Hi, what do you want to do?
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Apple Part II
You will be presented with some of the main ways in which Apple protects you from evilness on the Internet, as well as some general things you can do to protect yourself whilst using a Mac computer.
r/>
This clip is from the...
r/>
This clip is from the...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Meterpreter Environment
This video teaches you to work with the Meterpreter environment.
r/>
This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
r/>
This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
National Parks Service
Everglades National Park - Reflecting on Hurricane Andrew
A compilation of video interviews with park staff and family reflecting on the impacts of Hurricane Andrew in August 1992. Uploaded in 2022 to commemorate the 30th Anniversary of when Hurricane Andrew struck South Florida.
Curated Video
The Full Stack Web Development - Basic Elements & Document Setup - Project Basic Elements
Basic HTML Programming: Basic Elements & Document Setup - Project Basic Elements
r/>
This clip is from the chapter "Basic HTML Programming" of the series "The Full Stack Web Development".In this section, the author briefly goes...
r/>
This clip is from the chapter "Basic HTML Programming" of the series "The Full Stack Web Development".In this section, the author briefly goes...
IDG TECHtalk
Installing Python on Windows 10
How to get Python installed and ready to use on the latest version of Windows.
IDG TECHtalk
How to prepare for the demise of Windows NT LAN Manager
NTLM is a less secure protocol for authenticating network access. Follow these steps to begin migration off it.
IDG TECHtalk
How the COVID-19 crisis impacts Windows security
Microsoft and Google are pausing Windows and Chrome updates, and Microsoft is offering remote access technology and advice.
IDG TECHtalk
Windows 10 security: Are you on the right version?
With some versions of Windows 10 off support or going off support soon, it’s time to review what security features you’re missing if you haven’t updated recently.
IDG TECHtalk
How to move users to the Outlook app with Intune
Microsoft is turning off basic authentication, so it’s wise to move mobile users to the Outlook app to better protect them from attackers.
IDG TECHtalk
How to harden Windows workstations and servers from attack
Use these basic settings to make it harder for attackers to Windows hardware. Let us know what you’d like to see in a future Windows Security Tips video in the comments.
Packt
Getting the Titles of Child Tabs with Optimized While Loop
This video explains how to get the titles of child tabs with an optimized While loop.
<
br/>
This clip is from the chapter "Real- Time Exercises (End-to-End Programming)" of the series "Selenium WebDriver with Java - Basics to...
<
br/>
This clip is from the chapter "Real- Time Exercises (End-to-End Programming)" of the series "Selenium WebDriver with Java - Basics to...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Single Sign-on (SSO)
This video explains how to log in to one computer and gain access to many. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA Network+ Certification N10-007: The Total...
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Azure File Storage
In this video, we will cover Azure file Storage.
r/>
This clip is from the chapter "Azure Storage" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains Azure storage and Azure storage accounts...
r/>
This clip is from the chapter "Azure Storage" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains Azure storage and Azure storage accounts...
Curated Video
AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - Instance Management of Amazon Elastic Compute Cloud (Amazon EC2)
This video will let you explore the ongoing management of Amazon EC2 instances.
r/>
This clip is from the chapter "Solutions Architect Chapter 6 - Compute Services Management" of the series "AWS Solutions Architect Associate...
r/>
This clip is from the chapter "Solutions Architect Chapter 6 - Compute Services Management" of the series "AWS Solutions Architect Associate...
Curated Video
C++ Standard Template Library in Practice - Introduction to Threading
The user is new to the idea of threads and needs to be introduced to it.
• Review single threaded archite
cture
• Introduce threads and how
they work
• Describe how we will use them in C+
+
going forward
...
• Review single threaded archite
cture
• Introduce threads and how
they work
• Describe how we will use them in C+
+
going forward
...
Curated Video
The Complete Practical Docker Guide - Docker Containers Architecture
This video explains the Docker containers architecture.
r/>
This clip is from the chapter "What is Docker and Docker Components" of the series "The Complete Practical Docker Guide".This section focuses on Docker and its...
r/>
This clip is from the chapter "What is Docker and Docker Components" of the series "The Complete Practical Docker Guide".This section focuses on Docker and its...
Curated Video
I WONDER - Why Were There No Windows In Longhouses?
This video is answering the question of why were there no windows in longhouses.
Curated Video
Learn Go in 3 Hours - Installing Your Go Environment
In order to work with Go, you need to have a development environment installed and validated.
• This video walks through installing Go and Visual Studio Code for Mac and Windows and validates the environ
ment.
• Walk...
• This video walks through installing Go and Visual Studio Code for Mac and Windows and validates the environ
ment.
• Walk...
Curated Video
Bug Bounty Program Certification 12.1: About Android App Backend Penetration
In this video, you will get a brief overview on the Android app backend penetration. • Explore the backend penetration techniques • Learn about the process of backend penetration • Have a look at the goals of backend penetration
Curated Video
Bug Bounty Program Certification 2.1: Download and Install VMware Workstation
In this video, learn about the installation process of VMware. • Explore About VMware • Download VMware • Installation of Vmware
Curated Video
The Full Stack Web Development - Installation & Templates - Project on Quick Todo
App Development with Meteor.js: Installation & Templates - Project on Quick Todo
r/>
This clip is from the chapter "App Development with Meteor.js" of the series "The Full Stack Web Development".For Meteor.js framework that...
r/>
This clip is from the chapter "App Development with Meteor.js" of the series "The Full Stack Web Development".For Meteor.js framework that...
Curated Video
Python 3: Project-based Python, Algorithms, Data Structures - Lists - an in-depth look 2
A quick look at using the command line/terminal window to navigate file directories
r/>
This clip is from the chapter "Python in-depth" of the series "Python 3: Project-based Python, Algorithms, Data Structures".This section is...
r/>
This clip is from the chapter "Python in-depth" of the series "Python 3: Project-based Python, Algorithms, Data Structures".This section is...
IDG TECHtalk
How to secure your domain name services
Follow these steps to protect your websites at the server and workstation.
IDG TECHtalk
How to harden your web browser against cloud-based threats
The web browser is now the portal that most employees use to access data and apps. These tips will help prevent attackers from exploiting it.