Instructional Video4:21
IDG TECHtalk

Guide to key Windows 10 event logs you need to monitor

Higher Ed
These are the event logs that will help you identify malicious activity on your network.
Instructional Video2:59
IDG TECHtalk

Top vulnerabilities used in attacks on Windows networks in 2020

Higher Ed
COVID has changed tactics that attackers use to compromise Windows networks. These are the vulnerabilities they now favor.
Instructional Video8:41
Curated Video

CISSP®- IAAA - Part 2 - Identification, Authentication, Authorization, and Accountability

Higher Ed
This is the second part of a two-part video that explains the concept of IAAA. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Instructional Video4:05
IDG TECHtalk

How to improve Windows 10 security on PCs that can’t run Windows 11

Higher Ed
Most businesses will have some PCs that they can’t update to Windows 11. Here’s how to keep those PCs from being a security weak link.
Instructional Video3:54
IDG TECHtalk

Eliminate compromised and weak passwords

Higher Ed
A single compromised password allowed attackers access to Colonial Pipeline’s network. Chaos ensued. This advice will help you avoid that fate.
Instructional Video12:42
Packt

CompTIA Network+ Certification N10-007: The Total Course - Introduction to Internet Protocol (IP) Addressing and Binary

Higher Ed
This video provides an introduction to IP addressing and explains how they are constructed. This clip is from the chapter "Transmission Control Protocol/Internet Protocol (TCP/IP) Basics" of the series "CompTIA Network+ Certification...
Instructional Video8:50
Packt

CompTIA Network+ Certification N10-007: The Total Course - More Wireless Scenarios

Higher Ed
This video explains some more real-world scenarios that can take down a wireless network, with a special focus on wireless devices. This clip is from the chapter "Wireless Networking" of the series "CompTIA Network+ Certification...
Instructional Video11:38
Packt

CompTIA Network+ Certification N10-007: The Total Course - Introduction to 802.11

Higher Ed
This video provides an introduction to the 80 2.11 wireless standards and how it works with wireless network traffic. This clip is from the chapter "Wireless Networking" of the series "CompTIA Network+ Certification N10-007: The Total...
Instructional Video18:56
Packt

CompTIA Network+ Certification N10-007: The Total Course - Applying Domain Name System (DNS)

Higher Ed
This video explains how to work with DNS and discusses the various record types that are available, what their purpose is, and how they can be used. This clip is from the chapter "Network Naming" of the series "CompTIA Network+...
Instructional Video4:03
Curated Video

API Testing with Postman - Risks of Using Services and APIs

Higher Ed
Understand what things are important to consider when mitigating risk in API testing • Talk about risks that are greater in API testing • Mention some strategies to mitigate these risks • Encourage viewer’s to think this through with...
Instructional Video15:45
Financial Times

Why did the UK sell off the railways?

Higher Ed
Miranda Green tracks down the politicians who privatised Britain's railways, and speaks to key supporters of Jeremy Corbyn's plan for re-nationalisation.
Instructional Video2:17
XKA Digital

Networan bring you the solutions your looor

Higher Ed
Over the last two decades Alex has been a senior specialist change consultant within the media industry at the BBC, in local government at Kent County Council, and most recently in IT professional services at Capita and Capgemini. Having...
Instructional Video4:18
NASA

NASA | The Data Downpour

3rd - 11th
A video describing how the GPM constellation turns observed radiances and reflectivities of global precipitation into data products.
Instructional Video11:59
IDG TECHtalk

Is cryptocurrency a viable financial alternative for Russia?

Higher Ed
Financial sanctions levied against Russia have caused the Russian economy and its currency, the ruble, to tumble. At the same time, the values of cryptocurrencies like Bitcoin and Ethereum soared after Russia had been banned from SWIFT....
Instructional Video4:03
IDG TECHtalk

How to reset the Kerberos password in Active Directory

Higher Ed
Changing the Kerberos password will help prevent golden ticket attacks on Active Directory.
Instructional Video5:03
IDG TECHtalk

How to make Remote Desktop Protocol more secure

Higher Ed
Many organizations are using Microsoft’s RDP to set up remote workers. Use these tweaks to better protect those connections.
Instructional Video14:51
Curated Video

CISSP®- Laws and Regulations

Higher Ed
This video focuses on the laws and regulations. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and...
Instructional Video6:11
Curated Video

Active Directory with Windows Server 2016 - GPO Client Setting

Higher Ed
In this video, discover implementing GPO client settings, and learn how to use GPO settings for redirecting paths, software deployment, and executing security scripts. This clip is from the chapter "Create and Manage Group Policy" of the...
Instructional Video4:55
Curated Video

AZ-204 Developing for Microsoft Azure Exam Prep - Connecting to a Virtual Machine (VM) Using Remote Desktop Protocol (RDP)

Higher Ed
This video shows how to connect a VM using RDP. This clip is from the chapter "AZ-204 Virtual Machines (VMs)" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section introduces you to 2G and AZ-204 VMs.
Instructional Video4:36
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Nmap Lab

Higher Ed
IT network reconnaissance begins with discover hosts and services on the network. This episode uses the nmap command to map out hosts on the network. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+...
Instructional Video9:16
Packt

CompTIA Network+ Certification N10-007: The Total Course - Documenting Logs

Higher Ed
This video helps you examine the various log files that technicians can use to troubleshoot networks. This clip is from the chapter "Network Monitoring" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this...
Instructional Video5:28
Packt

CompTIA Network+ Certification N10-007: The Total Course - Troubleshooting Structured Cabling – Part 2

Higher Ed
This is the second part of the two-part video that continues the discussion of structured cabling by examining how to use voltage monitors, environmental/temperature monitors, and TDRs to troubleshoot a cabling installation. This clip is...
Instructional Video5:00
Packt

CompTIA Network+ Certification N10-007: The Total Course - Authenticating, Authorizing, and Accounting (AAA)

Higher Ed
This video explains how RADIUS and TACACS+ protocol is used to provide network AAA. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA Network+ Certification N10-007:...
Instructional Video4:21
Packt

CompTIA Network+ Certification N10-007: The Total Course - Access Control "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)"

Higher Ed
This video dives into access control lists, describing the three levels of control commonly used in computing. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA...