Curated Video
Python 3: Project-based Python, Algorithms, Data Structures - BST - Deleting leaf nodes
Here, the author thanks everyone for taking the course and suggestions for possible next steps This clip is from the chapter "Algorithms - Search and abstract data structures" of the series "Python 3: Project-based Python, Algorithms,...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - The Metasploit Framework
Penetration testers can use the cross-platform Metasploit framework command-line tool for discovering and exploiting security flaws on hosts. This clip is from the chapter "Testing Infrastructure" of the series "CompTIA Security+...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 13 Ask Me Anything (AMA)
There is much to be learned by analyzing past security incidents. In this episode, Dan discussed the Cyber Kill Chain. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification SY0-601: The...
Science360
What do we know about how people recognize faces?
What do we know about how people recognize faces? Catherine Stamoulis, assistant professor of pediatrics at Harvard Medical School, answers the question on this edition of "Ask a Scientist."
NASA
The Invisible Network: Bonus - Dr. Jim Garvin | NASA's The Invisible Network Podcast
There is perhaps no one better than Jim Garvin to outline the unique opportunities for research that the Artemis missions to the Moon could provide scientists on Earth. Jim is chief scientist at NASA’s Goddard Space Flight Center in...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Code to build a perceptron for binary classification
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Code to build a perceptron for binary classification
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Virtual Private Networks (VPNs)
VPNs provide an encrypted network tunnel over the Internet to provide secure access to a remote network. Client-to-site VPNs allow individual device access where site-to-site VPNs can securely link branch offices over the Internet or...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing Endpoints
In the enterprise, endpoint detection and response solutions report to a centralized SIEM solution when abnormal activity, including malware, is detected on hosts and devices. Intrusion detection and prevention systems (IDS/IPS) are the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks
Staying up-to-date with the latest types of security attacks is form of attack mitigation. Keeping systems hardened helps protect against zero-day attacks. Software developers must adhere to secure coding practices to ensure deployed...
Packt
CompTIA Network+ Certification N10-007: The Total Course - User Training
This video explains how, why, and when of training users. This clip is from the chapter "Managing Risk" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn to work with risk...
Science360
Young citizen scientists assist in Salt Lake City air quality research - Science Nation
Community, students and scientists benefit from partnership to assess particulate matter pollution
Middle and high school students in Salt Lake City are helping scientists and the community better understand particulate matter...
Curated Video
routing protocols : Terms: AS, IGPs, EGPs
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Terms: AS, IGPs, EGPs
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 8
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing with Real World Natural Images: Working with...
Curated Video
Data Science and Machine Learning with R - Networking Do's and Don'ts
This video explains networking do's and don'ts. This clip is from the chapter "Starting a Career in Data Science" of the series "Data Science and Machine Learning with R from A-Z Course [Updated for 2021]".This section explains how to...
IDG TECHtalk
How to keep attackers from using Active Directory against you
Criminals will try to change Windows Active Directory Group Policy security settings to enable attacks. Here’s how to stop them.
IDG TECHtalk
How to set up Edge Chromium security options
Edge Chromium can provide more protection for organizations that use older versions of Windows.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Proxy Servers
Forward proxies sit between internal user devices and the Internet and fetch Internet content on behalf of internal users. Reverse proxies map public network service IPs to private IPs; they route client requests for a network service to...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - SSH Public Key Authentication Lab
Multifactor authentication should always be used for administrative accounts. In this demo, SSH public key authentication is configured for a Linux host. This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - IOT (Internet Of Things)
CISSP Domain 3: System Architecture and Engineering: IOT (Internet Of Things). This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge)
Introduction: The 8 CISSP domains or CBKs (Common Bodies of Knowledge). This clip is from the chapter "Introduction" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp 2019".This section...
Curated Video
Active Directory with Windows Server 2016 - Preparing AD FS Installation
Walk through the steps to install Active Directory Federation Services, including the list of pre-installation requirements and planning needed to accomplish this installation. This clip is from the chapter "Implement Identity Federation...
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Express Route - II
In this video, we will cover express route Capabilities. This clip is from the chapter "Interconnectivity" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section introduces interconnectivity along with benefits of...
The Wall Street Journal
Edge Computing: The State of Adoption
What’s the broad picture of adoption for edge computing? Frost&Sullivan's Lynda Stadtmueller discusses the leading use cases, results and hurdles and look at industries where edge computing could make the biggest difference.
Curated Video
Describe network protocols : TCP Protocol
From the section: Programming TCP Clients and Servers In this section, we will learn about how to build TCP Servers and how it works. In this video, we will get an overview on TCP protocol. • Learn how the connection works • Get some...