Instructional Video21:51
Packt

Compare the breadth-first and depth-first search algorithms : BFS and DFS Implementation

Higher Ed
From the section: BFS and DFS Grid World. This section will cover BFS and DFS Grid concept. BFS and DFS Grid World: BFS and DFS Implementation
Instructional Video3:08
Curated Video

Design a computer system using tree search and reinforcement learning algorithms : Installing and Setting Up OpenAI Gym

Higher Ed
From the section: Getting Started With Reinforcement Learning Using OpenAI Gym. In this section, we will introduce the basics of the reinforcement learning problem, and explain how OpenAI gym helps with developing and research solutions...
Instructional Video6:26
Packt

Compare the breadth-first and depth-first search algorithms : Introduction to LinkedIn Connection Feature

Higher Ed
From the section: Shortest Path Search (Breadth First Search). In this section, we will develop LinkedIn’s connection feature using Breadth First Search. We take the concepts of the earlier section forward and learn about queue and graph...
Instructional Video10:18
Curated Video

Develop a computer program to solve a problem using a sequence of instructions : Advanced If Statements

Higher Ed
From the section: JavaScript Basics: Variables and Flow Control. In this section, we’ll learn about the basics of JavaScript. In this lesson, we’re going to continue looking at the if statement. We know about “if” and “else”, but there’s...
Instructional Video1:52
Curated Video

Explain web security : Operating Systems and Tools Used

Higher Ed
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Instructional Video8:54
Curated Video

Python for Network Forensics 5.1: Enumeration

Higher Ed
In this video, we will begin to think as an attacker and learn how to enumerate devices on a network. • Learn the basics of calling system commands in Python • Learn how to enumerate network devices • Using Python, build an application...
Instructional Video8:16
Curated Video

Python for Network Forensics 1.4: Importing Scapy Modules

Higher Ed
In this video, we will design a Python based Scapy tool to automate our network analysis. • Familiarize ourselves with common Python data structures • Learn to import 3rd party modules into our own application • Unleash the power of...
Instructional Video5:52
Curated Video

Mastering Tableau 2018.1, Second Edition 5.6: Working with Colors and Shapes

Higher Ed
In this video, we’ll see how to apply colors and shapes using marks card. • Understand marks card: colors and shape • Apply colors using marks card • Applying shapes using marks card
Instructional Video12:17
Packt

Create a computer network: Python Netmiko Library

Higher Ed
From the section: Interacting with Classic Network Devices. In this section, we will look at how to interact with classic network devices with Python libraries. We will explain what we define as classic network devices and use Netmiko...
Instructional Video2:31
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Grey-Box Adversarial with Example

Higher Ed
From the section: Testing Image Classification.In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one category of...
Instructional Video6:04
Curated Video

Evaluate visual representations of data that models real-world phenomena or processes : Visualizing Model Graph – RNN

Higher Ed
From the section: NLP Visualization and Model Experimentation. Visualize text data and view data embeddings. View and track hyperparameter tuning and display training configurations to run reproducible experiments. Here, we shall view...
Instructional Video3:06
Curated Video

Evaluate a machine learning model : Model Evaluation

Higher Ed
From the section: Improving Model Accuracy. We start with reviewing previous day’s assignment by looking at an ideal solution and results. This module takes a pause from introducing any new model and focuses on improving the models and...
Instructional Video18:31
Curated Video

Describe network protocols : UDP Echo Server

Higher Ed
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. In this video, we will look at how to create a UDP echo server. • Get...
Instructional Video4:29
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Activation Functions

Higher Ed
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Activation Functions
Instructional Video10:08
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Color Spaces

Higher Ed
From the section: Computer Vision Basics: Part 1. In this section, we’ll cover the basic features of Computer Vision. Computer Vision Basics: Part 1: Color Spaces
Instructional Video13:38
Packt

Create a computer vision system using decision tree algorithms to solve a real-world problem : Introduction to MatPlotLib

Higher Ed
From the section: Python Crash Course [Optional]. In this section, we’ll continue diving into Python data structures with tuples and dictionaries, functions, Boolean Operations and Loops, and libraries like Pandas, MatPlotLib and Seaborn...
Instructional Video5:45
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Linear Regression

Higher Ed
From the section: Machine Learning: Part 1. In this section, we’ll learn how machine learning works, and how it fits in with the world of AI and deep learning. And learn to train, test and validate the data using K-fold cross-validation....
Instructional Video6:51
Curated Video

Python for Network Forensics 3.2: Exploring File Properties

Higher Ed
Using the power of recursive traversal, we will begin to search and populate file properties. • Enrich your understanding of directory traversal • Modify our application to populate file properties • Search returned results to understand...
Instructional Video3:49
Curated Video

Java 11 Programming for Beginners 3.4: Working with Many Forms of Polymorphism

Higher Ed
Polymorphism is hard without examples, so we go through a few. • Build another bot and use it as an example for method overriding • Go through theory • Show an example for method overloading
Instructional Video6:19
Curated Video

Bug Bounty Program Certification 10.4: Components of the Android App Bug Bounty Program

Higher Ed
In this video, you will get Information about Android app components. • Learn about various components of Android app bug bounty program • Explore various vulnerabilities in android machines • Learn about reward on the basis of level of...
Instructional Video6:30
Curated Video

Cloud Native Development on Azure with Java 3.3: Configure the App to Use Your Azure AD Tenant

Higher Ed
Now that we have registered our app with the Azure Active Directory, the next step is to configure the app to use our Azure AD tenant and then package and redeploy our app. Let’s do it right now! • Change the App ID URI and the reply...
Instructional Video8:37
Curated Video

Implement a computer program using a classic algorithm : In-depth look at execution context of recursive divide function

Higher Ed
From the section: Algorithms - Sort, performance, complexity and big O notation. This section is about Algorithms – sort, performance, complexity and big O notation. Analyze execution context and frames created by recursive divide...
Instructional Video6:41
Curated Video

Implement a computer program using a classic algorithm : Project conclusion walkthrough

Higher Ed
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Go through implementation steps from concluded project
Instructional Video8:29
Packt

Introduction to computer hardware and software : Magnetic Disk Drives

Higher Ed
From the section: Mass Storage Technologies. In this section, we cover topics related to Mass storage. Hard Disk Drives (HDDs), which store data on rotating magnetic disks, have been the go-to mass storage media for decades. A good tech...