Instructional Video4:53
IDG TECHtalk

How an attacker can target phishing attacks

Higher Ed
There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you can...
Instructional Video5:46
IDG TECHtalk

How to set up a Microsoft Azure backup process

Higher Ed
Setting up a backup process in Azure is one way to quickly recover from a ransomware attack. Leave a comment below and suggest a topic for a future episode of Windows Security Tips.
Instructional Video2:22
IDG TECHtalk

How to audit Windows Task Scheduler to detect attacks

Higher Ed
Learn how to prevent attackers from using Task Scheduler to hide and set up tasks to access Windows systems.
Instructional Video5:00
Packt

Windows - Start Zookeeper and Kafka

Higher Ed
This video demonstrates how to start a Zookeeper server and install Kafka on Windows.
<
br/>
This clip is from the chapter "Starting Kafka" of the series "Apache Kafka Series - Learn Apache Kafka for Beginners".In this section, you...
Instructional Video5:41
Curated Video

Complete Modern C++ - Overview of Debugging in Visual Studio

Higher Ed
This video gives a gentle introduction to debugging C++ applications in Visual Studio and explains a few common shortcuts.
r/>
This clip is from the chapter "Basic Language Facilities" of the series "Complete Modern C++".In...
Instructional Video4:32
Curated Video

Comprehensive Android Developer Bootcamp - Running Android Apps on Physical Device - How to

Higher Ed
Running Android Apps on Physical Device:Running Android Apps on Physical Device - How to
r/>
This clip is from the chapter "Running Android Apps on Physical Device" of the series "The Comprehensive Android Developer...
Instructional Video23:14
IDG TECHtalk

What’s going on with Nvidia’s Arm acquisition? Plus, Apple silicon in 2022

Higher Ed
A recent report from Bloomberg revealed that Nvidia is preparing to abandon its acquisition of Arm. The deal would have made a joint Nvidia-Arm a semiconductor superpower, and as such it was subject to scrutiny from regulators....
Instructional Video6:47
Curated Video

Java Programming for Complete Beginners - Java 16 - Step 01 - Installing Java - Windows

Higher Ed
In this lesson, we will learn how to install Java for Windows.
r/>
This clip is from the chapter "Installing Java" of the series "Java Programming for Complete Beginners - Java 16".In this section, we will install Java and set...
Instructional Video2:17
The March of Time

Basic English 1 / vocab verbs

12th - Higher Ed
MOT: BASIC ENGLISH: Ranch farm set w/ man & woman on porch [SOT w/ subtitles] using English language phrases related to box: front back sides base cover over on. Males bringing dollhouse onto porch house front door windows over under...
Instructional Video16:53
Curated Video

Serverless JavaScript Projects 2.2: Build Your Location AWS Lambda

Higher Ed
We need a way to capture the location information from the provided IP address. • Install serverless and AWS CLI • Utilize a function that queries a database for info from IP • Return the geolocation information to the user
Instructional Video9:32
Curated Video

Bug Bounty Program Certification 5.2: Find Major Bugs in Server

Higher Ed
In this video, we will learn about advance scanning using vulnerability scanner. • Use Nessus network vulnerability scanner • Use advance scan, find bugs in server • Explanation of bug available in server
Instructional Video4:21
IDG TECHtalk

Tips for finding signs of SolarWinds-type attacks in Active Directory

Higher Ed
The SolarWinds attackers used sophisticated techniques to steal admin credentials. Here’s what to look for in AD.
Instructional Video4:21
IDG TECHtalk

Guide to key Windows 10 event logs you need to monitor

Higher Ed
These are the event logs that will help you identify malicious activity on your network.
Instructional Video2:59
IDG TECHtalk

Top vulnerabilities used in attacks on Windows networks in 2020

Higher Ed
COVID has changed tactics that attackers use to compromise Windows networks. These are the vulnerabilities they now favor.
Instructional Video3:39
IDG TECHtalk

How to better control access to your Windows network

Higher Ed
Take stock of how people and devices access your network and block potential avenues of attack.
Instructional Video10:33
APMonitor

Python 🐍 Jupyter, VSCode Install

10th - Higher Ed
Jupyter notebook, Jupyter lab, and VSCode are installed to run a 'Hello, World' application in Ubuntu Linux for Python 3.8.





py
thon3 --version
sudo apt install python3
(Linux, apt or...
Instructional Video8:53
Curated Video

The Full Stack Web Development - Installation & Redis-CLI Basics

Higher Ed
Redis - The Cache Database: Installation & Redis-CLI Basics
r/>
This clip is from the chapter "Redis - The Cache Database" of the series "The Full Stack Web Development".In this section, we look into Redis – part of other...
Instructional Video35:26
IDG TECHtalk

WWDC 2021 recap: iPadOS overview, enterprise improvements and unannounced iOS 15 features

Higher Ed
Apple announced updates to its operating systems, including iOS, iPadOS and macOS at its annual Worldwide Developer Conference on Monday. iPadOS has new productivity features, but do the updates justify the company's decision to put an...
Instructional Video4:05
IDG TECHtalk

How to improve Windows 10 security on PCs that can’t run Windows 11

Higher Ed
Most businesses will have some PCs that they can’t update to Windows 11. Here’s how to keep those PCs from being a security weak link.
Instructional Video3:54
IDG TECHtalk

Eliminate compromised and weak passwords

Higher Ed
A single compromised password allowed attackers access to Colonial Pipeline’s network. Chaos ensued. This advice will help you avoid that fate.
Instructional Video4:15
Curated Video

Ansible for the Absolute Beginner - Ansible Inventory

Higher Ed
This video focuses on Ansible inventory.<br/<br/>>

This clip is from the chapter "Introduction to Ansible Inventory" of the series "Ansible for the Absolute Beginner - Hands-On – DevOps".This section focuses on Ansible inventory.
Instructional Video5:14
Curated Video

Spring Framework Master Class - Java Spring the Modern Way - Step 1-Creating a Java Project

Higher Ed
This video demonstrates how to create a Java project.
r/>
This clip is from the chapter "Basic Tools and Framework - Eclipse in 5 steps" of the series "Spring Framework Master Class - Java Spring the Modern Way".This section...
Instructional Video5:50
Curated Video

Node.js API Masterclass with Express and MongoDB - Digital Ocean Droplet & Server Log In

Higher Ed
Documentation & Deploy: Digital Ocean Droplet & Server Log In<br/<br/>>

This clip is from the chapter "Documentation & Deploy" of the series "Node.js API Masterclass with Express and MongoDB".null
Instructional Video3:18
Curated Video

Java Programming for Complete Beginners - Java 16 - Troubleshooting Eclipse - Configuring Java JDK

Higher Ed
This video gives an overview of the entire section.
r/>
This clip is from the chapter "Appendix - Troubleshooting Eclipse and Java" of the series "Java Programming for Complete Beginners - Java 16".This section focuses on the...