IDG TECHtalk
How an attacker can target phishing attacks
There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you can...
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- Create a Billing Alarm
In this video, we'll learn how to create a billing alarm. This clip is from the chapter "Introduction to AWS Certified Cloud Practitioner CLF-C01 and Cloud Computing" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for...
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- Set Up an AWS Free Tier Account
In this video, we'll learn how to set up an AWS Free Tier Account. This clip is from the chapter "Introduction to AWS Certified Cloud Practitioner CLF-C01 and Cloud Computing" of the series "AWS Certified Cloud Practitioner (CLF-C01)...
Curated Video
Comprehensive Android Developer Bootcamp - Setting Up Journal - Part 3
Build a Journal App with Firestore:Setting Up Journal - Part 3 This clip is from the chapter "Build a Journal App with Firestore" of the series "The Comprehensive Android Developer Bootcamp".In this section you will see how to build your...
Curated Video
Comprehensive Android Developer Bootcamp - What we will Build - Build a Journal App with Firestore
Build a Journal App with Firestore:What We'll Build This clip is from the chapter "Build a Journal App with Firestore" of the series "The Comprehensive Android Developer Bootcamp".In this section you will see how to build your own...
Curated Video
Complete Java SE 8 Developer Bootcamp - Pass By Value: Primitives
This video details how primitive arguments are handled in Java. This clip is from the chapter "Strings" of the series "Complete Java SE 8 Developer Bootcamp".In this section, you learn to handle strings and pass by value features of Java.
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - What is a Git Hosting Service?
This video explains the concept of a Git hosting service. This clip is from the chapter "GitHub and Remote Repositories" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains Git hosting service....
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Creating a Pull Request from a Forked Repository
This video explains the process for creating a pull request from a forked repository. This clip is from the chapter "Forks and Contribution to the Public Repositories" of the series "Complete Git Guide: Understand and Master Git and...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Synchronizing Changes from Upstream
This video explains the process of synchronizing changes from upstream. This clip is from the chapter "Forks and Contribution to the Public Repositories" of the series "Complete Git Guide: Understand and Master Git and GitHub".This...
Curated Video
AZ-204 Developing for Microsoft Azure Exam Prep - Introduction to Azure Active Directory (AD)
This video provides an introduction to Azure AD. This clip is from the chapter "AZ-204 Azure Authentication" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section focuses on AZ-204 Azure authentication.
Brian McLogan
How to find the final value using the compound interest formula
Learn about compound interest. We will look at how to determine the final value, initial value, interest rate and years needed. We will investigate problems compounded continuously, daily, weekly, monthly, quarterly and yearly. These...
Curated Video
Learning PHP 7 (Video 41)
PHP is back and is faster and more lightweight than ever. The world of web technology is seamlessly evolving, and PHP 7's simplicity and prowess addresses the requirements of current and future web and mobile application development....
Next Animation Studio
Vulnerabilities found in TikTok: Report
Cybersecurity firm Check Point has conducted an investigation into video-sharing app TikTok and found major vulnerabilities within the app.
friEdTech
Smarter Gmail Series: Lesson 2, Chat and Google Voice
Published on Apr 22, 2013 Learn to use your Gmail SMARTER not HARDER in this humble little series. This is episode one where you learn the extremely basic basics of "Inbox Zero" (the theory that makes everything in Gmail make sense) and...
friEdTech
Google Chrome Tips and Tricks
Want to learn how to customize your Chrome experience and add apps? This is the video to get you started!
friEdTech
First Look at Google Slides Q&A
A first look at the new Google Slides Q&A feature and the laser pointer.
IDG TECHtalk
Tips for finding signs of SolarWinds-type attacks in Active Directory
The SolarWinds attackers used sophisticated techniques to steal admin credentials. Here’s what to look for in AD.
IDG TECHtalk
Guide to key Windows 10 event logs you need to monitor
These are the event logs that will help you identify malicious activity on your network.
Curated Video
Optical Character Recognition (OCR)
In this video, we will cover Optical Character Recognition (OCR). This clip is from the chapter "Describe Features of Computer Vision Workloads on Azure (15-20%)" of the series "AI-900: Microsoft Azure AI Fundamentals Video Course +...
Curated Video
Azure Sandbox - How to Use Azure Portal Absolutely Free
In this video, we will cover Azure Sandbox - how to use Azure Portal absolutely free. This clip is from the chapter "Azure Portal Introduction: For Beginners" of the series "AI-900: Microsoft Azure AI Fundamentals Video Course + Ques".In...
Curated Video
Comprehensive Android Developer Bootcamp - Showing Ads Using Google AdMob
Monetizing Your Android Apps:Showing Ads Using Google AdMob This clip is from the chapter "Monetizing Your Android Apps" of the series "The Comprehensive Android Developer Bootcamp".In this section you will see how to make money from...
IDG TECHtalk
How to use the groups command: 2-Minute Linux Tips
Learn how to use the groups command. It provides a list of the groups that a user is a member of by pulling information from the /etc/group and /etc/passwd files.
IDG TECHtalk
Eliminate compromised and weak passwords
A single compromised password allowed attackers access to Colonial Pipeline’s network. Chaos ensued. This advice will help you avoid that fate.
Curated Video
AZ-204 Developing for Microsoft Azure Exam Prep - Access Keys and Shared Access Signatures
This video focuses on access keys and shared access signatures. This clip is from the chapter "AZ-204 Azure Storage Accounts" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section presents the latest updates on 5G...