Instructional Video11:23
Packt

CompTIA Network+ Certification N10-007: The Total Course - Windows Name Resolution

Higher Ed
This video explains how Windows machines figure out names of other computers on the network, through processes such as NetBIOS and LLMNR. This clip is from the chapter "Network Naming" of the series "CompTIA Network+ Certification...
Instructional Video11:34
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - The CIA Triad - Part 1 - Confidentiality, Integrity, and Availability

Higher Ed
This is the first part of a two-part video that explains the CIA triad. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Instructional Video5:55
Curated Video

The Complete Practical Docker Guide - Container Processes and Resources

Higher Ed
This video demonstrates the container processes and resources. This clip is from the chapter "What is Docker and Docker Components" of the series "The Complete Practical Docker Guide".This section focuses on Docker and its components.
Instructional Video2:40
Curated Video

World of Computer Networking Your CCNA start - Network - Example 1

Higher Ed
This video explains network with an example. This clip is from the chapter "Networks" of the series "World of Computer Networking: Your CCNA start".This section introduces you to networks.
Instructional Video8:16
Curated Video

Docker Dockerfile and Docker Compose 2020 Ready - Understanding Network Segregation in Docker and the Docker0 network

Higher Ed
Understanding Network Segregation using Bridge Networks in Docker-Compose: Understanding Network Segregation in Docker and the Docker0 network This clip is from the chapter "Understanding Network Segregation using Bridge Networks in...
Instructional Video3:12
Mediacorp

South Korea is Leading the Way in 5G Technology

12th - Higher Ed
This video discusses the launch of 5G technology in South Korea, making it the first country to have a commercial 5G network. The video also highlights the need for infrastructure updates and the economic benefits of being a leader in 5G...
Instructional Video2:11
TMW Media

Kinetic Energy And The Work - Energy Theorem: The work-energy theorem

K - 5th
What is the work-energy theorem? Kinetic Energy And The Work - Energy Theorem, Part 3
Instructional Video1:44
XKA Digital

Getting full benefit from your global network

Higher Ed
Ian started his career below the line at IMP working with clients such as Philips, Umbro, P&G, Orange and Ericsson. Aged 28 and with some trusted friends and colleagues, Ian launched Iris. Iris is an agency designed to leverage the...
Instructional Video7:03
IDG TECHtalk

How to protect a Windows network from ransomware

Higher Ed
As the recent attack on Honda shows, anyone can be a victim of a ransomware attack. This advice will minimize your risk.
Instructional Video5:12
IDG TECHtalk

Top enterprise VPN vulnerabilities

Higher Ed
Don’t assume VPNs are always safe. These popular enterprise VPNs all have known remote code execution vulnerabilities.
Instructional Video11:48
Curated Video

CISSP®- Intellectual Property

Higher Ed
This video explains the concept of intellectual property. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
Instructional Video2:47
NASA

NASA | Planetary Scientist Profile: Emily Wilson

3rd - 11th
NASA scientist Emily Wilson discusses her work developing miniaturized instruments that measure greenhouse gases in the atmosphere. Her latest instrument, the mini-LHR, works in tandem with AERONET, and will contribute to the global...
Instructional Video5:39
NASA

NASA | LCRD: From Vision to Reality

3rd - 11th
Since its inception in 1958, NASA has relied exclusively on radio frequency (RF)-based communications as the only viable medium for exchanging data between a mission and a spacecraft. Today, with missions demanding communication with...
Instructional Video0:55
Curated Video

AZ-104: Microsoft Azure Administrator Full Course - Express Route - III

Higher Ed
In this video, we will cover express route-III. This clip is from the chapter "Interconnectivity" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section introduces interconnectivity along with benefits of network...
Instructional Video2:44
Curated Video

AZ-104: Microsoft Azure Administrator Full Course - Fault Domain and Update Domain

Higher Ed
In this video, we will look at the fault domain and update domain. This clip is from the chapter "Azure Virtual machines" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains Azure compute and creating...
Instructional Video8:12
Packt

CompTIA Network+ Certification N10-007: The Total Course - Net Command

Higher Ed
This video explains how to use the net command to display usernames, shared network resources, mapping network drives, and more. This clip is from the chapter "Network Naming" of the series "CompTIA Network+ Certification N10-007: The...
Instructional Video6:44
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Media storage

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Media storage This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
Instructional Video6:18
Curated Video

AZ-204 Developing for Microsoft Azure Exam Prep - Handling Transient Faults and Registering an Application with Azure Active Directory (AD)

Higher Ed
This video demonstrates how to handle transient faults and register an application with Azure AD. This clip is from the chapter "AZ-204 Scaling Applications and Services" of the series "AZ-204 Developing for Microsoft Azure Exam...
Instructional Video15:41
Curated Video

From 0 to 1 Data Structures & Algorithms in Java - Introducing The Graph

Higher Ed
Study of graphs and algorithms associated with graphs forms an entire field of study called graph theory. This clip is from the chapter "Graphs" of the series "From 0 to 1: Data Structures & Algorithms in Java".The author introduces you...
Instructional Video2:27
Curated Video

World of Computer Networking Your CCNA start - Local Area Network (LAN) versus Wide Area Network (WAN)

Higher Ed
This video highlights the difference between LAN and WAN. This clip is from the chapter "Routers and Network Layer" of the series "World of Computer Networking: Your CCNA start".This section introduces you to routers and the network layer.
Instructional Video5:49
Curated Video

World of Computer Networking Your CCNA start - Disadvantages of the Switched Network

Higher Ed
This video explains the disadvantages of the switched network. This clip is from the chapter "Routers and Network Layer" of the series "World of Computer Networking: Your CCNA start".This section introduces you to routers and the network...
Instructional Video6:10
Blockchain Central

Could Stellar Become a New Major ICO Platform? | Blockchain Central

Higher Ed
This week on Blockchain Central: we'll have a closer look at what makes Stellar special and how users can convert their currencies during the transaction? __ 'Blockchain Central' is your #1 trusted source for everything crypto. Our host...
Instructional Video1:55
Curated Video

routing protocols : Classless routing protocols

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Classless routing protocols
Instructional Video9:07
IDG TECHtalk

Microsoft changes its security update guide: What you need to know

Higher Ed
Microsoft has updated its Common Vulnerability Scoring System. Here’s a walk-through the changes.