Instructional Video8:01
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Identification, Authentication, and Authorization

Higher Ed
Authorization to access resources occurs after the successful proving of one's identity through authentication. This clip is from the chapter "Identity and Account Management" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video9:58
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Risk Response and Mitigation, Risk and Control Monitoring, and Control Reporting

Higher Ed
This video explains the concepts of risk response and mitigation; risk and control monitoring; and finally, risk and control reporting. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 -...
Instructional Video7:25
TMW Media

Tarantula World: Determining a Name for a New Tarantula Species

K - 5th
How do scientists determine a new species of tarantula? How are the tarantulas scanned? Tarantula World, Part 7
Instructional Video8:19
Neuro Transmissions

The Science Behind Jedi Mind Tricks

12th - Higher Ed
These aren't the droids you're looking for. But it is the video you're looking for! Jedi mind tricks are one of the most interesting incarnations of the Force. They seem almost magical. However, in this video, we see that Jedi mind...
Instructional Video1:22
Next Animation Studio

Remote ID system proposed for drones in U.S. airspace

12th - Higher Ed
The Federal Aviation Administration has proposed using remote identification for unmanned aircraft systems in the U.S.
Instructional Video4:47
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Enabling Multifactor Authentication

Higher Ed
Multifactor authentication (MFA) hardens user sign-in by requiring more than one factor, or category of authentication, such as something you know combined with something you have. This clip is from the chapter "Identity and Account...
Instructional Video8:22
Seven Dimensions

Office Security: Lessons Learned from a Theft

Higher Ed
In this video, an employee addresses a theft that occurred in their office and emphasizes the importance of security. They propose implementing stricter measures, such as ID checks and security lists, to ensure that only authorized...
Instructional Video16:42
APMonitor

LSTM Replaces SISO MPC

10th - Higher Ed
The purpose of this exercise is to automate a temperature control process with an LSTM network. The LSTM network is trained from a Model Predictive Controller (MPC). LSTM (Long Short Term Memory) networks are a special type of RNN...
Instructional Video4:06
Blockchain Central

Why Criminals Love Monero?

Higher Ed
This week on Blockchain Central: we’ll take a closer look at Monero, a cryptocurrency which has one of the best security systems among others and has a potential to become your personal bank. However, it still has downsides, which we...
Instructional Video6:44
Communication Coach Alex Lyon

Referent Power

Higher Ed
Referent Power (French & Raven) is one of the types or bases of power. We look at examples of referent power. Referent power, according to French and Raven (1959), is social influence. Referent power describes the way a follower looks up...
Instructional Video0:54
Next Animation Studio

MasterCard pushes for commuter biometrics at public transit systems

12th - Higher Ed
CCTV and gait analysis may come to US public transit to allow commuters to pay without using cards or passes.
Instructional Video5:12
TMW Media

Tarantula World: How to Save Tarantulas from Humans

K - 5th
Two doctors search the desert of Australia for unknown species of tarantulas. Why is it important to find these unknown species?
Instructional Video7:50
Curated Video

CISSP®- Risk Management - Identification

Higher Ed
This video discusses how to identify and manage risks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
Instructional Video11:22
Curated Video

CISSP®- IAAA - Part 1- Identification, Authentication, Authorization, and Accountability

Higher Ed
This is the first part of a two-part video that explains the concept of IAAA. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Instructional Video3:20
Curated Video

Learning D3.JS 5.0 3.5: Creating Clip Paths

Higher Ed
In this video, we will learn how to create clip paths. • Write a text path and • Write the and the • Connect everything and view the result
Instructional Video1:09
Next Animation Studio

China’s latest Taiwan mass incursion reveals worrying capability

12th - Higher Ed
The Chinese Communist Party’s cold war against Taiwan just got one step closer to going hot.
Instructional Video4:49
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - IAAA - Part 2 - Identification, Authentication, Authorization, and Accountability

Higher Ed
This is the second part of a two-part video that explains the concept of IAAA. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Instructional Video8:41
Curated Video

CISSP®- IAAA - Part 2 - Identification, Authentication, Authorization, and Accountability

Higher Ed
This is the second part of a two-part video that explains the concept of IAAA. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Instructional Video3:00
Curated Video

The Purpose and History of the Passport

Pre-K - Higher Ed
The passport is an identification document that people usually need to travel from one country to another. Understand the history of the passport and who can get one. Passports have a long history, but technological advancements in...
Instructional Video8:51
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - IAAA - Part 1- Identification, Authentication, Authorization, and Accountability

Higher Ed
This is the first part of a two-part video that explains the concept of IAAA. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Instructional Video12:12
Packt

CompTIA Network+ Certification N10-007: The Total Course - Identification

Higher Ed
This video shows how to perform identification. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section,...
Instructional Video9:37
Curated Video

Agile Scrum Master Certification Exam Prep (CSM) - Identify the Product Owner

Higher Ed
This video elaborates on a product owner, how to identify a product owner keeping the goals of the project in mind. This clip is from the chapter "Roles and Organization in Scrum" of the series "Agile Scrum Master Certification Exam Prep...
Instructional Video11:20
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Risk Management - Identification

Higher Ed
This video discusses how to identify and manage risks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
Instructional Video4:32
Curated Video

PMI-RMP Certification Training - Tools and Techniques – Meetings

Higher Ed
This video explains tools and techniques – meetings. This clip is from the chapter "Monitor Risk" of the series "PMI-RMP® Certification Training".This section explains techniques to monitor risks.