Curated Video
Learning ASP.NET Web API (Video 20)
Revolutionary changes in the mobile world introduced various type of devices such as smart phones, tablets, and IoT devices, all connected to a network based on a HTTP protocol and HTML 5. This lead to a big push to build REST-based...
Curated Video
A Start-Up Founder Discusses Her Insights for Success
Part 3/4 of Dana Donofree series: Dana discusses how she started and grew her business, emphasizing the importance of finding trustworthy advisors, grassroots marketing, networking, and digital marketing. She also shares personal...
The Wall Street Journal
In The Driver's Seat
Uber's chief executive has had a busy first year on the job, and the second will be even busier. Learn about Uber's plans for growth as the company sets course for an initial public offering. Dara Khosrowshahi speaks with WSJ's Gerard...
Curated Video
Bug Bounty Program Certification 4.4: Exploit Wireless Network and Become Internal User
This video will help you exploit WPA wireless. • Understand the use of Fern Wi-fi Cracker • Lab setup to learn exploitation • Exploit WPA/WPA2 using Kali Linux
Curated Video
routing protocols : Introduction to IP Routing and Routed vs. Routing Protocols
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Introduction to IP Routing and Routed...
History Hit
The Silk Roads: Trade and Movement: Mesopotamia
What was the purpose of canal building in this area at the time? What is special about the Tigris river? The Silk Roads: Trade and Movement, Part 4
Curated Video
Learn Git in 3 Hours- What Is Version Control?
Learn what Version Control is as a concept, what it is used for, and why it can be so useful for software developers. • Overview of Version Control as an abstract concept • Look at an outline of Version Control’s major benefits • Explain...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - ARP Cache Poisoning
ARP is used to resolve an IP address to a 48-bit hexadecimal hardware MAC address. Attackers with network access can fraudulently send ARP updates to hosts in order to force network traffic through the attacker station. This clip is from...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 12 Exam Question Review
Penetration testing provides insight as to how secure an organization's physical and IT infrastructure really is. In this episode, a pen testing scenario is provided. This clip is from the chapter "Testing Infrastructure" of the series...
Packt
CompTIA Network+ Certification N10-007: The Total Course - What is Risk Management?
This video explains the concept of risk management. This clip is from the chapter "Managing Risk" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn to work with risk management,...
The Wall Street Journal
Cutting Through The Hype
We are bombarded with new technologies touted as the next big thing in cyber. How do venture capitalists identify innovations with real promise?
Blockchain Central
What's So Special About NEM?
This week on Blockchain Central: we'll talk about a crypto currency and blockchain network called NEM, also known as the “New Economy Movement”, and review some unique features that are worth investigating.
Blockchain Central
Ethereum Classic Was Created by Crypto-Idealists
This week on Blockchain Central: we’ll take a closer look at Ethereum Classic and the famous hard fork, that have led to the creation of this cryptocurrency.
IDG TECHtalk
How to tweak Windows logs to better investigate attacks
Default Windows event log settings won’t give you all the information you need to investigate security incidents. Here’s how to get the info you need.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Honeypots
How can malicious attacker and malware activity be monitored without allowing the compromise of production systems? Honeypots are fake decoy systems designed to attract malicious activity for the purpose of logging and tracing activity....
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Vulnerability Assessments
This episode discusses how to use tools to identify security flaws on hosts or for a specific application. Topics include credential vs non-credential scans and keeping the vulnerability database up to date. This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 10 Exam Question Review
IT systems are greatly affected by physical security. This episode presents a scenario in which only some security controls effectively mitigate a security problem. This clip is from the chapter "Physical Security" of the series "CompTIA...
Curated Video
Active Directory with Windows Server 2016 - Introduction to AD DS Part 2
We continue looking into the robust interaction of the various components, exploring the global catalog, RODC, and how to work with OUs. This clip is from the chapter "Install and Configure AD DS" of the series "Active Directory with...
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Resource Limits and Quotas
In this video, we will cover resource limits and quotas. This clip is from the chapter "Azure Governance and Compliance." of the series "AZ-104: Microsoft Azure Administrator Full Course".Learn about management groups and how to create...
Seven Dimensions
Improving Profitability
In this video, the speaker discusses the importance of regularly reviewing financial statements and market trends to improve business profitability. They emphasize the need for transparency and tough decision-making during difficult...
Curated Video
Bug Bounty Program Certification 6.3: Create a Virus and Infect the Machines in Network
In this video, you will learn about virus creation and infect machines. • Download and install Fatrat framework in Kali Linux • Create a virus file using Fatrat and transfer it to victim machine • Exploit victim using that virus
Curated Video
routing protocols : Static Routes and Dynamic Routes
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Static Routes and Dynamic Routes
Curated Video
routing protocols : Routed protocols and Demonstrations
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Routed protocols and Demonstrations
Packt
Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 10
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing with Real World Natural Images: Working with...