Instructional Video2:29
Curated Video

routing protocols : How does a router route when told conflicting information?

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: How does a router route when told...
Instructional Video21:55
IDG TECHtalk

How robotics (and AI) are changing how we work and live | TECH(talk)

Higher Ed
Robotics and AI play increasingly important roles in a variety of industries and no, they're not here to take over mankind. Keith Shaw, editor-in-chief of Robotics Business Review, joins Ken Mingis and Juliet Beauchamp to discuss the...
Instructional Video3:13
IDG TECHtalk

Coronavirus, working from home and your home Wi-Fi network

Higher Ed
Due to concerns around the coronavirus and COVID-19, you might be working from home. We are, too! On today’s first remote episode of Today in Tech, Juliet discusses if your home Wi-Fi network will be able to handle a huge spike in...
Instructional Video5:22
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Other Layer 2 Attacks

Higher Ed
Layer 2 of the OSI model (Data Link layer) accessing network media and addressing using MAC addresses. MAC address flooding attacks and broadcast storms can be mitigated with network switches configuring with BPDU and STP. This clip is...
Instructional Video14:51
IDG TECHtalk

Boeing's insecure networks threaten security and safety

Higher Ed
Aircraft manufacturer Boeing's insecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M. Porup reveals...
Instructional Video3:21
Curated Video

AZ-204 Developing for Microsoft Azure Exam Prep - Scaling a Single Virtual Machine

Higher Ed
This video shows how to scale a single virtual machine. This clip is from the chapter "AZ-204 Scaling Applications and Services" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section explains how to scale AZ-204...
Instructional Video4:47
Curated Video

AZ-104: Microsoft Azure Administrator Full Course - Azure Traffic Manager Profiles

Higher Ed
In this video, we will cover Azure traffic manager profiles. This clip is from the chapter "Network Traffic Management" of the series "AZ-104: Microsoft Azure Administrator Full Course".Learn network traffic management and load balancer...
Instructional Video14:02
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Virtualization

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Virtualization. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
Instructional Video5:47
IDG TECHtalk

Best practices for secure work-from-home VPN connections

Higher Ed
As more employees work from home, it’s important to review your VPN settings and following the best guidance.
Instructional Video2:08
Curated Video

AZ-104: Microsoft Azure Administrator Full Course - Traffic Manager: Performance Routing

Higher Ed
In this video, we will cover traffic manager: performance routing. This clip is from the chapter "Network Traffic Management" of the series "AZ-104: Microsoft Azure Administrator Full Course".Learn network traffic management and load...
Instructional Video16:43
Institute for New Economic Thinking

Frank Kelly - Networks and Systemic Risk

Higher Ed
The Inaugural Conference @ King's, Institute for New Economic Thinking, Day 2 - Lunch: Networks and Systemic Risk
Instructional Video3:00
Curated Video

How Traffic Lights Work

Pre-K - Higher Ed
Traffic lights are essential for directing the flow of vehicular and pedestrian traffic. They typically have three colored lights - green for go, red for stop, and yellow for slow down. Traffic lights can be controlled through fixed rate...
Instructional Video11:22
Curated Video

CISSP®- IAAA - Part 1- Identification, Authentication, Authorization, and Accountability

Higher Ed
This is the first part of a two-part video that explains the concept of IAAA. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Instructional Video19:53
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- Amazon Route53 and DNS

Higher Ed
In this video, we'll learn about Amazon Route53 and DNS. This clip is from the chapter "Amazon Route53" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is about Amazon Route53 and DNS.
Instructional Video14:31
Curated Video

CISSP®- Information Security Governance: Policies, Procedures, Guidelines, and Frameworks

Higher Ed
This video focuses on policies, procedures, guidelines, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Instructional Video9:00
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - IP Security (IPsec)

Higher Ed
The IPsec network security protocol suite can be used to secure any type of network traffic through integrity, authentication and encryption. Many VPNs use IPsec to establish an encrypted network tunnel. This clip is from the chapter...
Instructional Video2:53
Curated Video

High scoring Vocabulary Describing Road Conditions

9th - Higher Ed
Today you’ll learn high-scoring vocabulary describing road conditions, useful for both Speaking and Writing. Questions about road conditions could definitely be seen on your next IELTS Exam- anywhere in the Speaking Exam, in Writing Task...
Instructional Video1:18
Curated Video

SSL Complete Guide 2021: HTTP to HTTPS - Section Introduction - Introduction to HTTPS and TLS

Higher Ed
In this video, we'll first take a quick look at what we'll cover in this section. This clip is from the chapter "Introduction to HTTPS and TLS" of the series "SSL Complete Guide 2021: HTTP to HTTPS".This section will give you an overview...
Instructional Video1:30
The March of Time

1952: ROUTE CONTROL CENTER: Correspondent David Brinkley in radar room at Washington National Airport w/ CAA radar expert James Richey, SOT explaining what happened Saturday night, UFO sighting, light no aircraft, TD MS Radar screen.

12th - Higher Ed
MOT 1952: ROUTE CONTROL CENTER: Correspondent David Brinkley in radar room at Washington National Airport w/ CAA radar expert James Richey, SOT explaining what happened Saturday night, UFO sighting, light no aircraft, TD MS Radar screen.
Instructional Video6:19
IDG TECHtalk

How to securely set up split-tunnel VPNs

Higher Ed
Some organizations are setting up split-tunnel virtual private networks to allow remote workers to connect to a Windows network. Follow these steps to minimize security risks.
Instructional Video1:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 7 Exam Question Review

Higher Ed
Malicious users will often mimic legitimate services in an attempt to trick unsuspecting victims into connecting to the service. This episode presents a scenario where the viewer must determine what type of attack has taken place. This...
Instructional Video3:28
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 6 Exam Question Review

Higher Ed
Address Resolution Protocol (ARP) is used by the TCP/IP protocol suite. This episode discussed ARP poisoning attacks and potential mitigations. This clip is from the chapter "The Basic LAN" of the series "CompTIA Security+ Certification...
Instructional Video10:11
Packt

How can Java Classes Take Advantage of Interfaces?

Higher Ed
This video explains how Java classes can take advantage of interfaces. This clip is from the chapter "Java Object Oriented Programming System (OOPS) Basic for Selenium Part - 1" of the series "Selenium WebDriver with Java - Basics to...
Instructional Video8:17
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Using tcpdump to Analyze Network Traffic

Higher Ed
tcpdump is a built-in Unix and Linux command-line tool that can capture, analyze, filter, and save captured network packets. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+ Certification SY0-601: The...