Hi, what do you want to do?
IDG TECHtalk
Coronavirus pandemic amplifies internet access and digital divide
As some people continue to work and learn from home six months into the coronavirus pandemic, reliable and fast internet access is as important as ever. But in rural communities without access to broadband, or for those who simply can’t...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Discovery and Attacks
Is your Wi-Fi network completely invisible if you disable SSID broadcasting? No! Periodic beacon frames are still sent wirelessly with the WLAN name field excluded. Freely available tools can be used to discover and crack WEP and WPA...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Broadcast versus Unicast
This video illustrates the difference between broadcast and unicast. In this episode, Mike describes the typical frame traffic that uses destination and source MAC addresses for communicating over a network. He also shows the broadcast...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Walking Through Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP)
This video provides a walkthrough of the OSI and TCP/IP models for reference. This clip is from the chapter "Network Models" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn to work...
Packt
CompTIA Network+ Certification N10-007: The Total Course - What is a Model?
This video explains the concept of network models. This clip is from the chapter "Network Models" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn to work on network models and get...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Mitigating Network Threats
This video explains how to examine the methods to protect a network from both external and internal threats. This clip is from the chapter "Managing Risk" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Web architecture and attacks
CISSP Domain 3: System Architecture and Engineering: Web architecture and attacks.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - The CIA triad
CISM Domain 1: Information Security Governance: The CIA triad
r/>
This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security Governance Video...
r/>
This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security Governance Video...
Economics Explained
China Has A Debt Problem Three Times Larger Than Evergrande: Introduction
Good infrastructure is one of the greatest investments a country can make. Unfortunately for China, you can have too much of a good thing.
Helping you become more knowledgeable about how the world works, our content covers...
Helping you become more knowledgeable about how the world works, our content covers...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part III
In Part III of this module, you will continue to see several ways in which hackers and scammers are social engineering us, via emails and webpages. Even more major red flags are exposed so that these now become ingrained in our...
Curated Video
World of Computer Networking Your CCNA start - Collision Handling Mechanisms
This video explains various collision handling mechanisms.
r/>
This clip is from the chapter "Switches and Data Link Layer" of the series "World of Computer Networking: Your CCNA start".This section introduces you to switches...
r/>
This clip is from the chapter "Switches and Data Link Layer" of the series "World of Computer Networking: Your CCNA start".This section introduces you to switches...
Curated Video
World of Computer Networking Your CCNA start - Checking Network Address Translation (NAT) Settings on a Wireless Router
This video demonstrates how to check NAT settings on a wireless router.
r/>
This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces...
r/>
This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces...
Curated Video
World of Computer Networking Your CCNA start - Dynamic Network Address Translation (NAT)
This video introduced you to dynamic NAT.<br/<br/>>
This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
Curated Video
World of Computer Networking Your CCNA start - Working of Network Address Translation (NAT)
This video explains the working of NAT.<br/<br/>>
This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
Flipping Physics
Torque - Mass on Plank with String
A 0.300 kg mass rests on a 0.395 m long, 0.764 kg, uniform wooden plank supported by a string as shown in the figure. If the mass is 0.274 m from the wall and the angle between the string and the plank is 32.1°, (a) What is the force of...
Rachel's English
Networking
If you’re trying to find a job, the best place to start is with your network—everyone you know! In this video I’ll show you exactly how to build your network and use networking skills to find a job. You’ll here from several experts along...
Brainwaves Video Anthology
Howard Rheingold - Net Smart How to Thrive Online
Rheingold was born in Phoenix, Arizona. He attended Reed College in Portland, Oregon, from 1964 to 1968. His senior thesis was entitled "What Life Can Compare with This? Sitting Alone at the Window, I Watch the...
Curated Video
Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4
Exam questions. • Practice questions • Solutions • Explanation of answer
Curated Video
Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Packt
Troubleshoot a faulty computer network : RIP Troubleshooting Scenario 1. Can you find the issue?
From the section: RIP Troubleshooting (ICND1). In this section, we learn to troubleshoot RIP in different scenario.<b<br/>r/>
RIP Troubleshooting (ICND1): RIP Troubleshooting Scenario 1. Can you find the issue?
RIP Troubleshooting (ICND1): RIP Troubleshooting Scenario 1. Can you find the issue?
Curated Video
Describe cyber attacks that could affect a computer system or network : The Course Overview
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
IDG TECHtalk
How to secure printers on Windows networks
Attackers often gain access to networks through the printers connected to them. Here’s how to address printer vulnerabilities on your network.
IDG TECHtalk
7 dumb ways to be a ransomware victim, and how to avoid the embarrassment
Ransomware perpetrators count on Windows security admins to make these common mistakes. Here’s how to find and fix them.
Curated Video
5G and Wireless Communication for Beginners - Software Defined Networking (SDN) and Infrastructure as Code
This video focuses on SDN and infrastructure as code.<br/<br/>>
This clip is from the chapter "5G Update - 2020" of the series "5G and Wireless Communication for Beginners".This section presents the latest updates on 5G.
This clip is from the chapter "5G Update - 2020" of the series "5G and Wireless Communication for Beginners".This section presents the latest updates on 5G.