Hi, what do you want to do?
Curated Video
Hands-On WebAssembly for C++ Programmers - Understanding WebAssembly and C++
You may not understand what WebAssembly is or how it is used. You also may not know how it interacts with C++.
• Learn about the deficiencies of JavaS
cript
• Learn what WebA
ssembly is
• Determine how WebAssembly...
• Learn about the deficiencies of JavaS
cript
• Learn what WebA
ssembly is
• Determine how WebAssembly...
IDG TECHtalk
Why VPNs aren’t the best security tool for working from home, and what to implement instead
VPNs are a remote work staple, but they’re hardly the most secure way to access corporate data. CSO Online’s UK Editor, Michael Hill, joins Juliet to explain why overreliance on VPNs poses a security risk, and what alternatives...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Using Wireshark to Analyze Network Traffic
Wireshark is a free open-source network traffic analyzer that can capture, analyze, filter, and save captured network packets.
r/>
This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+...
r/>
This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Introduction to Internet Protocol (IP) Addressing
This video provides an introduction to IP addressing and explains how to enable communication between groups of computers within networks. This clip is from the chapter "Network Models" of the series "CompTIA Network+ Certification...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - System vulnerabilities, threats, and countermeasures
CISSP Domain 7: Security Operations: System vulnerabilities, threats, and countermeasures.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3:...
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3:...
Curated Video
Active Directory with Windows Server 2016 - Advanced Trust Settings
Review the AD security settings for trusts and understand the usage of SID filtering and name suffix routing as a defence-in-depth security policy.
r/>
This clip is from the chapter "Managing and Maintaining AD DS" of the...
r/>
This clip is from the chapter "Managing and Maintaining AD DS" of the...
Curated Video
World of Computer Networking Your CCNA start - Static Network Address Translation (NAT)
This video introduces you to static NAT.<br/<br/>>
This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
Curated Video
World of Computer Networking Your CCNA start - Types of Network Address Translation (NAT)
This video introduces you to different types of NAT.<br/<br/>>
This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
This clip is from the chapter "Network Address Translation (NAT)" of the series "World of Computer Networking: Your CCNA start".This section introduces you to NAT.
Curated Video
Learning ASP.NET Web API (Video 40)
Revolutionary changes in the mobile world introduced various type of devices such as smart phones, tablets, and IoT devices, all connected to a network based on a HTTP protocol and HTML 5. This lead to a big push to build...
XKA Digital
Don't be too dazzled by an opportunity
James Parr is a designer, entrepreneur and technologist who for the past 15 years has been dedicated to answering the question: How can we help innovate radical new approaches to systems problems? James's current business is Imaginals, a...
Curated Video
Bug Bounty Program Certification 13.4: Certification Exam Practice Questions – Part 3
Exam questions. • Practice questions • Solutions • Explanation of answer
Packt
Evaluate the scalability and reliability of networks : Scalability and Reliability
From the section: Introduction to Computer Networks (ICND1). This Section introduces Computer Networks. This includes lectures on Physical Components, Topology, Speed etc.
Introduction to Computer Networks (ICND1):...
Introduction to Computer Networks (ICND1):...
Curated Video
Describe cyber attacks that could affect a computer system or network : Intercepting Traffic with Wireshark
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools.
In this video, we will discover how to use...
In this video, we will discover how to use...
IDG TECHtalk
Windows 11 | Hardware requirements for security features
Here’s what your systems need before you can take advantage of Windows 11’s security features, and how to upgrade where possible.
IDG TECHtalk
How to prevent attackers from exploiting Windows privileges
Ransomware and other attackers will often try to escalate privileges once inside Windows systems. These tips can make that harder to do.
IDG TECHtalk
How to protect legacy systems on a Windows network
Every company has legacy systems, many of which provide vulnerabilities for attackers to exploit. Use this advice to help shut them out.
IDG TECHtalk
How to protect your network from web shell malware
Attackers are using web shells to mimic legitimate files on web servers and infect them with malware. Here’s how to prevent it.
IDG TECHtalk
How to fight scripting attacks
Most phishing campaigns use links to malicious scripts that infect users’ devices. Here’s how to spot and prevent them from doing damage.
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- Introduction to On-Premises Networking
In this video, we'll learn about on-premises networking.
r/>
This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is...
r/>
This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is...
NASA
Goddard Space Flight Center Virtual Tour
NASA’s Goddard Space Flight Center in Greenbelt, Maryland, is one of the few space organizations that can manage a mission from beginning to end: imagine it, build it, test it, launch it and reap the scientific...
IDG TECHtalk
How to secure and speed up your home Wi-Fi network
With most of (if not everyone in) your household now working from home, you’re perhaps asking more of your home network than ever before. Multiple devices may now be hosting a video conference, streaming and using chat tools all at the...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Introduction to Address Resolution Protocol (ARP)
This video provides an introduction to ARP and explains how it is used to resolve IP addresses. This clip is from the chapter "Transmission Control Protocol/Internet Protocol (TCP/IP) Basics" of the series "CompTIA Network+ Certification...
Curated Video
World of Computer Networking Your CCNA start - Using Computer Networks Every Day
This video explains the everyday use of computer networks.
r/>
This clip is from the chapter "What is a Computer Network?" of the series "World of Computer Networking: Your CCNA start".This section introduces you to the concept...
r/>
This clip is from the chapter "What is a Computer Network?" of the series "World of Computer Networking: Your CCNA start".This section introduces you to the concept...
Science360
Fishy business
In episode 47, Jordan and Charlie explore how scientists at the University of Texas at Austin have solved the longstanding mystery about how some fish “disappear” from their predators. A fish’s ability to go invisible in polarized light...