make sure to watch till the end...
The Wall Street Journal
10 Years Out
A discussion of how cybersecurity will influence public acceptance of emerging technology and how hackers could seek to subvert world-changing innovations.
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Backpropagation Training
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Backpropagation Training
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing Network Access
Securing networks restricts access to the network while securing services on the network. 802.1x network edge devices can limit network access. Rogue DHCP servers can be mitigated with DHCP snooping configurations. Secure remote server...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Protocol Analyzers
Network traffic can be captured, saved, and analyzed using a properly placed hardware or software network protocol analyzer such as the free Wireshark tool. Capture analysis can result in identifying indicators of compromise or the use...
IDG TECHtalk
Reviewing software risks on your Windows network
Set aside some time to inventory and analyze the software and settings on your network to identify risks.
Zach Star
Computer Engineering Careers and Subfields
This video covers various subfields of computer engineering and what careers you can get in those fields. Computer engineering is basically the combination of electrical engineering and computer science, which means a lot of these jobs...
Blockchain Central
Drastic Price Drop in 2018 - EXPLAINED
This week on Blockchain Central: we’ll see what’s been going on with the Crypto market lately, analyze why it’s been dipping and show you a few potential reasons for that recent slump.
Blockchain Central
Blockchain In Gaming
This week on Blockchain Central: we will look into how Blockchain technology will disrupt the Gaming Industry using the example of Gamer Token - a global marketplace which allows players and developers to create, buy, and sell unique...
Curated Video
Describe cyber attacks that could affect a computer system or network : Types of man-in-the-middle Attack
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will know about what is...
TLDR News
Renationalising Britains Railway: Johnson's Plans to Reform British Trains - TLDR News
Yesterday Johnson's government announced their plans to partially renationalize the British Railway with the new Great British Railway. In this video, we explain the history of the British rail system and how this is going to...
Financial Times
China, Russia and the new space race
China and Russia have signed a deal to build a Moon base together as they seek to rival the US in orbit, on the Moon and beyond. The FT's global China editor James Kynge and Moscow bureau chief Henry Foy look at how their partnership...
IDG TECHtalk
How to manage and secure administrator accounts
Administrator accounts have wide access to data and systems. Here’s how to protect them from abuse or compromise.
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Security models and concepts
CISSP Domain 3: System Architecture and Engineering: Security models and concepts. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture...