IDG TECHtalk
Guide to key Windows 10 event logs you need to monitor
These are the event logs that will help you identify malicious activity on your network.
IDG TECHtalk
Top vulnerabilities used in attacks on Windows networks in 2020
COVID has changed tactics that attackers use to compromise Windows networks. These are the vulnerabilities they now favor.
Curated Video
CISSP®- IAAA - Part 2 - Identification, Authentication, Authorization, and Accountability
This is the second part of a two-part video that explains the concept of IAAA. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
IDG TECHtalk
How to improve Windows 10 security on PCs that can’t run Windows 11
Most businesses will have some PCs that they can’t update to Windows 11. Here’s how to keep those PCs from being a security weak link.
IDG TECHtalk
Eliminate compromised and weak passwords
A single compromised password allowed attackers access to Colonial Pipeline’s network. Chaos ensued. This advice will help you avoid that fate.
Packt
CompTIA Network+ Certification N10-007: The Total Course - Introduction to Internet Protocol (IP) Addressing and Binary
This video provides an introduction to IP addressing and explains how they are constructed. This clip is from the chapter "Transmission Control Protocol/Internet Protocol (TCP/IP) Basics" of the series "CompTIA Network+ Certification...
Packt
CompTIA Network+ Certification N10-007: The Total Course - More Wireless Scenarios
This video explains some more real-world scenarios that can take down a wireless network, with a special focus on wireless devices. This clip is from the chapter "Wireless Networking" of the series "CompTIA Network+ Certification...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Introduction to 802.11
This video provides an introduction to the 80 2.11 wireless standards and how it works with wireless network traffic. This clip is from the chapter "Wireless Networking" of the series "CompTIA Network+ Certification N10-007: The Total...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Applying Domain Name System (DNS)
This video explains how to work with DNS and discusses the various record types that are available, what their purpose is, and how they can be used. This clip is from the chapter "Network Naming" of the series "CompTIA Network+...
Curated Video
API Testing with Postman - Risks of Using Services and APIs
Understand what things are important to consider when mitigating risk in API testing • Talk about risks that are greater in API testing • Mention some strategies to mitigate these risks • Encourage viewer’s to think this through with...
Financial Times
Why did the UK sell off the railways?
Miranda Green tracks down the politicians who privatised Britain's railways, and speaks to key supporters of Jeremy Corbyn's plan for re-nationalisation.
XKA Digital
Networan bring you the solutions your looor
Over the last two decades Alex has been a senior specialist change consultant within the media industry at the BBC, in local government at Kent County Council, and most recently in IT professional services at Capita and Capgemini. Having...
NASA
NASA | The Data Downpour
A video describing how the GPM constellation turns observed radiances and reflectivities of global precipitation into data products.
IDG TECHtalk
Is cryptocurrency a viable financial alternative for Russia?
Financial sanctions levied against Russia have caused the Russian economy and its currency, the ruble, to tumble. At the same time, the values of cryptocurrencies like Bitcoin and Ethereum soared after Russia had been banned from SWIFT....
IDG TECHtalk
How to reset the Kerberos password in Active Directory
Changing the Kerberos password will help prevent golden ticket attacks on Active Directory.
IDG TECHtalk
How to make Remote Desktop Protocol more secure
Many organizations are using Microsoft’s RDP to set up remote workers. Use these tweaks to better protect those connections.
Curated Video
CISSP®- Laws and Regulations
This video focuses on the laws and regulations. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and...
Curated Video
Active Directory with Windows Server 2016 - GPO Client Setting
In this video, discover implementing GPO client settings, and learn how to use GPO settings for redirecting paths, software deployment, and executing security scripts. This clip is from the chapter "Create and Manage Group Policy" of the...
Curated Video
AZ-204 Developing for Microsoft Azure Exam Prep - Connecting to a Virtual Machine (VM) Using Remote Desktop Protocol (RDP)
This video shows how to connect a VM using RDP. This clip is from the chapter "AZ-204 Virtual Machines (VMs)" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section introduces you to 2G and AZ-204 VMs.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Nmap Lab
IT network reconnaissance begins with discover hosts and services on the network. This episode uses the nmap command to map out hosts on the network. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Documenting Logs
This video helps you examine the various log files that technicians can use to troubleshoot networks. This clip is from the chapter "Network Monitoring" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Troubleshooting Structured Cabling – Part 2
This is the second part of the two-part video that continues the discussion of structured cabling by examining how to use voltage monitors, environmental/temperature monitors, and TDRs to troubleshoot a cabling installation. This clip is...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Authenticating, Authorizing, and Accounting (AAA)
This video explains how RADIUS and TACACS+ protocol is used to provide network AAA. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA Network+ Certification N10-007:...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Access Control "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)"
This video dives into access control lists, describing the three levels of control commonly used in computing. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA...