Hi, what do you want to do?
Curated Video
All-in-one Metasploit Framework
This video will explain the powerful metasploit framework
Curated Video
Lab 1 Introduction to LTSpice -Task 0
Basics of Power Electronics - Walid Issa Lab 1 Introduction to LTSpice
Curated Video
Introduction to Metasploit
In this video, you will learn the building blocks and the basics of the powerful Metasploit framework, developed by Rapid7. Use Metasploit ethically !!!
Curated Video
Importance of Cyber Security
The video explains the importance of cyber security in a connected world
Packt
Hands-On Continuous Integration and Automation with Jenkins - What Is CI/CD?
This video explains what Continuous Integration, Continuous Delivery, and Continuous Deployment are, how they compare, and which benefits they bring • Learn Continuous Integration • Find out Continuous Delivery and Continuous Deployment...
Curated Video
Introduction to Cloud Computing - What is SAAS , PAAS, and IAAS
This video explains SAAS, PAAS, and IAAS. This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
Packt
Hands-On Continuous Integration and Automation with Jenkins - Install Jenkins with Docker
This video shows how to install Jenkins with Docker. • Describe what is Docker • Install Jenkins with Docker This clip is from the chapter "Install Jenkins" of the series "Hands-On Continuous Integration and Automation with Jenkins".In...
Packt
Hands-On Continuous Integration and Automation with Jenkins - Install Jenkins on macOS
This video shows how to install Jenkins on macOS. • Describe options to install Jenkins on macOS • Install Jenkins using brew This clip is from the chapter "Install Jenkins" of the series "Hands-On Continuous Integration and Automation...
Curated Video
Structural Design Patterns in Modern C++ - Course Overview
This video introduces you to the course. This clip is from the chapter "Introduction" of the series "Structural Design Patterns in Modern C++".This section introduces you to design patterns and Unified Modeling Language (UML) class...
Curated Video
Linux Fundamentals - Possible Options to Use Linux on macOS and Windows
This video explains the possible options to use Linux on macOS and Windows. This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by...
Curated Video
Linux Fundamentals - Introduction
This video provides an introduction to Linux. This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux on macOS...
Curated Video
How to Analyze a Cyber Attack
Traditional information security attack analysis focuses on malware and computer intrusions, in which an attacker utilizes technical prowess to exploit a vulnerability to gain access to or harm a system (or network).
Curated Video
Introduction to IT and Cybersecurity: Software Licensing
Part 9/16 of Introduction to IT and Cybersecurity series: This video discusses software licensing and the different schemes applied in on-premise and on-cloud environments. It also outlines the types of licenses available, including...
Curated Video
How to Protect Your Data
This video introduces different techniques on how to protect your data
Curated Video
Introduction to IT and Cybersecurity: Application Development Techniques
Part 8/16 of Introduction to IT and Cybersecurity series : This video discusses application development techniques for end users and programmers. It explains the concept of end user development, which is where people who are not...
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - Cloud HSM Overview
This video provides an overview of AWS CloudHSM. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about Amazon Web Services (AWS)...
Curated Video
Configuration management control
In this video, we will be discussing the importance of configuration management control in software development. Configuration management control is the process of identifying, organizing, and controlling changes to software and hardware...
Curated Video
Secure coding control
In this video, we will be discussing the importance of secure coding control. With the increasing number of cyber attacks and data breaches, it is crucial for developers to implement secure coding practices to protect sensitive...
Curated Video
Robots compete in 'mission to Mars'
LEAD IN:It's not been long since European countries were competing on the Eurovision Song Contest stage. Well now they're competing on Mars ... sort of.At Innorobo, one of Europe's leading robotics events, teams from across the continent...
Curated Video
Predictive Analytics with TensorFlow 1.4: Vectors, Matrices, and Graphs
We will discuss vectors, metrics, and tensors, which are some fundamental topics for learning predictive analytics. • Understand vectors and matrices • Find transpose of matrix
Curated Video
Predictive Analytics with TensorFlow 4.2: From Disaster to Decision –Titanic Example Revisited
In this video, we will see how we could develop several predictive models for Titanic survival prediction and do some analytics using them. In particular, we will discuss logistic regression, random forest, and linear SVM. We start with...
Curated Video
Predictive Analytics with TensorFlow 4.1: Supervised Learning for Predictive Analytics
In this video, we will see a type of machine learning process that is supervised learning. We will also see linear regression. We will use it for movie rating prediction. • See the spam filtering example • Use linear regression for movie...
Math Fortress
Calculus III: The Dot Product (Level 7 of 12)
This video goes over the dot product also known as the scalar product. This video goes over 3 challenging examples that require the use of dot product.
Fun Robotics
Classification Applications
Introducing class 5 and Exploring the Different Applications of Classification