Instructional Video10:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Hardening

Higher Ed
There are many options for securing Wi-Fi networks. Disabling items such as WLAN name broadcast, DHCP, and public network management are the first consideration. Using WPA3 enterprise mode and changing default settings also help harden...
Instructional Video14:02
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Virtualization

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Virtualization. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
Instructional Video3:37
Curated Video

Active Directory with Windows Server 2016 - Introduction to Web App Proxy

Higher Ed
Understand the benefits, usage, and purpose of Web App Proxy (WAP) with Federation Services and learn about the requirements to implement and authenticate. This clip is from the chapter "Implement Identity Federation and Access...
Instructional Video4:40
Curated Video

The Birth of the Xia dynasty in China

Higher Ed
An episode of chinese dynasty and the yellow river flood taking numerous lives due to lack of minimising ways. Yu The Great proved to be a hero in upcoming the situation through his diligence and mindfulness.
Instructional Video2:38
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - How Hard Is it to Get Hacked?

Higher Ed
You will learn how hard it has become to hack into systems and company networks these days. This clip is from the chapter "How Hard Is it to Get Hacked?" of the series "The Beginners 2022 Cyber Security Awareness Training Course".This...
Instructional Video3:28
Packt

Advanced Computer Vision Projects 3.4: Videos and Retraining

Higher Ed
In this video, we’ll briefly cover how to extend the model to handle videos and how to retrain the model. • See that we can apply algorithms to videos by running frame-by-frame • Briefly go over instructions to retrain on existing or new...
Instructional Video5:16
Curated Video

Bug Bounty Program Certification 6.6: Infect Complete Network Using Malwares

Higher Ed
In this video, you will see how to infect entire network using malwares. • Learn about various network attacks • Explore the process of network infection techniques • Explanation of malware infection in network
Instructional Video8:10
Packt

State the purpose of network hardware : Introduction to Networking

Higher Ed
From the section: Introduction to Computer Networks (ICND1). This Section introduces Computer Networks. This includes lectures on Physical Components, Topology, Speed etc. Introduction to Computer Networks (ICND1): Physical Components
Instructional Video3:07
IDG TECHtalk

What is edge computing?

Higher Ed
Edge computing is what it sounds like: computing that takes place at the edge of corporate networks, with “the edge” being defined as the place where end devices access the rest of the network – things like phones, laptops, industrial...
Instructional Video5:47
IDG TECHtalk

Best practices for secure work-from-home VPN connections

Higher Ed
As more employees work from home, it’s important to review your VPN settings and following the best guidance.
Instructional Video4:54
IDG TECHtalk

3 easy ways to make your Windows network harder to hack

Higher Ed
Start the new year off by eliminating common paths for attackers to breach your network.
Instructional Video8:59
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Scanning with Nmap

Higher Ed
Nmap is the most commonly used network scanning tool. Scans can be saved as XML files. Nmap can be used at the command line, but it also has a frontend GUI named Zenmap. This clip is from the chapter "Tools of the Trade" of the series...
Instructional Video16:43
Institute for New Economic Thinking

Frank Kelly - Networks and Systemic Risk

Higher Ed
The Inaugural Conference @ King's, Institute for New Economic Thinking, Day 2 - Lunch: Networks and Systemic Risk
Instructional Video7:57
Curated Video

Deep Learning with Python (Video 4)

Higher Ed
Deep learning is currently one of the best providers of solutions regarding problems in image recognition, speech recognition, object recognition, and natural language with its increasing number of libraries that are available in Python....
Instructional Video6:38
IDG TECHtalk

New Windows vulnerabilities underscore importance of network segmentation

Higher Ed
The risk from two newly discovered Windows vulnerabilities could be mitigated if you’ve properly segmented your network. Here’s what you need to know.
Instructional Video4:14
IDG TECHtalk

How to double-check permissions post migration from Windows 7

Higher Ed
It pays to make sure all permissions in your Windows environment are correct after migrating from Windows 7 or Server 2008 R2. Here’s how to check.
Instructional Video9:05
Curated Video

CISSP®- The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37 Revision 1 and 2

Higher Ed
This video explains NIST SP 800-37 revision 1 and 2. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security...
Instructional Video3:50
Curated Video

CISSP®- Risk Response and Mitigation, Risk and Control Monitoring, and Control Reporting

Higher Ed
This video explains the concepts of risk response and mitigation; risk and control monitoring; and finally, risk and control reporting. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 -...
Instructional Video14:31
Curated Video

CISSP®- Information Security Governance: Policies, Procedures, Guidelines, and Frameworks

Higher Ed
This video focuses on policies, procedures, guidelines, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Instructional Video9:00
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - IP Security (IPsec)

Higher Ed
The IPsec network security protocol suite can be used to secure any type of network traffic through integrity, authentication and encryption. Many VPNs use IPsec to establish an encrypted network tunnel. This clip is from the chapter...
Instructional Video6:14
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Bots and Botnets

Higher Ed
Distributed Denial of Service (DDoS) attacks use collections of infected bots, or zombies in a botnet, to flood victims hosts or networks. Bots periodically contact a malicious user-controlled command and control server. This clip is...
Instructional Video5:15
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Scanners

Higher Ed
How do attackers discover networks and hosts? Network scanners such as Nmap are used by attackers as well as legitimate security technicians to perform network reconnaissance. This clip is from the chapter "Tools of the Trade" of the...
Instructional Video8:50
Packt

CompTIA Network+ Certification N10-007: The Total Course - Introduction to Netstat

Higher Ed
This video provides an introduction to the netstat command. This clip is from the chapter "Transmission Control Protocol/Internet Protocol TCP/IP Applications" of the series "CompTIA Network+ Certification N10-007: The Total Course".In...
Instructional Video14:25
Packt

CompTIA Network+ Certification N10-007: The Total Course - Terminating Twisted Pair

Higher Ed
This video explains how to terminate a cable to the 568A specification, focusing on the preparation and crimping process. This clip is from the chapter "Ethernet Basics" of the series "CompTIA Network+ Certification N10-007: The Total...