Instructional Video7:32
Curated Video

Active Directory with Windows Server 2016 - Adding Domain Controller to an Existing Forest

Higher Ed
The next step is to add a DC into a forest, so you’ll review and consider options that will affect how the domain interacts with existing AD security systems. This clip is from the chapter "Install and Configure AD DS" of the series...
Instructional Video4:38
Mediacorp

Exploring the Exciting Possibilities of 5G Technology in South Korea

12th - Higher Ed
This video discusses the early access to 5G technology in Korea and the various applications and services that can be developed using the faster network. The video emphasizes the potential of 5G to revolutionize video content consumption...
Instructional Video1:42
XKA Digital

Three lessons from a mentor

Higher Ed
James Parr is a designer, entrepreneur and technologist who for over 15 years has been dedicated to answering the question: How can we help innovate radical new approaches to systems problems? Trillium Technologies, of which James is...
Instructional Video8:11
All In One Social Media

How to Use Hopin! Streamyard & Hopin - What you need to know!

Higher Ed
Streamyard has been aquiered by Hopin. In this video I will give you a walk through of how to use Hopin as an attendee and event host.
Instructional Video7:59
Packt

List computer networking media : Virtual Private Networks (VPNs)

Higher Ed
From the section: The Internet. Here, we explore our internet options. In this episode, Mike shows how virtual private networking (VPN) works and why people use VPN connections. He discusses the types of protocols and clients that make...
Instructional Video5:40
Curated Video

Describe network protocols : The Course Overview

Higher Ed
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. This video will give you an overview about the course.
Instructional Video3:00
Curated Video

SIM Cards: the Key to Your Phone's Functionality

Pre-K - Higher Ed
A SIM card is a type of ID card for your phone. It tells your phone which network to connect to and which messages and phone calls to receive. Learn about the convenience and functionality of SIM cards.
Instructional Video7:30
IDG TECHtalk

How to protect Windows administrator accounts

Higher Ed
Compromising windows administrator accounts is always a key goal for attackers. You can help prevent that from happening with these best practices.
Instructional Video6:19
IDG TECHtalk

How to securely set up split-tunnel VPNs

Higher Ed
Some organizations are setting up split-tunnel virtual private networks to allow remote workers to connect to a Windows network. Follow these steps to minimize security risks.
Instructional Video27:49
IDG TECHtalk

FCC to auction off 5G bandwidth; Apple data privacy update

Higher Ed
The Federal Communications Commission (FCC) in the United States will auction off previously reserved 5G spectrum, potentially speeding up next-generation wireless rollout. As device makers continue to release 5G-enabled phones and...
Instructional Video3:28
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 6 Exam Question Review

Higher Ed
Address Resolution Protocol (ARP) is used by the TCP/IP protocol suite. This episode discussed ARP poisoning attacks and potential mitigations. This clip is from the chapter "The Basic LAN" of the series "CompTIA Security+ Certification...
Instructional Video4:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Keylogger Demo

Higher Ed
Limited access to network computers can prevent malicious actors from installing components such as hardware key loggers, which can capture all user keystrokes and make them available to an attacker over a Wi-Fi network. This clip is...
Instructional Video4:16
Packt

CompTIA Network+ Certification N10-007: The Total Course - Introduction to Structured Cabling

Higher Ed
This video provides an introduction to structured cabling and explains its basic components, such as an equipment room, horizontal runs, and the work area. This clip is from the chapter "Installing a Physical Network" of the series...
Instructional Video5:18
Packt

CompTIA Network+ Certification N10-007: The Total Course - Cellular Technologies

Higher Ed
This video explains the cellular networking options, such as HSPA+ and LTE. This clip is from the chapter "Mobile Networking" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn more...
Instructional Video11:52
Packt

CompTIA Network+ Certification N10-007: The Total Course - Introduction to Virtual Local Area Networks (VLANs)

Higher Ed
This video provides an introduction to VLANs and explores the concepts and processes behind virtual LANs, including managed switches and trunking. This clip is from the chapter "Advanced Networking Devices" of the series "CompTIA...
Instructional Video4:20
Curated Video

World of Computer Networking Your CCNA start - Collision Domains

Higher Ed
This video introduces you to collision domains. This clip is from the chapter "Switches and Data Link Layer" of the series "World of Computer Networking: Your CCNA start".This section introduces you to switches and the data link layer.
Instructional Video4:21
Mediacorp

Reducing Traffic and Emissions with Parcel Lockers

12th - Higher Ed
Increasing online orders and home deliveries is leading to more delivery vehicles on the road, adding to traffic congestion and carbon emissions. Using automated parcel lockers could reduce these issues, but adoption of these lockers has...
Instructional Video6:30
Blockchain Central

Why Do We Need Digital Identities? | Blockchain Central

Higher Ed
Following the topic of private data security, this week on Blockchain Central we will explore what a digital identity is and how it can improve the safety of our personal data.
Instructional Video6:34
Curated Video

Bug Bounty Program Certification 5.1: About Network Internal Attack on Server

Higher Ed
In this video, explore various network internal attacks. • Learn about network internal attack and listing of attacks • Explore DOS attack and password cracking techniques • Understand server scanning techniques
Instructional Video2:52
Curated Video

routing protocols : Classful routing protocols

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Classful routing protocols
Instructional Video6:27
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Practical Example - Vehicle Speed Determination

Higher Ed
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Practical Example - Vehicle Speed Determination
Instructional Video18:06
IDG TECHtalk

Coronavirus pandemic amplifies internet access and digital divide

Higher Ed
As some people continue to work and learn from home six months into the coronavirus pandemic, reliable and fast internet access is as important as ever. But in rural communities without access to broadband, or for those who simply can’t...
Instructional Video12:11
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Discovery and Attacks

Higher Ed
Is your Wi-Fi network completely invisible if you disable SSID broadcasting? No! Periodic beacon frames are still sent wirelessly with the WLAN name field excluded. Freely available tools can be used to discover and crack WEP and WPA...
Instructional Video4:19
Packt

CompTIA Network+ Certification N10-007: The Total Course - Broadcast versus Unicast

Higher Ed
This video illustrates the difference between broadcast and unicast. In this episode, Mike describes the typical frame traffic that uses destination and source MAC addresses for communicating over a network. He also shows the broadcast...