Instructional Video5:54
IDG TECHtalk

How to and why you should disable LLMNR with Windows Server

Higher Ed
Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.
Instructional Video9:10
Curated Video

CISSP®- Information Security Governance: Values, Vision, Mission, and Plans

Higher Ed
This video focuses on values, vision, mission, and plans.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Instructional Video13:09
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- IP Addresses and Port Numbers – Part 2

Higher Ed
In this video, we'll learn about IP Addresses and Port Numbers – Part 2.
r/>
This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This...
Instructional Video10:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Hardening

Higher Ed
There are many options for securing Wi-Fi networks. Disabling items such as WLAN name broadcast, DHCP, and public network management are the first consideration. Using WPA3 enterprise mode and changing default settings also help harden...
Instructional Video14:02
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Virtualization

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Virtualization.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture...
Instructional Video3:37
Curated Video

Active Directory with Windows Server 2016 - Introduction to Web App Proxy

Higher Ed
Understand the benefits, usage, and purpose of Web App Proxy (WAP) with Federation Services and learn about the requirements to implement and authenticate.
r/>
This clip is from the chapter "Implement Identity Federation and...
Instructional Video4:40
Curated Video

The Birth of the Xia dynasty in China

Higher Ed
An episode of chinese dynasty and the yellow river flood taking numerous lives due to lack of minimising ways. Yu The Great proved to be a hero in upcoming the situation through his diligence and mindfulness.
Instructional Video2:38
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - How Hard Is it to Get Hacked?

Higher Ed
You will learn how hard it has become to hack into systems and company networks these days.
r/>
This clip is from the chapter "How Hard Is it to Get Hacked?" of the series "The Beginners 2022 Cyber Security Awareness Training...
Instructional Video3:28
Packt

Advanced Computer Vision Projects 3.4: Videos and Retraining

Higher Ed
In this video, we’ll briefly cover how to extend the model to handle videos and how to retrain the model.

• See that we can apply algorithms to videos by running frame-by-
frame
• Briefly go over instructions to retrain on...
Instructional Video5:16
Curated Video

Bug Bounty Program Certification 6.6: Infect Complete Network Using Malwares

Higher Ed
In this video, you will see how to infect entire network using malwares. • Learn about various network attacks • Explore the process of network infection techniques • Explanation of malware infection in network
Instructional Video8:10
Packt

State the purpose of network hardware : Introduction to Networking

Higher Ed
From the section: Introduction to Computer Networks (ICND1). This Section introduces Computer Networks. This includes lectures on Physical Components, Topology, Speed etc. Introduction to Computer Networks (ICND1): Physical Components
Instructional Video3:07
IDG TECHtalk

What is edge computing?

Higher Ed
Edge computing is what it sounds like: computing that takes place at the edge of corporate networks, with “the edge” being defined as the place where end devices access the rest of the network – things like phones, laptops, industrial...
Instructional Video5:47
IDG TECHtalk

Best practices for secure work-from-home VPN connections

Higher Ed
As more employees work from home, it’s important to review your VPN settings and following the best guidance.
Instructional Video4:54
IDG TECHtalk

3 easy ways to make your Windows network harder to hack

Higher Ed
Start the new year off by eliminating common paths for attackers to breach your network.
Instructional Video8:59
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Scanning with Nmap

Higher Ed
Nmap is the most commonly used network scanning tool. Scans can be saved as XML files. Nmap can be used at the command line, but it also has a frontend GUI named Zenmap.
r/>
This clip is from the chapter "Tools of the Trade" of...
Instructional Video16:43
Institute for New Economic Thinking

Frank Kelly - Networks and Systemic Risk

Higher Ed
The Inaugural Conference @ King's, Institute for New Economic Thinking, Day 2 - Lunch:<b<br/>r/>

Networks and Systemic Risk
Instructional Video7:57
Curated Video

Deep Learning with Python (Video 4)

Higher Ed
Deep learning is currently one of the best providers of solutions regarding problems in image recognition, speech recognition, object recognition, and natural language with its increasing number of libraries that are available in...
Instructional Video6:38
IDG TECHtalk

New Windows vulnerabilities underscore importance of network segmentation

Higher Ed
The risk from two newly discovered Windows vulnerabilities could be mitigated if you’ve properly segmented your network. Here’s what you need to know.
Instructional Video4:14
IDG TECHtalk

How to double-check permissions post migration from Windows 7

Higher Ed
It pays to make sure all permissions in your Windows environment are correct after migrating from Windows 7 or Server 2008 R2. Here’s how to check.
Instructional Video9:05
Curated Video

CISSP®- The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37 Revision 1 and 2

Higher Ed
This video explains NIST SP 800-37 revision 1 and 2.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Instructional Video3:50
Curated Video

CISSP®- Risk Response and Mitigation, Risk and Control Monitoring, and Control Reporting

Higher Ed
This video explains the concepts of risk response and mitigation; risk and control monitoring; and finally, risk and control reporting.
r/>
This clip is from the chapter "Certified Information Systems Security Professional...
Instructional Video14:31
Curated Video

CISSP®- Information Security Governance: Policies, Procedures, Guidelines, and Frameworks

Higher Ed
This video focuses on policies, procedures, guidelines, and frameworks.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Instructional Video9:00
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - IP Security (IPsec)

Higher Ed
The IPsec network security protocol suite can be used to secure any type of network traffic through integrity, authentication and encryption. Many VPNs use IPsec to establish an encrypted network tunnel.
r/>
This clip is from...
Instructional Video6:14
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Bots and Botnets

Higher Ed
Distributed Denial of Service (DDoS) attacks use collections of infected bots, or zombies in a botnet, to flood victims hosts or networks. Bots periodically contact a malicious user-controlled command and control server.
r/>
...