Instructional Video4:12
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part III

Higher Ed
In Part III of this module, you will continue to see several ways in which hackers and scammers are social engineering us, via emails and webpages. Even more major red flags are exposed so that these now become ingrained in our brains....
Instructional Video3:19
friEdTech

Three Minute Tech Tip: Filters plus Labels Gmail

Higher Ed
Learn how to have Gmail automatically file email when it comes into your inbox so that you can just read it and archive it without applying labels.
Instructional Video3:49
IDG TECHtalk

How to defend Office 365 from spear-phishing attacks

Higher Ed
Configure Office 365 to detect email-delivered malware.
Instructional Video4:10
Curated Video

Learn Git in 3 Hours- Installing and Configuring Git

Higher Ed
Learn how to install Git on your machine, be it OS X or Windows. • Download the installer for your operating system • Run the installer • Configure Git on your machine This clip is from the chapter "Version Control and the Terminal" of...
Instructional Video10:11
Packt

User Edit Screen and Getting User Details

Higher Ed
This video focuses on the user edit screen and explains how to get the user details. This clip is from the chapter "Admin Screens-Part 1" of the series "MERN E-commerce from Scratch".This is the first part of a two-part section that...
Instructional Video3:47
Curated Video

.NET Core Microservices - Configuring Clients in Identity Server

Higher Ed
This video explains configuring clients in identity server. This clip is from the chapter "Identity Server" of the series ".NET Core Microservices - The Complete Guide (.NET 6 MVC)".In this section, you will learn about identity server.
Instructional Video19:08
IDG TECHtalk

Can the iPad Pro replace the MacBook as an enterprise device?

Higher Ed
On this episode of Today in Tech, Computerworld executive editor Ken Mingis and Macworld writer Michael Simon join Juliet to debate whether or not the iPad Pro is a practical enterprise device. Can the iPad Pro ever replace a traditional...
Instructional Video6:55
Easy Languages

Easy Croatian 14 - How do you feel about digital media?

12th - Higher Ed
Easy Croatian 14 - How do you feel about digital media? Easy Languages is an international video project aiming at supporting people worldwide to learn languages through authentic street interviews and expose the street culture of...
Instructional Video7:01
IDG TECHtalk

What security and IT admins need to know about Microsoft Threat Protection

Higher Ed
Microsoft Threat Protection can help admins monitor and secure much of a Windows network, but licensing requirements are confusing.
Instructional Video8:47
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- Create a Billing Alarm

Higher Ed
In this video, we'll learn how to create a billing alarm. This clip is from the chapter "Introduction to AWS Certified Cloud Practitioner CLF-C01 and Cloud Computing" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for...
Instructional Video25:08
Curated Video

Bash Shell Scripting- Monitor File system usage and send mail alerts

Higher Ed
This video shows how to Monitor File system usage and send mail alerts. This clip is from the chapter "Real-Time Practice (Low level to High level)" of the series "Complete Bash Shell Scripting".This section covers various Bash shell...
Instructional Video11:38
Packt

User Register Reducer, Action, and Screen

Higher Ed
This video focuses on user register reducer, action, and screen. This clip is from the chapter "Front-end User Authentication and Profile" of the series "MERN E-commerce from Scratch".This section focuses on front-end user authentication...
Instructional Video16:51
Packt

Profile Screen and Getting User Details

Higher Ed
This video focuses on the profile screen and explains how to acquire user details. This clip is from the chapter "Front-end User Authentication and Profile" of the series "MERN E-commerce from Scratch".This section focuses on front-end...
Instructional Video7:22
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - Matching an Author's Email against a Regular Expression

Higher Ed
This video demonstrates how to match an author's email against a regular expression. This clip is from the chapter "GitHub Hooks" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains GitHub hooks...
Instructional Video7:52
Curated Video

Java Programming for Complete Beginners - Java 16 - Step 07 - Understanding Inheritance - Why Do We Need It?

Higher Ed
In this session, we will understand inheritance - why we need it. This clip is from the chapter "Object-Oriented Programming Again" of the series "Java Programming for Complete Beginners - Java 16".In this section, we will revert to OOP...
Instructional Video5:50
Curated Video

Frontend Web Development Bootcamp - Build a Twitter Clone - Forms - Part 1

Higher Ed
HTML Crash Course: Forms - Part 1 This clip is from the chapter "HTML Crash Course" of the series "Frontend Web Development Bootcamp: Build a Twitter Clone".This section explains about HTML, Headings, Paragraphs, Lists, Links and so on.
Instructional Video5:25
Curated Video

DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK, JIRA - Jenkins Plugin Basic

Higher Ed
In this video, you will be able to install the plugins and do basic configuration. This clip is from the chapter "Continuous Integration and Continuous Deploy" of the series "DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK,...
Instructional Video0:12
The March of Time

Rockefeller Center mail

12th - Higher Ed
MOT 1937: ROCKEFELLER CENTER MAIL: (POV behind) Mail clerk man delivering mail to Rockefeller Foundation executive offices African-American receptionist. CU Letters envelopes being sorted addressed to John D. Rockefeller. New York City NYC
Instructional Video3:23
Science360

Ultimate sacrifice - Spider's post-sex cannibalism aids offspring

12th - Higher Ed
In this spooktacular episode, Jordan and Charlie explore the male dark fishing spider’s ultimate sacrifice. This death wish probably evolved to benefit his offspring, which grow nearly 20 percent larger, and survive about 50 percent...
Instructional Video9:20
Packt

Updating User Profile

Higher Ed
This video shows how to update the user profile. This clip is from the chapter "Front-end User Authentication and Profile" of the series "MERN E-commerce from Scratch".This section focuses on front-end user authentication and profile.
Instructional Video13:51
Packt

CompTIA Network+ Certification N10-007: The Total Course - Certificates and Trust

Higher Ed
This video explains the various certificates and how they are used to establish trust. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA Network+ Certification...
Instructional Video18:56
Packt

CompTIA Network+ Certification N10-007: The Total Course - Applying Domain Name System (DNS)

Higher Ed
This video explains how to work with DNS and discusses the various record types that are available, what their purpose is, and how they can be used. This clip is from the chapter "Network Naming" of the series "CompTIA Network+...
Instructional Video3:32
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - Creating a GitHub Account

Higher Ed
This video demonstrates the process of creating a GitHub account. This clip is from the chapter "GitHub and Remote Repositories" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains Git hosting...
Instructional Video4:33
Curated Video

World of Computer Networking Your CCNA start - Applications and Protocols

Higher Ed
This video introduces you to the basic protocols for applications. This clip is from the chapter "Transmission Control Protocol/Internet Protocol (TCP/IP) and Open Systems Interconnection (OSI) Models" of the series "World of Computer...