Instructional Video5:15
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Scanners

Higher Ed
How do attackers discover networks and hosts? Network scanners such as Nmap are used by attackers as well as legitimate security technicians to perform network reconnaissance.
r/>
This clip is from the chapter "Tools of the...
Instructional Video8:50
Packt

CompTIA Network+ Certification N10-007: The Total Course - Introduction to Netstat

Higher Ed
This video provides an introduction to the netstat command. This clip is from the chapter "Transmission Control Protocol/Internet Protocol TCP/IP Applications" of the series "CompTIA Network+ Certification N10-007: The Total Course".In...
Instructional Video14:25
Packt

CompTIA Network+ Certification N10-007: The Total Course - Terminating Twisted Pair

Higher Ed
This video explains how to terminate a cable to the 568A specification, focusing on the preparation and crimping process.
r/>
This clip is from the chapter "Ethernet Basics" of the series "CompTIA Network+ Certification...
Instructional Video7:32
Curated Video

Active Directory with Windows Server 2016 - Adding Domain Controller to an Existing Forest

Higher Ed
The next step is to add a DC into a forest, so you’ll review and consider options that will affect how the domain interacts with existing AD security systems.
r/>
This clip is from the chapter "Install and Configure AD DS" of...
Instructional Video4:38
Mediacorp

Exploring the Exciting Possibilities of 5G Technology in South Korea

12th - Higher Ed
This video discusses the early access to 5G technology in Korea and the various applications and services that can be developed using the faster network. The video emphasizes the potential of 5G to revolutionize video content...
Instructional Video1:42
XKA Digital

Three lessons from a mentor

Higher Ed
James Parr is a designer, entrepreneur and technologist who for over 15 years has been dedicated to answering the question: How can we help innovate radical new approaches to systems problems?



Trillium Technologies, of...
Instructional Video8:11
All In One Social Media

How to Use Hopin! Streamyard & Hopin - What you need to know!

Higher Ed
Streamyard has been aquiered by Hopin. In this video I will give you a walk through of how to use Hopin as an attendee and event host.
Instructional Video7:59
Packt

List computer networking media : Virtual Private Networks (VPNs)

Higher Ed
From the section: The Internet. Here, we explore our internet options. In this episode, Mike shows how virtual private networking (VPN) works and why people use VPN connections. He discusses the types of protocols and clients that make...
Instructional Video5:40
Curated Video

Describe network protocols : The Course Overview

Higher Ed
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP.<b<br/>r/>

This video will give you an overview about the course.
Instructional Video3:00
Curated Video

SIM Cards: the Key to Your Phone's Functionality

Pre-K - Higher Ed
A SIM card is a type of ID card for your phone. It tells your phone which network to connect to and which messages and phone calls to receive. Learn about the convenience and functionality of SIM cards.
Instructional Video27:49
IDG TECHtalk

FCC to auction off 5G bandwidth; Apple data privacy update

Higher Ed
The Federal Communications Commission (FCC) in the United States will auction off previously reserved 5G spectrum, potentially speeding up next-generation wireless rollout. As device makers continue to release 5G-enabled phones and...
Instructional Video7:30
IDG TECHtalk

How to protect Windows administrator accounts

Higher Ed
Compromising windows administrator accounts is always a key goal for attackers. You can help prevent that from happening with these best practices.
Instructional Video6:19
IDG TECHtalk

How to securely set up split-tunnel VPNs

Higher Ed
Some organizations are setting up split-tunnel virtual private networks to allow remote workers to connect to a Windows network. Follow these steps to minimize security risks.
Instructional Video3:28
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 6 Exam Question Review

Higher Ed
Address Resolution Protocol (ARP) is used by the TCP/IP protocol suite. This episode discussed ARP poisoning attacks and potential mitigations.
r/>
This clip is from the chapter "The Basic LAN" of the series "CompTIA Security+...
Instructional Video4:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Keylogger Demo

Higher Ed
Limited access to network computers can prevent malicious actors from installing components such as hardware key loggers, which can capture all user keystrokes and make them available to an attacker over a Wi-Fi network.
r/>
...
Instructional Video4:16
Packt

CompTIA Network+ Certification N10-007: The Total Course - Introduction to Structured Cabling

Higher Ed
This video provides an introduction to structured cabling and explains its basic components, such as an equipment room, horizontal runs, and the work area. This clip is from the chapter "Installing a Physical Network" of the series...
Instructional Video5:18
Packt

CompTIA Network+ Certification N10-007: The Total Course - Cellular Technologies

Higher Ed
This video explains the cellular networking options, such as HSPA+ and LTE. This clip is from the chapter "Mobile Networking" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn more...
Instructional Video11:52
Packt

CompTIA Network+ Certification N10-007: The Total Course - Introduction to Virtual Local Area Networks (VLANs)

Higher Ed
This video provides an introduction to VLANs and explores the concepts and processes behind virtual LANs, including managed switches and trunking. This clip is from the chapter "Advanced Networking Devices" of the series "CompTIA...
Instructional Video4:20
Curated Video

World of Computer Networking Your CCNA start - Collision Domains

Higher Ed
This video introduces you to collision domains.
r/>
This clip is from the chapter "Switches and Data Link Layer" of the series "World of Computer Networking: Your CCNA start".This section introduces you to switches and the data...
Instructional Video4:21
Mediacorp

Reducing Traffic and Emissions with Parcel Lockers

12th - Higher Ed
Increasing online orders and home deliveries is leading to more delivery vehicles on the road, adding to traffic congestion and carbon emissions. Using automated parcel lockers could reduce these issues, but adoption of these lockers...
Instructional Video6:30
Blockchain Central

Why Do We Need Digital Identities? | Blockchain Central

Higher Ed
Following the topic of private data security, this week on Blockchain Central we will explore what a digital identity is and how it can improve the safety of our personal data.
Instructional Video6:34
Curated Video

Bug Bounty Program Certification 5.1: About Network Internal Attack on Server

Higher Ed
In this video, explore various network internal attacks. • Learn about network internal attack and listing of attacks • Explore DOS attack and password cracking techniques • Understand server scanning techniques
Instructional Video2:52
Curated Video

routing protocols : Classful routing protocols

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols.<b<br/>r/>

Routing Introduction: Classful routing protocols
Instructional Video6:27
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Practical Example - Vehicle Speed Determination

Higher Ed
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN.<b<br/>r/>

Artificial Neural Networks: Practical Example - Vehicle Speed Determination