Curated Video
What If Our Clothes Could Disrupt Surveillance Cameras?
What do you get when you combine mass surveillance with A.I.? It’s a dystopia that’s already a reality in places across the world. Fashion designers are pushing back, crafting clothing and accessories that trick facial recognition...
Curated Video
Lying and Politics
Historian Martin Jay, UC Berkeley, talks about the situations in which lying takes place in politics and might be justified and even expected in adversarial, diplomatic and other situations.
Curated Video
The CISO Masterclass - STAR Methodology - Continued
This video builds upon the previous one, providing additional tips and examples for utilizing the STAR methodology during CISO interviews.
Curated Video
The CISO Masterclass - Retrospect Your Career
This video encourages you to reflect on your career and explore how this course can empower you to take it to the next level.
Curated Video
ASP.NET Core MVC - Cross-Platform Development - Adding an About Us Page
This video explains how to go about adding the about us page. This clip is from the chapter "Manipulating Website Views and Layout" of the series "ASP.NET Core MVC - Cross-Platform Development".This section explains manipulating website...
Curated Video
SwiftUI iOS 16 Crash Course - Emoji Quote App in SwiftUI - ShareImageView - Part 3 - Adding Sliders
In this video, you will learn to apply some modifiers. We will create buttons with action and label with options to save the image to a photo album. We will also create an option for a new renderer to render the image. This clip is from...
Curated Video
Fundamentals of Secure Software - HIPAA (Health Insurance Portability and Accountability Act)
This video explains the HIPAA (Health Insurance Portability and Accountability Act) and its purpose.
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - IOS
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Mobile Security" of the series "The Absolute Beginners Guide to...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Twitter Account
In this video, you will discover effective strategies to enhance the security of your Twitter account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your LinkedIn Account
In this video, you will discover effective strategies to enhance the security of your LinkedIn account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Facebook Account
In this video, you will discover effective strategies to enhance the security of your Facebook account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Browser Security - Brave Browser
In this video, you will dive into the realm of browser security, focusing on the specific features and tools available for enhancing security while using the Brave Browser. This clip is from the chapter "Internet and Browsing Security"...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Internet Privacy Tools
In this video, the author talks about a few tools that you might want to start using if you are going to take your privacy seriously online; one such tool that you will learn is the Brave browser. This clip is from the chapter "Internet...
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Data Security Policies
It would be remiss to discuss database design without addressing policies. We discussed security in general earlier and now will explain why policies are important.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Windows Settings
Windows Settings has several options to change, update, and customize the OS. You can find settings for systems, devices, networks and internet, accounts, gaming, and more. This clip is from the chapter "Working with Operating Systems"...
Curated Video
The Digital Divide: Navigating Modern Technologies
Explore the impact of digital tools like smartphones, credit cards, and the internet through a challenge between Pierre, who uses traditional methods, and Christian, who uses digital solutions, to complete everyday tasks in Paris. This...
Curated Video
The Pervasiveness of Video Surveillance: Insights from Nice, the "Camera City"
Explore how the city of Nice has earned the nickname "Camera City" through its extensive network of surveillance cameras aimed at improving public safety. This report delves into the high-tech control center where the footage from 937...
Curated Video
ASP.NET 6.0 - Build Hands-On Web Projects - Controllers Folder
This video discusses the Controller folder and its content (HomeController) when the project was created with the default Model-View-Controller project template. This clip is from the chapter "Coding Project Part 2: Consume the Web API...
Curated Video
CISSP Crash Course - Compliance, Legal, and Regulations
This video explains compliance, legal, and regulations in domain 1. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Seven Dimensions
Give Bad News Effectively
Learn why it is important to deliver bad news effectively; Give bad news privately and personally; Be clear, succinct and honest; Be caring, supportive and willing to answer questions:
Curated Video
What is Remarketing? (or Retargeting)
Have you ever been wandering about the internet and been surprised to find adverts for products you recently looked at? If you have, welcome to remarketing. Maybe you looked at an online product and then, later that day, saw a discount...
Curated Video
The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Virtual Private Networks and Why You Need One
This video talks about one of the most important security tools that you can have installed on your mobile device, which is known as VPN or Virtual Private Network. This is one of the best security tools because it can provide you with...
Curated Video
The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Checking Default App Permissions - IOS
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Understanding Applications" of the series "The Absolute Beginners...
Packt
Checking Default App Permissions - IOS
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Understanding Applications" of the series "The Absolute Beginners...