Instructional Video13:06
Curated Video

How to Create an Interactive Game in PowerPoint

Pre-K - Higher Ed
This video demonstrates how to create an interactive "Guess the Phrase" game show using Microsoft PowerPoint. The game involves students guessing letters to reveal a word related to a topic, making it an engaging resource for classroom...
Instructional Video22:06
Curated Video

Generate Random Words in PowerPoint from Text File

Pre-K - Higher Ed
This video is a tutorial on how to create a resource using VBA in PowerPoint. The resource allows students to generate random pairs of words from a text file and challenges them to come up with a sentence connecting the two words. The...
Instructional Video8:59
Packt

Introduction to computer hardware and software : System Setup

Higher Ed
From the section: Firmware. In this section, we learn about BIOS, POST and system setup. A small system-setup program built into the motherboard firmware enables techs to configure low-level features and options for the system’s...
Instructional Video5:24
Curated Video

Ensemble Machine Learning Techniques 4.2: AdaBoost Algorithm

Higher Ed
This video aims to teach the viewer details about one of the Boosting techniques called AdaBoost. • We go into the details of the AdaBoost algorithm • We see how to calculate model coefficients • We see how to calculate model weights
Instructional Video3:50
Curated Video

Ensemble Machine Learning Techniques 5.1: Overview of Stacking Technique

Higher Ed
This video talks about a commonly used and helpful ensemble technique called stacking. • We get an introduction to stacking technique • We discuss how stacking works • Look at a similar approach to stacking called blending
Instructional Video8:26
Curated Video

Python for Network Forensics 2.3: Querying the Registry

Higher Ed
In this video, we will become familiar with the Windows registry and how the key:value data store maintains OS configuration data. • Learn how to interact with the registry using regedit • Use Python to interact with the registry by...
Instructional Video10:37
Packt

Advanced Computer Vision Projects 3.3: Multi-Person Pose Detection

Higher Ed
In this video, we run a more advanced model to count the number of people and extract poses from more complex images. • Run more advanced ArtTrack model • Apply to model to multiperson images • Visualize the results
Instructional Video3:31
Curated Video

Java 11 Programming for Beginners 1.1: The Course Overview

Higher Ed
This video provides an overview of the entire course.
Instructional Video3:33
Curated Video

Serverless JavaScript Projects 3.1: Sign Up for Twilio and Determine the SMS Phone Number

Higher Ed
We need a Twilio account and a project built in Twilio with a phone number to SMS to. • Sign in to twilio.com and sign up for account • Build a project in Twilio for SMS messaging • Get the phone number that will be used to send SMS...
Instructional Video8:44
Curated Video

Learning D3.JS 5.0 9.3: Drawing a Path Between Two Points

Higher Ed
In this video, we will learn how to draw a path between nodes. • Create more variables inside the main function • Create nodes and circles • Create labels for the nodes
Instructional Video1:38
Curated Video

Learning D3.JS 5.0 4.2: What Is Data?

Higher Ed
In this video, we will learn what data is in D3.js. • Get a general idea of what data is • Get a deeper understanding of data • Understand how to have data in D3.js
Instructional Video2:07
Curated Video

Learning D3.JS 5.0 2.5: Creating Lines

Higher Ed
In this video, we will learn how to create lines. • Code a line • Fix the problem with not viewing the line • Find out how to set many shapes inside the same SVG
Instructional Video7:29
Curated Video

Bug Bounty Program Certification 13.4: Certification Exam Practice Questions – Part 3

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video7:59
Curated Video

Bug Bounty Program Certification 9.3: Non-persistent Attack on Websites Frontend

Higher Ed
In this video, you will perform non - persistent attack on websites. • Setup Lab using Mutillidae Buggy web application for non-persistent attack • Explore non-persistent XSS attack using popup box generation • Learn about cookie...
Instructional Video7:07
Curated Video

Bug Bounty Program Certification 7.2: Install DVWA Framework In Kali Linux

Higher Ed
This video will help you host DVWA (Buggy Application). • Explore DVWA application • Download DVWA in Kali Linux • DVWA hosting in server
Instructional Video6:31
Curated Video

Bug Bounty Program Certification 7.1: Install Web Server in Kali Linux

Higher Ed
In this video, you will learn about Xampp installation. • Learn about Xampp • Download Xampp server in Kali Linux • Installation of Xampp server in Kali Linux OS
Instructional Video10:05
Curated Video

Bug Bounty Program Certification 3.3: Find Open Ports and Services in Network

Higher Ed
In this video, we will find open ports and services. • Use Nmap tool to find ports and services • Use Zenmap tool to provide information about ports and services • Explore various commands
Instructional Video3:28
Packt

Compare the breadth-first and depth-first search algorithms : Introduction to File Search Application

Higher Ed
From the section: Shortest Time Search (Depth First Search). Understand the application that we will develop in this section by answering the questions. • What is search • What is file search • How does it work Understand the application...
Instructional Video4:37
Curated Video

Copy data from a data structure : Lists

Higher Ed
From the section: Beginners Python. This section is about Installing Python, Python 3 vs Python 2, Variables, Strings etc. Beginners Python: Lists
Instructional Video1:02
Packt

Evaluate the scalability and reliability of networks : Scalability and Reliability

Higher Ed
From the section: Introduction to Computer Networks (ICND1). This Section introduces Computer Networks. This includes lectures on Physical Components, Topology, Speed etc. Introduction to Computer Networks (ICND1): Scalability and...
Instructional Video5:30
Curated Video

Describe cyber attacks that could affect a computer system or network : Intercepting Traffic with Wireshark

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will discover how to use Wireshark for...
Instructional Video4:23
Packt

Describe a network protocol : Ping and Traceroute

Higher Ed
From the section: Basic Networking Terms (ICND1). This Section is about the basic Networking Terms. This includes lectures on Network Interface Card, Network protocol, computer network and so on. Basic Networking Terms (ICND1): Ping and...
Instructional Video4:22
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Improving our Classifier with Dropout Regularization

Higher Ed
From the section: Deep Learning and Tensorflow: Part 1. In this section, we’ll talk about what Deep Learning is, and how TensorFlow works at a low level. Deep Learning and Tensorflow: Part 1: [Activity] Improving our Classifier with...
Instructional Video5:26
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Test your Environment with Real-Time Edge Detection in a Jupyter Notebook

Higher Ed
From the section: Environment Setup and Installation. This section will help you to install the required software and set up the development environment for this course. Environment Setup and Installation: Test your Environment with...