Instructional Video3:03
Curated Video

Python 3: Project-based Python, Algorithms, Data Structures - BST - Deleting leaf nodes

Higher Ed
Here, the author thanks everyone for taking the course and suggestions for possible next steps This clip is from the chapter "Algorithms - Search and abstract data structures" of the series "Python 3: Project-based Python, Algorithms,...
Instructional Video8:09
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - The Metasploit Framework

Higher Ed
Penetration testers can use the cross-platform Metasploit framework command-line tool for discovering and exploiting security flaws on hosts. This clip is from the chapter "Testing Infrastructure" of the series "CompTIA Security+...
Instructional Video2:15
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 13 Ask Me Anything (AMA)

Higher Ed
There is much to be learned by analyzing past security incidents. In this episode, Dan discussed the Cyber Kill Chain. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video2:21
Science360

What do we know about how people recognize faces?

12th - Higher Ed
What do we know about how people recognize faces? Catherine Stamoulis, assistant professor of pediatrics at Harvard Medical School, answers the question on this edition of "Ask a Scientist."
Podcast16:33
NASA

‎The Invisible Network: Bonus - Dr. Jim Garvin | NASA's The Invisible Network Podcast

Pre-K - Higher Ed
There is perhaps no one better than Jim Garvin to outline the unique opportunities for research that the Artemis missions to the Moon could provide scientists on Earth. Jim is chief scientist at NASA’s Goddard Space Flight Center in...
Instructional Video10:03
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Code to build a perceptron for binary classification

Higher Ed
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Code to build a perceptron for binary classification
Instructional Video10:07
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Virtual Private Networks (VPNs)

Higher Ed
VPNs provide an encrypted network tunnel over the Internet to provide secure access to a remote network. Client-to-site VPNs allow individual device access where site-to-site VPNs can securely link branch offices over the Internet or...
Instructional Video9:03
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing Endpoints

Higher Ed
In the enterprise, endpoint detection and response solutions report to a centralized SIEM solution when abnormal activity, including malware, is detected on hosts and devices. Intrusion detection and prevention systems (IDS/IPS) are the...
Instructional Video9:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks

Higher Ed
Staying up-to-date with the latest types of security attacks is form of attack mitigation. Keeping systems hardened helps protect against zero-day attacks. Software developers must adhere to secure coding practices to ensure deployed...
Instructional Video2:57
Packt

CompTIA Network+ Certification N10-007: The Total Course - User Training

Higher Ed
This video explains how, why, and when of training users. This clip is from the chapter "Managing Risk" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn to work with risk...
Instructional Video4:30
Science360

Young citizen scientists assist in Salt Lake City air quality research - Science Nation

12th - Higher Ed
Community, students and scientists benefit from partnership to assess particulate matter pollution Middle and high school students in Salt Lake City are helping scientists and the community better understand particulate matter...
Instructional Video4:21
Curated Video

routing protocols : Terms: AS, IGPs, EGPs

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Terms: AS, IGPs, EGPs
Instructional Video14:04
Curated Video

Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 8

Higher Ed
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing with Real World Natural Images: Working with...
Instructional Video3:51
Curated Video

Data Science and Machine Learning with R - Networking Do's and Don'ts

Higher Ed
This video explains networking do's and don'ts. This clip is from the chapter "Starting a Career in Data Science" of the series "Data Science and Machine Learning with R from A-Z Course [Updated for 2021]".This section explains how to...
Instructional Video6:40
IDG TECHtalk

How to keep attackers from using Active Directory against you

Higher Ed
Criminals will try to change Windows Active Directory Group Policy security settings to enable attacks. Here’s how to stop them.
Instructional Video3:40
IDG TECHtalk

How to set up Edge Chromium security options

Higher Ed
Edge Chromium can provide more protection for organizations that use older versions of Windows.
Instructional Video6:16
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Proxy Servers

Higher Ed
Forward proxies sit between internal user devices and the Internet and fetch Internet content on behalf of internal users. Reverse proxies map public network service IPs to private IPs; they route client requests for a network service to...
Instructional Video9:06
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - SSH Public Key Authentication Lab

Higher Ed
Multifactor authentication should always be used for administrative accounts. In this demo, SSH public key authentication is configured for a Linux host. This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Instructional Video1:47
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - IOT (Internet Of Things)

Higher Ed
CISSP Domain 3: System Architecture and Engineering: IOT (Internet Of Things). This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Instructional Video9:39
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge)

Higher Ed
Introduction: The 8 CISSP domains or CBKs (Common Bodies of Knowledge). This clip is from the chapter "Introduction" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp 2019".This section...
Instructional Video2:59
Curated Video

Active Directory with Windows Server 2016 - Preparing AD FS Installation

Higher Ed
Walk through the steps to install Active Directory Federation Services, including the list of pre-installation requirements and planning needed to accomplish this installation. This clip is from the chapter "Implement Identity Federation...
Instructional Video4:11
Curated Video

AZ-104: Microsoft Azure Administrator Full Course - Express Route - II

Higher Ed
In this video, we will cover express route Capabilities. This clip is from the chapter "Interconnectivity" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section introduces interconnectivity along with benefits of...
Instructional Video28:48
The Wall Street Journal

Edge Computing: The State of Adoption

Higher Ed
What’s the broad picture of adoption for edge computing? Frost&Sullivan's Lynda Stadtmueller discusses the leading use cases, results and hurdles and look at industries where edge computing could make the biggest difference.
Instructional Video12:53
Curated Video

Describe network protocols : TCP Protocol

Higher Ed
From the section: Programming TCP Clients and Servers In this section, we will learn about how to build TCP Servers and how it works. In this video, we will get an overview on TCP protocol. • Learn how the connection works • Get some...