Instructional Video12:25
Curated Video

Ansible for the Absolute Beginner - Demo Project

Higher Ed
This video presents a demonstration of the project. This clip is from the chapter "Advanced Topics" of the series "Ansible for the Absolute Beginner - Hands-On – DevOps".This section covers some advanced topics.
Instructional Video7:25
Packt

CompTIA A+ Certification 220-1001: The Total Course - Dealing with Threats

Higher Ed
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This episode covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Instructional Video10:12
Packt

CompTIA Network+ Certification N10-007: The Total Course - Firewalls

Higher Ed
This video explains how to use firewall to protect the network. This clip is from the chapter "Protecting Your Network" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn how to...
Instructional Video3:45
Curated Video

AZ-204 Developing for Microsoft Azure Exam Prep - Updating the Structured Query Language (SQL) Database Firewall

Higher Ed
This video demonstrates how to update the SQL database firewall. This clip is from the chapter "AZ-204 Structured Query Language (SQL) Database" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section introduces you...
Instructional Video6:34
Curated Video

AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - Amazon Web Services (AWS) Security Groups Overview

Higher Ed
This video provides an overview of security groups in AWS and explains how they are different from the traditional concept. This clip is from the chapter "Solutions Architect Chapter 3 - Virtual Private Cloud (VPC)" of the series "AWS...
Instructional Video1:20
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 7 Ask Me Anything (AMA)

Higher Ed
Some wireless networking attacks involve deception. In this episode, Mike describes how there are variations of Evil Twin attacks including through DNS. This clip is from the chapter "Securing Wireless LANs" of the series "CompTIA...
Instructional Video3:59
Curated Video

AZ-204 Developing for Microsoft Azure Exam Prep - Testing a Structured Query Language (SQL) Database

Higher Ed
This video explains how to test an SQL database. This clip is from the chapter "AZ-204 Structured Query Language (SQL) Database" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section introduces you to AZ-204 SQL...
Instructional Video6:16
Curated Video

CompTIA A+ Certification 220-1001: The Total Course - Firewalls and Servers

Higher Ed
In this episode, Mike begins the discussion of Application-layer protocols. Starting with a review of the interaction between IP packets and servers, the episode analyzes the functions of local and server-based firewalls. This clip is...
Instructional Video2:01
Curated Video

Learning Splunk - Hands-On Lab: Tables – Displaying Search Results

Higher Ed
Understanding the use of tables in a hands-on activity. • Explore your firewall and authentication logs, and identify useful fields • Create tables using your data • Save these searches as reports to be used later This clip is from the...
Instructional Video4:19
Curated Video

Python for Everybody: The Ultimate Python 3 Bootcamp - Installing 3rd Party Packages

Higher Ed
Python has one of the largest 3rd party ecosystems in the world. If you need something special, chances are someone has made an open source package already. Might as well use their code! This clip is from the chapter "Advanced Python" of...
Instructional Video4:35
Curated Video

Learning Splunk - Normalizing Data Using the Splunk Common Information Model (CIM)

Higher Ed
Understanding the common information model (CIM). This is one of the most effective mechanisms for getting the most out of Splunk and working with all different types of data in a consistent way. • Understand why data normalization is...
Instructional Video2:20
Curated Video

Learning Splunk - How is Data Stored – Index

Higher Ed
Exploring indexes or how data is stored in Splunk. • Understand what an index is • Understand why different indexes are used • Understand how indexes are stored in Splunk This clip is from the chapter "Splunk Terminology" of the series...
Instructional Video6:49
Curated Video

The Art of Doing - Python Network Applications with Sockets - Adjusting Host Firewall for LAN Communication

Higher Ed
In this video, you will learn how to adjust host firewall for LAN communication. This clip is from the chapter "Connecting to the Outside World" of the series "The Art of Doing - Python Network Applications with Sockets".In this section,...
Instructional Video8:25
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Hypervisors and Virtual Machines

Higher Ed
Hypervisors are servers configured to host virtual machine guests. This episode will discuss Type 1 and Type 2 hypervisors as well as hardening. This clip is from the chapter "Securing Public Servers" of the series "CompTIA Security+...
Instructional Video7:40
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Threat Analysis and Mitigating Actions

Higher Ed
Stepping through how attackers manage to compromise a system or exfiltrate data helps harden environments to prevent future incidents. This episode covers the Cyber Kill Chain, the Mitre ATT&CK Framework, the Diamond Model of Intrusion...
Instructional Video5:58
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Social Engineering

Higher Ed
Tricking people into doing something or divulging sensitive information – this is social engineering. This episode discusses a pretext, or believable story, that often goes along with this type of activity. This clip is from the chapter...
Instructional Video9:46
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Data Backup

Higher Ed
Backing data up provides availability in the event of data deletion, corruption, or encryption through ransomware. This episode discusses backup settings such as compression and encryption, as well as full, differential, and incremental...
Instructional Video1:35
Financial Times

China's internet crackdown

Higher Ed
Beijing is plugging the last holes in its 'Great Firewall' internet censorship apparatus, hampering global groups’ ability to operate in the country.
Instructional Video9:53
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Physical Security

Higher Ed
This episode covers physical security controls such as door lock types and bollards, as well as encryption of data at rest. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video10:17
Curated Video

CISSP®- Key Goal Indicators (KGIs), Key Performance Indicators (KPIs), and Key Risk Indicators (KRIs)

Higher Ed
This video explains the concept of KGIs, KPIs, and KRIs. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
Stock Footage0:16
Getty Images

businessman hand working on tablet with digital business strategy

Pre-K - Higher Ed
businessman hand working on tablet with digital business strategy
Stock Footage0:11
Getty Images

businessman hand working on tablet with digital business strategy

Pre-K - Higher Ed
businessman hand working on tablet with digital business strategy
Stock Footage0:12
Getty Images

Zoom in UTP cables, blinking LED lights and RJ 45 on working Ethernet switches

Pre-K - Higher Ed
Zoom in UTP cables, blinking LED lights and RJ 45 on working Ethernet switches
Stock Footage0:29
Getty Images

Danger online

Pre-K - Higher Ed
Danger online