Curated Video
What is a PERT Chart? Project Management in Under 5
When it comes to project planning and estimation, there are a few 'go-to' tools that every project manager should know, and one of them is the PERT Method. So, what is a PERT Chart?
Curated Video
Just Sayin' - Simple Truths about Project Management
Just Sayin' - wit and wisdom that yields a few simple truths about project management. This short video aims to give you amusement and insight in equal measure. It contains a few simple truth about project management, expressed as pithy...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting with Veracrypt
After learning about encryption, we will look at encrypting a computer using Veracrypt software.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - BleachBit
In this lesson, we will look at a trendy yet controversial tool called BleachBit to clear files.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - CC Cleaner
This video illustrates the CC Cleaner software, how to use it, and the benefits of using it to protect the systems.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Using GMER - Rootkit Scanner
This video demonstrates the GMER rootkit scanner and how it helps eliminate the rootkit from infesting a system.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Rootkits
In this video, we will try to understand rootkits, one of the most dangerous forms of malware.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Darknets
In this video, we will look at some of the websites classified on the dark web that allows you to browse websites or post questions anonymously.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Tor Weaknesses
Here, the author elaborates on the disadvantages of using Tor to browse the Internet.
Curated Video
Practical Cyber Hacking Skills for Beginners - Introduction to Hashcat
This video introduces a tool that is an advanced password recovery tool and is available on various platforms.
Curated Video
Practical Cyber Hacking Skills for Beginners - The Hacking Methodology
Here, you will learn more about the different hacking methodologies that hackers employ to cause harm to a system or a network and also understand the possibilities of minimizing the attacks.
Curated Video
Practical Cyber Hacking Skills for Beginners - Social Engineering
This video discusses social engineering concepts, understanding the human psyche, and how hackers manipulate the human mind to hack.
Curated Video
Practical Cyber Hacking Skills for Beginners - The Bad Guys - Black Hats, Cyber Criminals and Disgruntled Employees
Here, you will learn more about hackers, how they operate, their intentions, and how they differ based on the hacking methodologies.
Curated Video
Practical Cyber Hacking Skills for Beginners - CWE and CVE
This lesson will examine the common weakness enumeration and the various CWE and CVE websites.
Curated Video
Risk Management for Cyber Security Managers - What Is Risk?
This video explains what constitutes a risk in terms of a business, a functioning system, or all kinds of assets.
Curated Video
Risk Management for Cyber Security Managers - What Is Vulnerability Management?
This lesson will discuss identifying, assessing, treating, and reporting security vulnerabilities.
Curated Video
Risk Management for Cyber Security Managers - Third-Party Cyber Risk Management
This video elaborates on the various options for transferring or outsourcing risk management to a third party or a vendor.
Learn German with Herr Antrim
Did You Know? These English Words Are Actually German
Did You Know? These English Words Are Actually German Have you ever wondered where some of your favorite English words came from? In this video, we explore the fascinating history of word borrowing between German and English. Discover...
FuseSchool
Defining Robotics
This video provides a foundational understanding of robotics, describing it as a branch of technology that deals with the design, construction, operation, and application of robots. The video explains the general components of...
Curated Video
The Software Testing Process: What is User Acceptance Testing - UAT?
This video is for non-technical Project Managers who want a general appreciation of the cycle of software testing, which culminates in User Acceptance Testing. I also look at alpha testing and beta testing. There are four main levels of...
Curated Video
Game Programmer
Brad is a Technical Architect for Daybreak Game Company. Dubbed as "the hero of kids everywhere", Brad's main job is writing video game systems. Once the game designers decide what they'd like to see in the game, Brad and his team then...
Curated Video
Robot Programmer
Tim is a Robot Programmer with Midwest Engineered Systems where he has worked on projects for jet engines, plasma cutters, and manufacturing plant robots. One of Tim's favorite aspects of the job is how he gets to work with people from...
Curated Video
Computer Chess Battles
In the earliest days of electronic calculation when computers occupied a whole room yet were only as powerful as a modern digital watch, designers dreamt of pitting them against the human mind. When computers ultimately mastered chess...
Curated Video
The Single Chip Cloud Computer (SCC)
Intel has created an experimental microprocessor called the Single Chip Cloud computer (SCC) with 48 cores. This chip behaves like a network cloud on a single piece of silicon, offering the potential to reduce processing times and save...