Instructional Video9:37
Curated Video

All-in-one Metasploit Framework

Higher Ed
This video will explain the powerful metasploit framework
Instructional Video3:02
Curated Video

Lab 1 Introduction to LTSpice -Task 0

Higher Ed
Basics of Power Electronics - Walid Issa Lab 1 Introduction to LTSpice
Instructional Video9:37
Curated Video

Introduction to Metasploit

Higher Ed
In this video, you will learn the building blocks and the basics of the powerful Metasploit framework, developed by Rapid7. Use Metasploit ethically !!!
Instructional Video7:01
Curated Video

Importance of Cyber Security

Higher Ed
The video explains the importance of cyber security in a connected world
Instructional Video6:45
Packt

Hands-On Continuous Integration and Automation with Jenkins - What Is CI/CD?

Higher Ed
This video explains what Continuous Integration, Continuous Delivery, and Continuous Deployment are, how they compare, and which benefits they bring • Learn Continuous Integration • Find out Continuous Delivery and Continuous Deployment...
Instructional Video4:55
Curated Video

Introduction to Cloud Computing - What is SAAS , PAAS, and IAAS

Higher Ed
This video explains SAAS, PAAS, and IAAS. This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
Instructional Video6:06
Packt

Hands-On Continuous Integration and Automation with Jenkins - Install Jenkins with Docker

Higher Ed
This video shows how to install Jenkins with Docker. • Describe what is Docker • Install Jenkins with Docker This clip is from the chapter "Install Jenkins" of the series "Hands-On Continuous Integration and Automation with Jenkins".In...
Instructional Video4:13
Packt

Hands-On Continuous Integration and Automation with Jenkins - Install Jenkins on macOS

Higher Ed
This video shows how to install Jenkins on macOS. • Describe options to install Jenkins on macOS • Install Jenkins using brew This clip is from the chapter "Install Jenkins" of the series "Hands-On Continuous Integration and Automation...
Instructional Video3:03
Curated Video

Structural Design Patterns in Modern C++ - Course Overview

Higher Ed
This video introduces you to the course. This clip is from the chapter "Introduction" of the series "Structural Design Patterns in Modern C++".This section introduces you to design patterns and Unified Modeling Language (UML) class...
Instructional Video1:40
Curated Video

Linux Fundamentals - Possible Options to Use Linux on macOS and Windows

Higher Ed
This video explains the possible options to use Linux on macOS and Windows. This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by...
Instructional Video3:36
Curated Video

Linux Fundamentals - Introduction

Higher Ed
This video provides an introduction to Linux. This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux on macOS...
Instructional Video8:09
Curated Video

How to Analyze a Cyber Attack

Higher Ed
Traditional information security attack analysis focuses on malware and computer intrusions, in which an attacker utilizes technical prowess to exploit a vulnerability to gain access to or harm a system (or network).
Instructional Video6:50
Curated Video

Introduction to IT and Cybersecurity: Software Licensing

Higher Ed
Part 9/16 of Introduction to IT and Cybersecurity series: This video discusses software licensing and the different schemes applied in on-premise and on-cloud environments. It also outlines the types of licenses available, including...
Instructional Video2:03
Curated Video

How to Protect Your Data

Higher Ed
This video introduces different techniques on how to protect your data
Instructional Video14:04
Curated Video

Introduction to IT and Cybersecurity: Application Development Techniques

Higher Ed
Part 8/16 of Introduction to IT and Cybersecurity series : This video discusses application development techniques for end users and programmers. It explains the concept of end user development, which is where people who are not...
Instructional Video2:25
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - Cloud HSM Overview

Higher Ed
This video provides an overview of AWS CloudHSM. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about Amazon Web Services (AWS)...
Instructional Video2:22
Curated Video

Configuration management control

Higher Ed
In this video, we will be discussing the importance of configuration management control in software development. Configuration management control is the process of identifying, organizing, and controlling changes to software and hardware...
Instructional Video1:17
Curated Video

Secure coding control

Higher Ed
In this video, we will be discussing the importance of secure coding control. With the increasing number of cyber attacks and data breaches, it is crucial for developers to implement secure coding practices to protect sensitive...
Instructional Video7:03
Curated Video

Robots compete in 'mission to Mars'

Higher Ed
LEAD IN:It's not been long since European countries were competing on the Eurovision Song Contest stage. Well now they're competing on Mars ... sort of.At Innorobo, one of Europe's leading robotics events, teams from across the continent...
Instructional Video5:10
Curated Video

Predictive Analytics with TensorFlow 1.4: Vectors, Matrices, and Graphs

Higher Ed
We will discuss vectors, metrics, and tensors, which are some fundamental topics for learning predictive analytics. • Understand vectors and matrices • Find transpose of matrix
Instructional Video14:33
Curated Video

Predictive Analytics with TensorFlow 4.2: From Disaster to Decision –Titanic Example Revisited

Higher Ed
In this video, we will see how we could develop several predictive models for Titanic survival prediction and do some analytics using them. In particular, we will discuss logistic regression, random forest, and linear SVM. We start with...
Instructional Video9:56
Curated Video

Predictive Analytics with TensorFlow 4.1: Supervised Learning for Predictive Analytics

Higher Ed
In this video, we will see a type of machine learning process that is supervised learning. We will also see linear regression. We will use it for movie rating prediction. • See the spam filtering example • Use linear regression for movie...
Instructional Video10:30
Math Fortress

Calculus III: The Dot Product (Level 7 of 12)

12th - Higher Ed
This video goes over the dot product also known as the scalar product. This video goes over 3 challenging examples that require the use of dot product.
Instructional Video2:08
Fun Robotics

Classification Applications

Higher Ed
Introducing class 5 and Exploring the Different Applications of Classification