Instructional Video3:24
Curated Video

Describe cyber attacks that could affect a computer system or network : Overview of Network Security

Higher Ed
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Instructional Video2:35
Packt

Explain the negative impacts of artificial intelligence systems on society : DeepFool Attack Practical Configuration

Higher Ed
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Instructional Video5:55
Curated Video

Describe the different types of malware that could affect a computer system or network : Downloaders

Higher Ed
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Instructional Video2:48
Curated Video

Evaluate the accuracy of an artificial intelligence system : Evaluate Accuracy of the DNN Model

Higher Ed
From the section: ANN & DNN With MXNet Package in R. This section is about ANN & DNN with MXNet Package in R. ANN & DNN With MXNet Package in R: Evaluate Accuracy of the DNN Model
Instructional Video3:55
de Dicto

What is COGNITIVE ROBOTICS? Turing Fellow Angelo Cangelosi explains

Higher Ed
Angelo Cangelosi is a Professor of Machine Learning and Robotics at the University of Manchester, UK. He created the iCub humanoid robot which is now worth 300,000 £! He explains here the concept of cognitive robotics in a very...
Instructional Video6:27
Curated Video

Bug Bounty Program Certification 11.1: About Android App Frontend Penetration

Higher Ed
In this video, you will learn about Android app frontend penetration overview. • Explore frontend penetration techniques • Understand the process of frontend penetration • Learn about the goals of frontend penetration
Instructional Video2:32
Curated Video

Bug Bounty Program Certification 1.1: The Course Overview

Higher Ed
This video provides an overview of the entire course.
Instructional Video14:19
Packt

Introduction to computer hardware and software : Troubleshooting Core Components

Higher Ed
From the section: Power Supplies. Here, we check our power supply, mount the power supply and learn how to cool our PC. Now that power supplies are covered, it’s time to circle back and cover troubleshooting core components. The...
Instructional Video7:17
Packt

Introduction to computer hardware and software : Configuring USB

Higher Ed
From the section: Essential Peripherals. In this section, we learn more about optical media, USB standard, configure USB’s for keyboard and mIce. Most USB devices work well fresh out of the box. For those that don’t, it’s important to...
Instructional Video4:29
Curated Video

Evaluate the impact of an AI application used in the real world. (case study) : Working with X-Ray images: Case Study - Part 4

Higher Ed
From the section: CNN-Industry Live Project: Find Medical Abnormalities and Save Life. This section includes a CNN-Industry live project on working with X-Ray images. CNN-Industry Live Project: Find Medical Abnormalities and Save Life:...
Instructional Video5:42
Curated Video

Create a machine learning model of a real-life process or object : Improving the Network with Better Activation Functions and Dropout

Higher Ed
From the section: Regression Task Airbnb Prices in New York. We will use a real-world Airbnb dataset that contains data about New York properties for rent in 2019 on Airbnb, including their price. It is a simple dataset and makes a good...
Instructional Video14:52
Packt

Compare the breadth-first and depth-first search algorithms : Assignment 1 - Intro

Higher Ed
From the section: BFS and DFS Grid World. This section will cover BFS and DFS Grid concept. BFS and DFS Grid World: Assignment 1 - Intro
Instructional Video8:30
Packt

Compare the breadth-first and depth-first search algorithms : Installation and Setup

Higher Ed
From the section: Shortest Time Search (Depth First Search). Set up the environment, download and install the required libraries required for this title. • Download python, Graphviz, and Pip. • Run the installer and install these...
Instructional Video9:26
Curated Video

Design test cases to verify a computer program : More Printer Tests

Higher Ed
From the section: Unit Testing with Python. In this section, you will learn about unit testing using Python. This video explains how to perform more printer tests in Python.
Instructional Video6:55
Curated Video

Create a list : The Concat Solution

Higher Ed
From the section: Lists. This section focuses on lists and the various functions of the list. This video provides the solution to the Concat Challenge.
Instructional Video8:54
Curated Video

Create a list : Lists Out of Arrays

Higher Ed
From the section: Lists. This section focuses on lists and the various functions of the list. This video explains lists out of arrays.
Instructional Video4:32
Curated Video

Describe computer programming : Reading from and Writing to the Console

Higher Ed
From the section: Introduction to Python. In this section we look at Python's fundamental, built-in data structures, and discuss how and when to use them. This video will give you an overview about how to read from and write to the...
Instructional Video5:48
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Implementing CNN's in Keras

Higher Ed
From the section: Deep Learning and Tensorflow: Part 2. In this section, we’ll talk about what CNNs is, and how it works. Deep Learning and Tensorflow: Part 2: Implementing CNN's in Keras
Instructional Video6:36
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Corner detection – Harris

Higher Ed
From the section: Computer Vision Basics: Part 3. In this section, we’ll cover the advanced features of Computer Vision. Computer Vision Basics: Part 3: Corner detection – Harris
Instructional Video5:42
Curated Video

Tips, Tricks, and Techniques for Node.js Development 5.4: Node Process Manager

Higher Ed
In this video, we will see how to use a process manager to keep our Node.js applications up and running. • Get an introduction to node process manager • Show strongloop • Show pm2
Instructional Video3:39
Curated Video

Predictive Analytics with TensorFlow 9.2: Implementing an RNN for Spam Prediction

Higher Ed
We will see how to implement an RNN in TensorFlow to predict spam/ham from texts. • Construct RNN network • Perform the training • Plot accuracy over time
Instructional Video14:11
Packt

Introduction to computer hardware and software : Touring the Motherboard

Higher Ed
From the section: Motherboards. In this section, we look into motherboard features such as Chipsets and how to install. A typical motherboard is covered with chips, slots, connectors and heatsinks. A good tech has a solid understanding...
Instructional Video7:08
Packt

State the purpose of network hardware : Hexadecimal

Higher Ed
From the section: Essentials of Networking. In this section, we learn about WANS, Routers, cables and connectors. The central box that connects devices on our LANs has gone through many advancements over the years. Whether hubs or...
Instructional Video3:32
Curated Video

routing protocols : How do routers determine the best route?

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: How do routers determine the best route?