Instructional Video4:13
Curated Video

Learning ASP.NET Web API (Video 20)

Higher Ed
Revolutionary changes in the mobile world introduced various type of devices such as smart phones, tablets, and IoT devices, all connected to a network based on a HTTP protocol and HTML 5. This lead to a big push to build REST-based...
Instructional Video4:32
Curated Video

A Start-Up Founder Discusses Her Insights for Success

Higher Ed
Part 3/4 of Dana Donofree series: Dana discusses how she started and grew her business, emphasizing the importance of finding trustworthy advisors, grassroots marketing, networking, and digital marketing. She also shares personal...
Instructional Video34:07
The Wall Street Journal

In The Driver's Seat

Higher Ed
Uber's chief executive has had a busy first year on the job, and the second will be even busier. Learn about Uber's plans for growth as the company sets course for an initial public offering. Dara Khosrowshahi speaks with WSJ's Gerard...
Instructional Video8:57
Curated Video

Bug Bounty Program Certification 4.4: Exploit Wireless Network and Become Internal User

Higher Ed
This video will help you exploit WPA wireless. • Understand the use of Fern Wi-fi Cracker • Lab setup to learn exploitation • Exploit WPA/WPA2 using Kali Linux
Instructional Video7:11
Curated Video

routing protocols : Introduction to IP Routing and Routed vs. Routing Protocols

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Introduction to IP Routing and Routed...
Instructional Video5:14
History Hit

The Silk Roads: Trade and Movement: Mesopotamia

12th - Higher Ed
What was the purpose of canal building in this area at the time? What is special about the Tigris river? The Silk Roads: Trade and Movement, Part 4
Instructional Video3:28
Curated Video

Learn Git in 3 Hours- What Is Version Control?

Higher Ed
Learn what Version Control is as a concept, what it is used for, and why it can be so useful for software developers. • Overview of Version Control as an abstract concept • Look at an outline of Version Control’s major benefits • Explain...
Instructional Video8:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - ARP Cache Poisoning

Higher Ed
ARP is used to resolve an IP address to a 48-bit hexadecimal hardware MAC address. Attackers with network access can fraudulently send ARP updates to hosts in order to force network traffic through the attacker station. This clip is from...
Instructional Video1:49
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 12 Exam Question Review

Higher Ed
Penetration testing provides insight as to how secure an organization's physical and IT infrastructure really is. In this episode, a pen testing scenario is provided. This clip is from the chapter "Testing Infrastructure" of the series...
Instructional Video6:03
Packt

CompTIA Network+ Certification N10-007: The Total Course - What is Risk Management?

Higher Ed
This video explains the concept of risk management. This clip is from the chapter "Managing Risk" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn to work with risk management,...
Instructional Video15:11
The Wall Street Journal

Cutting Through The Hype

Higher Ed
We are bombarded with new technologies touted as the next big thing in cyber. How do venture capitalists identify innovations with real promise?
Instructional Video5:00
Blockchain Central

What's So Special About NEM?

Higher Ed
This week on Blockchain Central: we'll talk about a crypto currency and blockchain network called NEM, also known as the “New Economy Movement”, and review some unique features that are worth investigating.
Instructional Video6:26
Blockchain Central

Ethereum Classic Was Created by Crypto-Idealists

Higher Ed
This week on Blockchain Central: we’ll take a closer look at Ethereum Classic and the famous hard fork, that have led to the creation of this cryptocurrency.
Instructional Video3:38
IDG TECHtalk

How to tweak Windows logs to better investigate attacks

Higher Ed
Default Windows event log settings won’t give you all the information you need to investigate security incidents. Here’s how to get the info you need.
Instructional Video6:02
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Honeypots

Higher Ed
How can malicious attacker and malware activity be monitored without allowing the compromise of production systems? Honeypots are fake decoy systems designed to attract malicious activity for the purpose of logging and tracing activity....
Instructional Video9:00
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Vulnerability Assessments

Higher Ed
This episode discusses how to use tools to identify security flaws on hosts or for a specific application. Topics include credential vs non-credential scans and keeping the vulnerability database up to date. This clip is from the chapter...
Instructional Video2:28
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 10 Exam Question Review

Higher Ed
IT systems are greatly affected by physical security. This episode presents a scenario in which only some security controls effectively mitigate a security problem. This clip is from the chapter "Physical Security" of the series "CompTIA...
Instructional Video7:54
Curated Video

Active Directory with Windows Server 2016 - Introduction to AD DS Part 2

Higher Ed
We continue looking into the robust interaction of the various components, exploring the global catalog, RODC, and how to work with OUs. This clip is from the chapter "Install and Configure AD DS" of the series "Active Directory with...
Instructional Video2:51
Curated Video

AZ-104: Microsoft Azure Administrator Full Course - Resource Limits and Quotas

Higher Ed
In this video, we will cover resource limits and quotas. This clip is from the chapter "Azure Governance and Compliance." of the series "AZ-104: Microsoft Azure Administrator Full Course".Learn about management groups and how to create...
Instructional Video11:44
Seven Dimensions

Improving Profitability

Higher Ed
In this video, the speaker discusses the importance of regularly reviewing financial statements and market trends to improve business profitability. They emphasize the need for transparency and tough decision-making during difficult...
Instructional Video10:49
Curated Video

Bug Bounty Program Certification 6.3: Create a Virus and Infect the Machines in Network

Higher Ed
In this video, you will learn about virus creation and infect machines. • Download and install Fatrat framework in Kali Linux • Create a virus file using Fatrat and transfer it to victim machine • Exploit victim using that virus
Instructional Video6:15
Curated Video

routing protocols : Static Routes and Dynamic Routes

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Static Routes and Dynamic Routes
Instructional Video5:54
Curated Video

routing protocols : Routed protocols and Demonstrations

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Routed protocols and Demonstrations
Instructional Video5:07
Packt

Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 10

Higher Ed
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing with Real World Natural Images: Working with...