Instructional Video13:43
Zach Star

Computer Science Vs Software Engineering | How to Pick the Right Major

12th - Higher Ed
The differences in computer science and software engineering can sometimes come down to what university you go to. In terms of their definition computer science is more math and theory based, while software engineering is more applied....
Instructional Video17:30
Communication Coach Alex Lyon

Communication Professor Reacts to Steve Jobs iPhone 1 Speech

Higher Ed
Communication Professor Reacts to Steve Jobs iPhone 1 Keynote Speech in 2007. What made this speech the standard for CEO speeches in the high-tech industry? What makes Jobs come across so confidently?
Instructional Video3:36
Curated Video

Risk Identification

Higher Ed
Risk identification is the process of documenting any risks that could keep an organization or program from reaching its objective. It's the first step in the risk management process, which is designed to help companies understand and...
Instructional Video2:46
Curated Video

How to Detect Attacks

Higher Ed
standard software and files that won't run or open. Without your knowledge, files have been removed or their contents have changed. Passwords have unexpectedly changed, you discover. Unknown software arrives or starts installing all of a...
Instructional Video9:37
Curated Video

All-in-one Metasploit Framework

Higher Ed
This video will explain the powerful metasploit framework
Instructional Video3:02
Curated Video

Lab 1 Introduction to LTSpice -Task 0

Higher Ed
Basics of Power Electronics - Walid Issa Lab 1 Introduction to LTSpice
Instructional Video9:37
Curated Video

Introduction to Metasploit

Higher Ed
In this video, you will learn the building blocks and the basics of the powerful Metasploit framework, developed by Rapid7. Use Metasploit ethically !!!
Instructional Video7:01
Curated Video

Importance of Cyber Security

Higher Ed
The video explains the importance of cyber security in a connected world
Instructional Video6:45
Packt

Hands-On Continuous Integration and Automation with Jenkins - What Is CI/CD?

Higher Ed
This video explains what Continuous Integration, Continuous Delivery, and Continuous Deployment are, how they compare, and which benefits they bring • Learn Continuous Integration • Find out Continuous Delivery and Continuous Deployment...
Instructional Video4:55
Curated Video

Introduction to Cloud Computing - What is SAAS , PAAS, and IAAS

Higher Ed
This video explains SAAS, PAAS, and IAAS. This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
Instructional Video6:06
Packt

Hands-On Continuous Integration and Automation with Jenkins - Install Jenkins with Docker

Higher Ed
This video shows how to install Jenkins with Docker. • Describe what is Docker • Install Jenkins with Docker This clip is from the chapter "Install Jenkins" of the series "Hands-On Continuous Integration and Automation with Jenkins".In...
Instructional Video4:13
Packt

Hands-On Continuous Integration and Automation with Jenkins - Install Jenkins on macOS

Higher Ed
This video shows how to install Jenkins on macOS. • Describe options to install Jenkins on macOS • Install Jenkins using brew This clip is from the chapter "Install Jenkins" of the series "Hands-On Continuous Integration and Automation...
Instructional Video3:03
Curated Video

Structural Design Patterns in Modern C++ - Course Overview

Higher Ed
This video introduces you to the course. This clip is from the chapter "Introduction" of the series "Structural Design Patterns in Modern C++".This section introduces you to design patterns and Unified Modeling Language (UML) class...
Instructional Video3:36
Curated Video

Linux Fundamentals - Introduction

Higher Ed
This video provides an introduction to Linux. This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux on macOS...
Instructional Video1:40
Curated Video

Linux Fundamentals - Possible Options to Use Linux on macOS and Windows

Higher Ed
This video explains the possible options to use Linux on macOS and Windows. This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by...
Instructional Video8:09
Curated Video

How to Analyze a Cyber Attack

Higher Ed
Traditional information security attack analysis focuses on malware and computer intrusions, in which an attacker utilizes technical prowess to exploit a vulnerability to gain access to or harm a system (or network).
Instructional Video6:50
Curated Video

Introduction to IT and Cybersecurity: Software Licensing

Higher Ed
Part 9/16 of Introduction to IT and Cybersecurity series: This video discusses software licensing and the different schemes applied in on-premise and on-cloud environments. It also outlines the types of licenses available, including...
Instructional Video2:03
Curated Video

How to Protect Your Data

Higher Ed
This video introduces different techniques on how to protect your data
Instructional Video14:04
Curated Video

Introduction to IT and Cybersecurity: Application Development Techniques

Higher Ed
Part 8/16 of Introduction to IT and Cybersecurity series : This video discusses application development techniques for end users and programmers. It explains the concept of end user development, which is where people who are not...
Instructional Video2:25
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - Cloud HSM Overview

Higher Ed
This video provides an overview of AWS CloudHSM. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about Amazon Web Services (AWS)...
Instructional Video0:07
Curated Video

Start-ups feature robots to help in the home ++REPLAY++

Higher Ed
GERMANY IFA SHOWSTOPPERSSOURCE: AP TECHNOLOGY RESTRICTIONS: TECHNOLOGY CLIENTS ONLYLENGTH: 6:19SHOTLIST:AP TelevisionBerlin, Germany - 1 September 20161. Various exteriors of IFA consumer electronics fair in Berlin2. Various of...
Instructional Video2:22
Curated Video

Configuration management control

Higher Ed
In this video, we will be discussing the importance of configuration management control in software development. Configuration management control is the process of identifying, organizing, and controlling changes to software and hardware...
Instructional Video1:17
Curated Video

Secure coding control

Higher Ed
In this video, we will be discussing the importance of secure coding control. With the increasing number of cyber attacks and data breaches, it is crucial for developers to implement secure coding practices to protect sensitive...
Instructional Video7:03
Curated Video

Robots compete in 'mission to Mars'

Higher Ed
LEAD IN:It's not been long since European countries were competing on the Eurovision Song Contest stage. Well now they're competing on Mars ... sort of.At Innorobo, one of Europe's leading robotics events, teams from across the continent...