Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Hardening
There are many options for securing Wi-Fi networks. Disabling items such as WLAN name broadcast, DHCP, and public network management are the first consideration. Using WPA3 enterprise mode and changing default settings also help harden...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Virtualization
CISSP Domain 3: System Architecture and Engineering: Virtualization. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
Curated Video
Active Directory with Windows Server 2016 - Introduction to Web App Proxy
Understand the benefits, usage, and purpose of Web App Proxy (WAP) with Federation Services and learn about the requirements to implement and authenticate. This clip is from the chapter "Implement Identity Federation and Access...
Curated Video
The Birth of the Xia dynasty in China
An episode of chinese dynasty and the yellow river flood taking numerous lives due to lack of minimising ways. Yu The Great proved to be a hero in upcoming the situation through his diligence and mindfulness.
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - How Hard Is it to Get Hacked?
You will learn how hard it has become to hack into systems and company networks these days. This clip is from the chapter "How Hard Is it to Get Hacked?" of the series "The Beginners 2022 Cyber Security Awareness Training Course".This...
Packt
Advanced Computer Vision Projects 3.4: Videos and Retraining
In this video, we’ll briefly cover how to extend the model to handle videos and how to retrain the model. • See that we can apply algorithms to videos by running frame-by-frame • Briefly go over instructions to retrain on existing or new...
Curated Video
Bug Bounty Program Certification 6.6: Infect Complete Network Using Malwares
In this video, you will see how to infect entire network using malwares. • Learn about various network attacks • Explore the process of network infection techniques • Explanation of malware infection in network
Packt
State the purpose of network hardware : Introduction to Networking
From the section: Introduction to Computer Networks (ICND1). This Section introduces Computer Networks. This includes lectures on Physical Components, Topology, Speed etc. Introduction to Computer Networks (ICND1): Physical Components
IDG TECHtalk
What is edge computing?
Edge computing is what it sounds like: computing that takes place at the edge of corporate networks, with “the edge” being defined as the place where end devices access the rest of the network – things like phones, laptops, industrial...
IDG TECHtalk
Best practices for secure work-from-home VPN connections
As more employees work from home, it’s important to review your VPN settings and following the best guidance.
IDG TECHtalk
3 easy ways to make your Windows network harder to hack
Start the new year off by eliminating common paths for attackers to breach your network.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Scanning with Nmap
Nmap is the most commonly used network scanning tool. Scans can be saved as XML files. Nmap can be used at the command line, but it also has a frontend GUI named Zenmap. This clip is from the chapter "Tools of the Trade" of the series...
Institute for New Economic Thinking
Frank Kelly - Networks and Systemic Risk
The Inaugural Conference @ King's, Institute for New Economic Thinking, Day 2 - Lunch: Networks and Systemic Risk
Curated Video
Deep Learning with Python (Video 4)
Deep learning is currently one of the best providers of solutions regarding problems in image recognition, speech recognition, object recognition, and natural language with its increasing number of libraries that are available in Python....
IDG TECHtalk
New Windows vulnerabilities underscore importance of network segmentation
The risk from two newly discovered Windows vulnerabilities could be mitigated if you’ve properly segmented your network. Here’s what you need to know.
IDG TECHtalk
How to double-check permissions post migration from Windows 7
It pays to make sure all permissions in your Windows environment are correct after migrating from Windows 7 or Server 2008 R2. Here’s how to check.
Curated Video
CISSP®- The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37 Revision 1 and 2
This video explains NIST SP 800-37 revision 1 and 2. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security...
Curated Video
CISSP®- Risk Response and Mitigation, Risk and Control Monitoring, and Control Reporting
This video explains the concepts of risk response and mitigation; risk and control monitoring; and finally, risk and control reporting. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 -...
Curated Video
CISSP®- Information Security Governance: Policies, Procedures, Guidelines, and Frameworks
This video focuses on policies, procedures, guidelines, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - IP Security (IPsec)
The IPsec network security protocol suite can be used to secure any type of network traffic through integrity, authentication and encryption. Many VPNs use IPsec to establish an encrypted network tunnel. This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Bots and Botnets
Distributed Denial of Service (DDoS) attacks use collections of infected bots, or zombies in a botnet, to flood victims hosts or networks. Bots periodically contact a malicious user-controlled command and control server. This clip is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Scanners
How do attackers discover networks and hosts? Network scanners such as Nmap are used by attackers as well as legitimate security technicians to perform network reconnaissance. This clip is from the chapter "Tools of the Trade" of the...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Introduction to Netstat
This video provides an introduction to the netstat command. This clip is from the chapter "Transmission Control Protocol/Internet Protocol TCP/IP Applications" of the series "CompTIA Network+ Certification N10-007: The Total Course".In...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Terminating Twisted Pair
This video explains how to terminate a cable to the 568A specification, focusing on the preparation and crimping process. This clip is from the chapter "Ethernet Basics" of the series "CompTIA Network+ Certification N10-007: The Total...