Curated Video
Explain web security : Working with NMap
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks. Our aim in this video is to understand what NMap is and how we will be working with it. -...
Curated Video
Evolution and Revolution of the USB
The video explores the history and impact of the USB, which has become a common and essential item for computer users. It discusses how the USB revolutionized connectivity by providing a standardized port for various hardware devices,...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Port Bonding
This video explains how to improve network throughput from a router by combining traffic onto multiple router ports. This clip is from the chapter "Advanced Networking Devices" of the series "CompTIA Network+ Certification N10-007: The...
Programming Electronics Academy
Lesson 4 | Arduino IDE Familiarization | Arduino Crash Course
Lesson 4 | Arduino IDE Familiarization | Arduino Crash Course
Curated Video
Explain web security : Shodan for scanning
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks. In this video we will learn what Shodan is and how to use it. - Scour through the Shodan...
IDG TECHtalk
M1 Macs: Should you upgrade?
We’ve had our hands on the new M1 MacBook Pro for awhile now, and we’re finally ready to answer the question: Should you (or your IT department) upgrade your MacBook to a new M1 Mac? Computerworld executive editor Ken Mingis and Macworld...
Curated Video
AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - Database Hosting Methods
This video explains how you can host databases in Amazon Web Services (AWS) using two methods—one that is managed by AWS and the other that is managed by your organization. This video will present the pros and cons of each database...
Curated Video
The Complete Practical Docker Guide - Running API Containers Based on the Built Docker Image
This video explains running API containers based on the built Docker image. This clip is from the chapter "Building Custom Images Using Dockerfiles" of the series "The Complete Practical Docker Guide".This section focuses on building...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Connecting Ethernet Scenarios
This video explains the different cabling or switch configuration scenarios that are difficult to diagnose. This clip is from the chapter "Modern Ethernet" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this...
Curated Video
World of Computer Networking Your CCNA start - Types of Media Access Control (MAC) Addresses
This video introduces you to the different types of MAC addresses. This clip is from the chapter "Switches and Data Link Layer" of the series "World of Computer Networking: Your CCNA start".This section introduces you to switches and the...
Curated Video
Master Microservices with Spring Boot and Spring Cloud - Step 04 – Setting Up Spring Cloud Config Server
This video explains setting up Spring Cloud config server. This clip is from the chapter "Microservices with Spring Cloud – V1" of the series "Master Microservices with Spring Boot and Spring Cloud".This section focuses on microservices...
Next Animation Studio
Electric air taxi port to be unveiled in Singapore
German aviation startup company Volocopter is collaborating with British drone infrastructure and deliveries company Skyports to build the VoloPort, an electric station for flying taxis.
Packt
CompTIA Network+ Certification N10-007: The Total Course - Switch Port Protection
This video explains the various switch port mitigation techniques and how they are used in a working network environment. This clip is from the chapter "Advanced Networking Devices" of the series "CompTIA Network+ Certification N10-007:...
Curated Video
Hands-On WebAssembly for C++ Programmers - Telling Time Through WebAssembly
Does time behave any differently in a WebAssembly context than in native? Let us see if there are other ways to pull in more robust time libraries. • Understand that a web browser supplies the time, not the operating system • Learn about...
Curated Video
World of Computer Networking Your CCNA start - Working of Network Switches
This video demonstrates how network switches work. This clip is from the chapter "Switches and Data Link Layer" of the series "World of Computer Networking: Your CCNA start".This section introduces you to switches and the data link layer.
Curated Video
The Complete Practical Docker Guide - Adding Mongo and mongo-express Services to the docker-compose File
This video helps you with adding Mongo and mongo-express services to the docker-compose file. This clip is from the chapter "Launching Multiple Services Using Docker Compose" of the series "The Complete Practical Docker Guide".This...
Curated Video
World of Computer Networking Your CCNA start - Transport Layer Connections
This video focuses on the connections in the transport layer. This clip is from the chapter "Transport Layers: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)" of the series "World of Computer Networking: Your CCNA...
Curated Video
World of Computer Networking Your CCNA start - Multiplexing and De-multiplexing in the Transport Layer
This video focuses on multiplexing and de-multiplexing in the transport layer. This clip is from the chapter "Transport Layers: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)" of the series "World of Computer...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Nmap - 2
In this video, you'll continue to learn about Nmap. This clip is from the chapter "Active Information Gathering and Port Scanning" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Hardening Devices
This video shows how to perform hardening to eliminate the attack on the device. This clip is from the chapter "Protecting Your Network" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will...
Curated Video
World of Computer Networking Your CCNA start - Summary "Transport Layers: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)"
This video provides a summary of the section. This clip is from the chapter "Transport Layers: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)" of the series "World of Computer Networking: Your CCNA start".This...
Economics Explained
The Economics of the Dutch East India Company
Trillion-dollar mega corporations are a very big deal these days. Only about 2 or 3 exist in the modern world and they're primarily tech companies that have achieved this status by capitalizing on cutting edge modern technology (and...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Packets and Ports
This video explains how TCP/IP networks use port numbers to keep track of multiple connections between computers. This clip is from the chapter "Network Models" of the series "CompTIA Network+ Certification N10-007: The Total Course".In...
Curated Video
Docker Dockerfile and Docker Compose 2020 Ready - The docker-compose.yml File Explained Line-by-Line
Reading, Understanding and Writing docker-compose.yml files step by step: The docker-compose.yml File Explained Line-by-Line This clip is from the chapter "Reading, Understanding and Writing docker-compose.yml files step by step" of the...