Instructional Video24:41
The Wall Street Journal

UPS and UnitedHealthcare CIOs on Planning for a Post-Covid World

Higher Ed
Juan Perez and Carissa Rollins discuss how lessons learned during the pandemic will shape how CIOs manage in the future.
Instructional Video2:33
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- AWS Direct Connect

Higher Ed
In this video, we'll learn about AWS Direct Connect. This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is about AWS networking...
Instructional Video9:35
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- Additional Networking Services

Higher Ed
This video is about AWS networking and content delivery: additional networking services. This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for...
Instructional Video18:05
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Hacking Terminology

Higher Ed
This video teaches you the terminology used in hacking. This clip is from the chapter "Networking Tools and Essential Terminology" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn...
Instructional Video2:29
Curated Video

routing protocols : How does a router route when told conflicting information?

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: How does a router route when told...
Instructional Video8:18
Packt

List computer networking media : Dial-up Connections

Higher Ed
From the section: The Internet. Here, we explore our internet options. Mike ushers in a discussion about traditional wide area network connections through dial-up networking. Phased out in most metropolitan areas, dial-up is still...
Instructional Video8:53
Curated Video

Describe cyber attacks that could affect a computer system or network : Hidden Scanning Ports with Nmap

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will learn how to scan a target with...
Instructional Video9:24
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Example 2 - Build Multi-layer perceptron for binary classification

Higher Ed
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Example 2 - Build Multi-layer perceptron for binary classification
Instructional Video11:25
Curated Video

CISSP®- Governance, Management, Standards, and Frameworks

Higher Ed
This video focuses on governance, management, standards, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Instructional Video10:55
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- IP Addresses and Port Numbers - Part 1

Higher Ed
In this video, we'll learn about IP addresses and port numbers - part 1. This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is...
Instructional Video4:57
Curated Video

5G and Wireless Communication for Beginners - 5G Standards

Higher Ed
This video introduces you to 5G standards. This clip is from the chapter "5G Update - 2020" of the series "5G and Wireless Communication for Beginners".This section presents the latest updates on 5G.
Instructional Video5:22
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Other Layer 2 Attacks

Higher Ed
Layer 2 of the OSI model (Data Link layer) accessing network media and addressing using MAC addresses. MAC address flooding attacks and broadcast storms can be mitigated with network switches configuring with BPDU and STP. This clip is...
Instructional Video16:23
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Windows Command-Line Tools

Higher Ed
Security technicians must be comfortable with Windows commands for standard maintenance and security tasks using commands such as ping, netstat, and icalcs. This clip is from the chapter "Tools of the Trade" of the series "CompTIA...
Instructional Video11:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Linux Shells

Higher Ed
A Linux shell is a case-sensitive command line environment that supports scripting and comes in various flavors including Bash, Korn, and C shells. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+...
Instructional Video7:02
Packt

CompTIA Network+ Certification N10-007: The Total Course - Open Systems Interconnection (OSI) Model versus Transmission Control Protocol/Internet Protocol (TCP/IP) Model

Higher Ed
This video illustrates the difference between the OSI model and TCP/IP model. This clip is from the chapter "Network Models" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn to work...
Instructional Video3:19
Curated Video

Vietnam, Cu Chi Tunnels from the Vietnam's War

12th - Higher Ed
The Cu Chi tunnels were the location of several military campaigns during the Vietnam War, and were the Viet Cong's base of operations for the Tet Offensive in 1968. In order to combat better-supplied American and South Vietnamese forces...
Instructional Video9:39
The Wall Street Journal

Data Dive: Critical Calls to Action

Higher Ed
WSJ Pro Research commissioned a study to better understand how large enterprises are approaching cybersecurity. In part two of a two-part presentation, we share the calls to action that every CEO should heed.
Instructional Video6:36
Curated Video

Bug Bounty Program Certification 4.1: Bugs Overview in Networks As External Attacker

Higher Ed
In this video, we will find bugs in networks as external attacker. • Explore wireless attack process as an attacker • Learn about pre-attack phase of external attack • Learn about post attack phase of external attack
Instructional Video13:46
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Building a Logistic Classifier with Deep Learning and Keras

Higher Ed
From the section: Deep Learning and Tensorflow: Part 1. In this section, we’ll talk about what Deep Learning is, and how TensorFlow works at a low level. Deep Learning and Tensorflow: Part 1: [Activity] Building a Logistic Classifier...
Instructional Video1:14
Next Animation Studio

FBI tricked international cartels into using ‘encrypted’ phones

12th - Higher Ed
The huge surveillance operation started years ago, when a convicted drug smuggler offered the ‘back door’ of his special new gangster phone to the FBI.
Instructional Video1:49
Tarver Academy

Advice for Future School Administrators

12th - Higher Ed
In This Episode, Tyler Gives Advice To Future School Administrators
Instructional Video5:54
IDG TECHtalk

How to and why you should disable LLMNR with Windows Server

Higher Ed
Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.
Instructional Video9:10
Curated Video

CISSP®- Information Security Governance: Values, Vision, Mission, and Plans

Higher Ed
This video focuses on values, vision, mission, and plans. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
Instructional Video13:09
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- IP Addresses and Port Numbers – Part 2

Higher Ed
In this video, we'll learn about IP Addresses and Port Numbers – Part 2. This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is...