The Wall Street Journal
UPS and UnitedHealthcare CIOs on Planning for a Post-Covid World
Juan Perez and Carissa Rollins discuss how lessons learned during the pandemic will shape how CIOs manage in the future.
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- AWS Direct Connect
In this video, we'll learn about AWS Direct Connect. This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is about AWS networking...
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- Additional Networking Services
This video is about AWS networking and content delivery: additional networking services. This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Hacking Terminology
This video teaches you the terminology used in hacking. This clip is from the chapter "Networking Tools and Essential Terminology" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn...
Curated Video
routing protocols : How does a router route when told conflicting information?
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: How does a router route when told...
Packt
List computer networking media : Dial-up Connections
From the section: The Internet. Here, we explore our internet options. Mike ushers in a discussion about traditional wide area network connections through dial-up networking. Phased out in most metropolitan areas, dial-up is still...
Curated Video
Describe cyber attacks that could affect a computer system or network : Hidden Scanning Ports with Nmap
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will learn how to scan a target with...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Example 2 - Build Multi-layer perceptron for binary classification
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Example 2 - Build Multi-layer perceptron for binary classification
Curated Video
CISSP®- Governance, Management, Standards, and Frameworks
This video focuses on governance, management, standards, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- IP Addresses and Port Numbers - Part 1
In this video, we'll learn about IP addresses and port numbers - part 1. This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is...
Curated Video
5G and Wireless Communication for Beginners - 5G Standards
This video introduces you to 5G standards. This clip is from the chapter "5G Update - 2020" of the series "5G and Wireless Communication for Beginners".This section presents the latest updates on 5G.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Other Layer 2 Attacks
Layer 2 of the OSI model (Data Link layer) accessing network media and addressing using MAC addresses. MAC address flooding attacks and broadcast storms can be mitigated with network switches configuring with BPDU and STP. This clip is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Windows Command-Line Tools
Security technicians must be comfortable with Windows commands for standard maintenance and security tasks using commands such as ping, netstat, and icalcs. This clip is from the chapter "Tools of the Trade" of the series "CompTIA...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Linux Shells
A Linux shell is a case-sensitive command line environment that supports scripting and comes in various flavors including Bash, Korn, and C shells. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Open Systems Interconnection (OSI) Model versus Transmission Control Protocol/Internet Protocol (TCP/IP) Model
This video illustrates the difference between the OSI model and TCP/IP model. This clip is from the chapter "Network Models" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn to work...
Curated Video
Vietnam, Cu Chi Tunnels from the Vietnam's War
The Cu Chi tunnels were the location of several military campaigns during the Vietnam War, and were the Viet Cong's base of operations for the Tet Offensive in 1968. In order to combat better-supplied American and South Vietnamese forces...
The Wall Street Journal
Data Dive: Critical Calls to Action
WSJ Pro Research commissioned a study to better understand how large enterprises are approaching cybersecurity. In part two of a two-part presentation, we share the calls to action that every CEO should heed.
Curated Video
Bug Bounty Program Certification 4.1: Bugs Overview in Networks As External Attacker
In this video, we will find bugs in networks as external attacker. • Explore wireless attack process as an attacker • Learn about pre-attack phase of external attack • Learn about post attack phase of external attack
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Building a Logistic Classifier with Deep Learning and Keras
From the section: Deep Learning and Tensorflow: Part 1. In this section, we’ll talk about what Deep Learning is, and how TensorFlow works at a low level. Deep Learning and Tensorflow: Part 1: [Activity] Building a Logistic Classifier...
Next Animation Studio
FBI tricked international cartels into using ‘encrypted’ phones
The huge surveillance operation started years ago, when a convicted drug smuggler offered the ‘back door’ of his special new gangster phone to the FBI.
Tarver Academy
Advice for Future School Administrators
In This Episode, Tyler Gives Advice To Future School Administrators
IDG TECHtalk
How to and why you should disable LLMNR with Windows Server
Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.
Curated Video
CISSP®- Information Security Governance: Values, Vision, Mission, and Plans
This video focuses on values, vision, mission, and plans. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- IP Addresses and Port Numbers – Part 2
In this video, we'll learn about IP Addresses and Port Numbers – Part 2. This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is...