Curated Video
Active Directory with Windows Server 2016 - Adding Domain Controller to an Existing Forest
The next step is to add a DC into a forest, so you’ll review and consider options that will affect how the domain interacts with existing AD security systems. This clip is from the chapter "Install and Configure AD DS" of the series...
Mediacorp
Exploring the Exciting Possibilities of 5G Technology in South Korea
This video discusses the early access to 5G technology in Korea and the various applications and services that can be developed using the faster network. The video emphasizes the potential of 5G to revolutionize video content consumption...
XKA Digital
Three lessons from a mentor
James Parr is a designer, entrepreneur and technologist who for over 15 years has been dedicated to answering the question: How can we help innovate radical new approaches to systems problems? Trillium Technologies, of which James is...
All In One Social Media
How to Use Hopin! Streamyard & Hopin - What you need to know!
Streamyard has been aquiered by Hopin. In this video I will give you a walk through of how to use Hopin as an attendee and event host.
Packt
List computer networking media : Virtual Private Networks (VPNs)
From the section: The Internet. Here, we explore our internet options. In this episode, Mike shows how virtual private networking (VPN) works and why people use VPN connections. He discusses the types of protocols and clients that make...
Curated Video
Describe network protocols : The Course Overview
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. This video will give you an overview about the course.
Curated Video
SIM Cards: the Key to Your Phone's Functionality
A SIM card is a type of ID card for your phone. It tells your phone which network to connect to and which messages and phone calls to receive. Learn about the convenience and functionality of SIM cards.
IDG TECHtalk
How to protect Windows administrator accounts
Compromising windows administrator accounts is always a key goal for attackers. You can help prevent that from happening with these best practices.
IDG TECHtalk
How to securely set up split-tunnel VPNs
Some organizations are setting up split-tunnel virtual private networks to allow remote workers to connect to a Windows network. Follow these steps to minimize security risks.
IDG TECHtalk
FCC to auction off 5G bandwidth; Apple data privacy update
The Federal Communications Commission (FCC) in the United States will auction off previously reserved 5G spectrum, potentially speeding up next-generation wireless rollout. As device makers continue to release 5G-enabled phones and...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 6 Exam Question Review
Address Resolution Protocol (ARP) is used by the TCP/IP protocol suite. This episode discussed ARP poisoning attacks and potential mitigations. This clip is from the chapter "The Basic LAN" of the series "CompTIA Security+ Certification...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Keylogger Demo
Limited access to network computers can prevent malicious actors from installing components such as hardware key loggers, which can capture all user keystrokes and make them available to an attacker over a Wi-Fi network. This clip is...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Introduction to Structured Cabling
This video provides an introduction to structured cabling and explains its basic components, such as an equipment room, horizontal runs, and the work area. This clip is from the chapter "Installing a Physical Network" of the series...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Cellular Technologies
This video explains the cellular networking options, such as HSPA+ and LTE. This clip is from the chapter "Mobile Networking" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn more...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Introduction to Virtual Local Area Networks (VLANs)
This video provides an introduction to VLANs and explores the concepts and processes behind virtual LANs, including managed switches and trunking. This clip is from the chapter "Advanced Networking Devices" of the series "CompTIA...
Curated Video
World of Computer Networking Your CCNA start - Collision Domains
This video introduces you to collision domains. This clip is from the chapter "Switches and Data Link Layer" of the series "World of Computer Networking: Your CCNA start".This section introduces you to switches and the data link layer.
Mediacorp
Reducing Traffic and Emissions with Parcel Lockers
Increasing online orders and home deliveries is leading to more delivery vehicles on the road, adding to traffic congestion and carbon emissions. Using automated parcel lockers could reduce these issues, but adoption of these lockers has...
Blockchain Central
Why Do We Need Digital Identities? | Blockchain Central
Following the topic of private data security, this week on Blockchain Central we will explore what a digital identity is and how it can improve the safety of our personal data.
Curated Video
Bug Bounty Program Certification 5.1: About Network Internal Attack on Server
In this video, explore various network internal attacks. • Learn about network internal attack and listing of attacks • Explore DOS attack and password cracking techniques • Understand server scanning techniques
Curated Video
routing protocols : Classful routing protocols
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Classful routing protocols
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Practical Example - Vehicle Speed Determination
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Practical Example - Vehicle Speed Determination
IDG TECHtalk
Coronavirus pandemic amplifies internet access and digital divide
As some people continue to work and learn from home six months into the coronavirus pandemic, reliable and fast internet access is as important as ever. But in rural communities without access to broadband, or for those who simply can’t...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Discovery and Attacks
Is your Wi-Fi network completely invisible if you disable SSID broadcasting? No! Periodic beacon frames are still sent wirelessly with the WLAN name field excluded. Freely available tools can be used to discover and crack WEP and WPA...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Broadcast versus Unicast
This video illustrates the difference between broadcast and unicast. In this episode, Mike describes the typical frame traffic that uses destination and source MAC addresses for communicating over a network. He also shows the broadcast...