Zach Star
Computer Science Vs Software Engineering | How to Pick the Right Major
The differences in computer science and software engineering can sometimes come down to what university you go to. In terms of their definition computer science is more math and theory based, while software engineering is more applied....
Communication Coach Alex Lyon
Communication Professor Reacts to Steve Jobs iPhone 1 Speech
Communication Professor Reacts to Steve Jobs iPhone 1 Keynote Speech in 2007. What made this speech the standard for CEO speeches in the high-tech industry? What makes Jobs come across so confidently?
Curated Video
Risk Identification
Risk identification is the process of documenting any risks that could keep an organization or program from reaching its objective. It's the first step in the risk management process, which is designed to help companies understand and...
Curated Video
How to Detect Attacks
standard software and files that won't run or open. Without your knowledge, files have been removed or their contents have changed. Passwords have unexpectedly changed, you discover. Unknown software arrives or starts installing all of a...
Curated Video
All-in-one Metasploit Framework
This video will explain the powerful metasploit framework
Curated Video
Lab 1 Introduction to LTSpice -Task 0
Basics of Power Electronics - Walid Issa Lab 1 Introduction to LTSpice
Curated Video
Introduction to Metasploit
In this video, you will learn the building blocks and the basics of the powerful Metasploit framework, developed by Rapid7. Use Metasploit ethically !!!
Curated Video
Importance of Cyber Security
The video explains the importance of cyber security in a connected world
Packt
Hands-On Continuous Integration and Automation with Jenkins - What Is CI/CD?
This video explains what Continuous Integration, Continuous Delivery, and Continuous Deployment are, how they compare, and which benefits they bring • Learn Continuous Integration • Find out Continuous Delivery and Continuous Deployment...
Curated Video
Introduction to Cloud Computing - What is SAAS , PAAS, and IAAS
This video explains SAAS, PAAS, and IAAS. This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
Packt
Hands-On Continuous Integration and Automation with Jenkins - Install Jenkins with Docker
This video shows how to install Jenkins with Docker. • Describe what is Docker • Install Jenkins with Docker This clip is from the chapter "Install Jenkins" of the series "Hands-On Continuous Integration and Automation with Jenkins".In...
Packt
Hands-On Continuous Integration and Automation with Jenkins - Install Jenkins on macOS
This video shows how to install Jenkins on macOS. • Describe options to install Jenkins on macOS • Install Jenkins using brew This clip is from the chapter "Install Jenkins" of the series "Hands-On Continuous Integration and Automation...
Curated Video
Structural Design Patterns in Modern C++ - Course Overview
This video introduces you to the course. This clip is from the chapter "Introduction" of the series "Structural Design Patterns in Modern C++".This section introduces you to design patterns and Unified Modeling Language (UML) class...
Curated Video
Linux Fundamentals - Introduction
This video provides an introduction to Linux. This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux on macOS...
Curated Video
Linux Fundamentals - Possible Options to Use Linux on macOS and Windows
This video explains the possible options to use Linux on macOS and Windows. This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by...
Curated Video
How to Analyze a Cyber Attack
Traditional information security attack analysis focuses on malware and computer intrusions, in which an attacker utilizes technical prowess to exploit a vulnerability to gain access to or harm a system (or network).
Curated Video
Introduction to IT and Cybersecurity: Software Licensing
Part 9/16 of Introduction to IT and Cybersecurity series: This video discusses software licensing and the different schemes applied in on-premise and on-cloud environments. It also outlines the types of licenses available, including...
Curated Video
How to Protect Your Data
This video introduces different techniques on how to protect your data
Curated Video
Introduction to IT and Cybersecurity: Application Development Techniques
Part 8/16 of Introduction to IT and Cybersecurity series : This video discusses application development techniques for end users and programmers. It explains the concept of end user development, which is where people who are not...
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - Cloud HSM Overview
This video provides an overview of AWS CloudHSM. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about Amazon Web Services (AWS)...
Curated Video
Start-ups feature robots to help in the home ++REPLAY++
GERMANY IFA SHOWSTOPPERSSOURCE: AP TECHNOLOGY RESTRICTIONS: TECHNOLOGY CLIENTS ONLYLENGTH: 6:19SHOTLIST:AP TelevisionBerlin, Germany - 1 September 20161. Various exteriors of IFA consumer electronics fair in Berlin2. Various of...
Curated Video
Configuration management control
In this video, we will be discussing the importance of configuration management control in software development. Configuration management control is the process of identifying, organizing, and controlling changes to software and hardware...
Curated Video
Secure coding control
In this video, we will be discussing the importance of secure coding control. With the increasing number of cyber attacks and data breaches, it is crucial for developers to implement secure coding practices to protect sensitive...
Curated Video
Robots compete in 'mission to Mars'
LEAD IN:It's not been long since European countries were competing on the Eurovision Song Contest stage. Well now they're competing on Mars ... sort of.At Innorobo, one of Europe's leading robotics events, teams from across the continent...