Hi, what do you want to do?
Curated Video
routing protocols : Static Routes and Dynamic Routes
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols.
Routing Introduction: Static Routes and Dynamic...
Routing Introduction: Static Routes and Dynamic...
Curated Video
routing protocols : Routed protocols and Demonstrations
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols.
Routing Introduction: Routed protocols and...
Routing Introduction: Routed protocols and...
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 10
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images.
CNN-Industry Live Project: Playing with Real World Natural Images:...
CNN-Industry Live Project: Playing with Real World Natural Images:...
Curated Video
Python 3: Project-based Python, Algorithms, Data Structures - BST - Deleting leaf nodes
Here, the author thanks everyone for taking the course and suggestions for possible next steps
r/>
This clip is from the chapter "Algorithms - Search and abstract data structures" of the series "Python 3: Project-based Python,...
r/>
This clip is from the chapter "Algorithms - Search and abstract data structures" of the series "Python 3: Project-based Python,...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - The Metasploit Framework
Penetration testers can use the cross-platform Metasploit framework command-line tool for discovering and exploiting security flaws on hosts.
r/>
This clip is from the chapter "Testing Infrastructure" of the series "CompTIA...
r/>
This clip is from the chapter "Testing Infrastructure" of the series "CompTIA...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 13 Ask Me Anything (AMA)
There is much to be learned by analyzing past security incidents. In this episode, Dan discussed the Cyber Kill Chain.
r/>
This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification...
r/>
This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification...
Science360
What do we know about how people recognize faces?
What do we know about how people recognize faces? Catherine Stamoulis, assistant professor of pediatrics at Harvard Medical School, answers the question on this edition of "Ask a Scientist."
NASA
The Invisible Network: Bonus - Dr. Jim Garvin | NASA's The Invisible Network Podcast
There is perhaps no one better than Jim Garvin to outline the unique opportunities for research that the Artemis missions to the Moon could provide scientists on Earth. Jim is chief scientist at NASA’s Goddard Space Flight Center in...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Code to build a perceptron for binary classification
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN.<b<br/>r/>
Artificial Neural Networks: Code to build a perceptron for binary classification
Artificial Neural Networks: Code to build a perceptron for binary classification
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Virtual Private Networks (VPNs)
VPNs provide an encrypted network tunnel over the Internet to provide secure access to a remote network. Client-to-site VPNs allow individual device access where site-to-site VPNs can securely link branch offices over the Internet or...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing Endpoints
In the enterprise, endpoint detection and response solutions report to a centralized SIEM solution when abnormal activity, including malware, is detected on hosts and devices. Intrusion detection and prevention systems (IDS/IPS) are...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks
Staying up-to-date with the latest types of security attacks is form of attack mitigation. Keeping systems hardened helps protect against zero-day attacks. Software developers must adhere to secure coding practices to ensure deployed...
Packt
CompTIA Network+ Certification N10-007: The Total Course - User Training
This video explains how, why, and when of training users. This clip is from the chapter "Managing Risk" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn to work with risk...
Science360
Young citizen scientists assist in Salt Lake City air quality research - Science Nation
Community, students and scientists benefit from partnership to assess particulate matter pollution
Middle and high school students in Salt Lake City are helping scientists and the community better understand particulate...
Middle and high school students in Salt Lake City are helping scientists and the community better understand particulate...
Curated Video
routing protocols : Terms: AS, IGPs, EGPs
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols.<b<br/>r/>
Routing Introduction: Terms: AS, IGPs, EGPs
Routing Introduction: Terms: AS, IGPs, EGPs
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 8
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images.
CNN-Industry Live Project: Playing with Real World Natural Images:...
CNN-Industry Live Project: Playing with Real World Natural Images:...
Curated Video
Data Science and Machine Learning with R - Networking Do's and Don'ts
This video explains networking do's and don'ts.
r/>
This clip is from the chapter "Starting a Career in Data Science" of the series "Data Science and Machine Learning with R from A-Z Course [Updated for 2021]".This section...
r/>
This clip is from the chapter "Starting a Career in Data Science" of the series "Data Science and Machine Learning with R from A-Z Course [Updated for 2021]".This section...
IDG TECHtalk
How to keep attackers from using Active Directory against you
Criminals will try to change Windows Active Directory Group Policy security settings to enable attacks. Here’s how to stop them.
IDG TECHtalk
How to set up Edge Chromium security options
Edge Chromium can provide more protection for organizations that use older versions of Windows.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Proxy Servers
Forward proxies sit between internal user devices and the Internet and fetch Internet content on behalf of internal users. Reverse proxies map public network service IPs to private IPs; they route client requests for a network service...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - SSH Public Key Authentication Lab
Multifactor authentication should always be used for administrative accounts. In this demo, SSH public key authentication is configured for a Linux host.
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA...
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - IOT (Internet Of Things)
CISSP Domain 3: System Architecture and Engineering: IOT (Internet Of Things).
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge)
Introduction: The 8 CISSP domains or CBKs (Common Bodies of Knowledge).
r/>
This clip is from the chapter "Introduction" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp...
r/>
This clip is from the chapter "Introduction" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp...
Curated Video
Active Directory with Windows Server 2016 - Preparing AD FS Installation
Walk through the steps to install Active Directory Federation Services, including the list of pre-installation requirements and planning needed to accomplish this installation.
r/>
This clip is from the chapter "Implement...
r/>
This clip is from the chapter "Implement...