Instructional Video6:25
Curated Video

Hands-On WebAssembly for C++ Programmers - Understanding WebAssembly and C++

Higher Ed
You may not understand what WebAssembly is or how it is used. You also may not know how it interacts with C++.

• Learn about the deficiencies of JavaS
cript
• Learn what WebA
ssembly is
• Determine how WebAssembly...
Instructional Video21:28
IDG TECHtalk

Why VPNs aren’t the best security tool for working from home, and what to implement instead

Higher Ed
VPNs are a remote work staple, but they’re hardly the most secure way to access corporate data. CSO Online’s UK Editor, Michael Hill, joins Juliet to explain why overreliance on VPNs poses a security risk, and what alternatives...
Instructional Video9:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Using Wireshark to Analyze Network Traffic

Higher Ed
Wireshark is a free open-source network traffic analyzer that can capture, analyze, filter, and save captured network packets.
r/>
This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+...
Instructional Video7:42
Packt

CompTIA Network+ Certification N10-007: The Total Course - Introduction to Internet Protocol (IP) Addressing

Higher Ed
This video provides an introduction to IP addressing and explains how to enable communication between groups of computers within networks. This clip is from the chapter "Network Models" of the series "CompTIA Network+ Certification...
Instructional Video9:21
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - System vulnerabilities, threats, and countermeasures

Higher Ed
CISSP Domain 7: Security Operations: System vulnerabilities, threats, and countermeasures.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3:...
Instructional Video4:47
Curated Video

Active Directory with Windows Server 2016 - Advanced Trust Settings

Higher Ed
Review the AD security settings for trusts and understand the usage of SID filtering and name suffix routing as a defence-in-depth security policy.
r/>
This clip is from the chapter "Managing and Maintaining AD DS" of the...
Instructional Video6:34
Curated Video

World of Computer Networking Your CCNA start - Static Network Address Translation (NAT)

Higher Ed
This video introduces you to static NAT.<br/<br/>>

This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
Instructional Video2:42
Curated Video

World of Computer Networking Your CCNA start - Types of Network Address Translation (NAT)

Higher Ed
This video introduces you to different types of NAT.<br/<br/>>

This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
Instructional Video2:00
Curated Video

Learning ASP.NET Web API (Video 40)

Higher Ed
Revolutionary changes in the mobile world introduced various type of devices such as smart phones, tablets, and IoT devices, all connected to a network based on a HTTP protocol and HTML 5. This lead to a big push to build...
Instructional Video2:21
XKA Digital

Don't be too dazzled by an opportunity

Higher Ed
James Parr is a designer, entrepreneur and technologist who for the past 15 years has been dedicated to answering the question: How can we help innovate radical new approaches to systems problems? James's current business is Imaginals, a...
Instructional Video7:29
Curated Video

Bug Bounty Program Certification 13.4: Certification Exam Practice Questions – Part 3

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video1:02
Packt

Evaluate the scalability and reliability of networks : Scalability and Reliability

Higher Ed
From the section: Introduction to Computer Networks (ICND1). This Section introduces Computer Networks. This includes lectures on Physical Components, Topology, Speed etc.



Introduction to Computer Networks (ICND1):...
Instructional Video5:30
Curated Video

Describe cyber attacks that could affect a computer system or network : Intercepting Traffic with Wireshark

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools.



In this video, we will discover how to use...
Instructional Video4:49
IDG TECHtalk

Windows 11 | Hardware requirements for security features

Higher Ed
Here’s what your systems need before you can take advantage of Windows 11’s security features, and how to upgrade where possible.
Instructional Video6:29
IDG TECHtalk

How to prevent attackers from exploiting Windows privileges

Higher Ed
Ransomware and other attackers will often try to escalate privileges once inside Windows systems. These tips can make that harder to do.
Instructional Video5:19
IDG TECHtalk

How to protect legacy systems on a Windows network

Higher Ed
Every company has legacy systems, many of which provide vulnerabilities for attackers to exploit. Use this advice to help shut them out.
Instructional Video5:53
IDG TECHtalk

How to protect your network from web shell malware

Higher Ed
Attackers are using web shells to mimic legitimate files on web servers and infect them with malware. Here’s how to prevent it.
Instructional Video4:58
IDG TECHtalk

How to fight scripting attacks

Higher Ed
Most phishing campaigns use links to malicious scripts that infect users’ devices. Here’s how to spot and prevent them from doing damage.
Instructional Video5:22
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- Introduction to On-Premises Networking

Higher Ed
In this video, we'll learn about on-premises networking.
r/>
This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is...
Instructional Video17:42
NASA

Goddard Space Flight Center Virtual Tour

3rd - 11th
NASA’s Goddard Space Flight Center in Greenbelt, Maryland, is one of the few space organizations that can manage a mission from beginning to end: imagine it, build it, test it, launch it and reap the scientific...
Instructional Video13:10
IDG TECHtalk

How to secure and speed up your home Wi-Fi network

Higher Ed
With most of (if not everyone in) your household now working from home, you’re perhaps asking more of your home network than ever before. Multiple devices may now be hosting a video conference, streaming and using chat tools all at the...
Instructional Video3:46
Packt

CompTIA Network+ Certification N10-007: The Total Course - Introduction to Address Resolution Protocol (ARP)

Higher Ed
This video provides an introduction to ARP and explains how it is used to resolve IP addresses. This clip is from the chapter "Transmission Control Protocol/Internet Protocol (TCP/IP) Basics" of the series "CompTIA Network+ Certification...
Instructional Video9:54
Curated Video

World of Computer Networking Your CCNA start - Using Computer Networks Every Day

Higher Ed
This video explains the everyday use of computer networks.
r/>
This clip is from the chapter "What is a Computer Network?" of the series "World of Computer Networking: Your CCNA start".This section introduces you to the concept...
Instructional Video2:31
Science360

Fishy business

12th - Higher Ed
In episode 47, Jordan and Charlie explore how scientists at the University of Texas at Austin have solved the longstanding mystery about how some fish “disappear” from their predators. A fish’s ability to go invisible in polarized light...