Instructional Video6:11
Curated Video

Disaster Recovery Planning: Ensuring Business Continuity

Higher Ed
Business continuity ensures that business processes can continue despite interruptions. Continuity of Operations (COOP), Disaster Recovery Plans (DRPs), as well as hot, warm, and cold alternate sites are discussed. This clip is from...
Instructional Video23:22
IDG TECHtalk

What is quantum computing? Its evolution, uses cases and how to access it

Higher Ed
You may have heard of quantum computing, but what is it, and what problems can it solve? Plus, what makes quantum computing different from classical computing, and how can enterprises access and harness the technology? Serdar Yegulalp,...
Instructional Video25:38
The Wall Street Journal

Anticipating the Next Big Security Threat

Higher Ed
Cybersecurity experts Cheryl Davis and David Koh speak with WSJ Senior Editor Yun-Hee Kim about emerging security threats and how to protect businesses from cyberattacks.
Instructional Video10:57
Curated Video

Describe the different types of malware that could affect a computer system or network : Backdoors

Higher Ed
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Instructional Video5:00
Curated Video

Animation and Persistence of Vision

Pre-K - Higher Ed
Animation is a common effect used in cartoons and videos that allows us to perceive movement in still images. Let's look at some common animation techniques to see how they trick our minds. Illusions part 6/11
Instructional Video17:06
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy - Segment 7

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Instructional Video5:59
Curated Video

Bug Bounty Program Certification 3.1: Overview of Preparation Steps

Higher Ed
In this video, we will have a look at the preparation steps. • Explore various technologies • Learn about ports and services information • Explore vulnerability scanning and tools
Instructional Video8:39
Programming Electronics Academy

Arduino Toolchain: Arduino Course 2.7

Higher Ed
A high level description of the software tools used to get the code you write on an Arduino board.
Instructional Video2:34
Science360

Visualization Wall

12th - Higher Ed
A giant video screen that takes up an entire wall, floor to ceiling, is allowing scientists to see details they've never seen before. Developed at Tufts University with help from the National Science Foundation, the Visualization Wall...
Instructional Video7:59
Curated Video

Ensemble Machine Learning Techniques 3.3: Making Predictions on Movie Ratings Using SVM

Higher Ed
In this video, we will use Python to implement the Bagging technique using SVM. • We will use Jupyter Notebook to execute our code • Use Movie Rating to perform classification • Implement Bagging in python for classification
Instructional Video5:36
Curated Video

Learning D3.JS 5.0 6.1: Get Started with Bars

Higher Ed
In this video, we will learn how to create a basic bar graph. • Understand the code and add more code to the given files • Understand how it’s done manually and how it’s done on D3.js • View the result with the developers’ tools
Instructional Video12:07
All In One Social Media

The COMPLETE Real Estate Agent's Live Streaming Guide (2021)

Higher Ed
In a world where human interaction is discouraged and digital mediums thrive, this video will give the complete live streaming guide for Real Estate Agents!
Instructional Video5:55
Curated Video

Describe the different types of malware that could affect a computer system or network : Downloaders

Higher Ed
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Instructional Video3:24
Curated Video

Describe cyber attacks that could affect a computer system or network : Overview of Network Security

Higher Ed
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Instructional Video2:20
APMonitor

Introduction to OT Cybersecurity

10th - Higher Ed
Cybersecurity is the protection of networks and computer systems, including hardware and software, against cyberattacks. Of particular interest to engineers is the computer control of physical systems that monitor and control...
Instructional Video6:27
Curated Video

Bug Bounty Program Certification 11.1: About Android App Frontend Penetration

Higher Ed
In this video, you will learn about Android app frontend penetration overview. • Explore frontend penetration techniques • Understand the process of frontend penetration • Learn about the goals of frontend penetration
Instructional Video2:32
Curated Video

Bug Bounty Program Certification 1.1: The Course Overview

Higher Ed
This video provides an overview of the entire course.
Instructional Video8:30
Packt

Compare the breadth-first and depth-first search algorithms : Installation and Setup

Higher Ed
From the section: Shortest Time Search (Depth First Search). Set up the environment, download and install the required libraries required for this title. • Download python, Graphviz, and Pip. • Run the installer and install these...
Instructional Video21:26
The Wall Street Journal

CEOs Of Automation Anywhere And UiPath On Robotic Process Automation

Higher Ed
Daniel Dines and Mihir Shukla discuss how to get the most out of business process automation investments.
Instructional Video13:27
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Software development methodologies part 2

Higher Ed
CISM Domain 1: Information Security Governance: Software development methodologies part 2 This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security...
Instructional Video16:34
National Institute of Standards and Technology

Vint Cerf: The past, present and future of the internet

9th - 12th
Donna Dodson, Associate Director and Chief Cyber Security Advisor, and Vint Cerf, Chief Internet Evangelist for Google and former NIST VCAT member, have a wide-ranging discussion about the past, present and future of the internet,...
Instructional Video5:42
Curated Video

Tips, Tricks, and Techniques for Node.js Development 5.4: Node Process Manager

Higher Ed
In this video, we will see how to use a process manager to keep our Node.js applications up and running. • Get an introduction to node process manager • Show strongloop • Show pm2
Instructional Video3:39
Curated Video

Predictive Analytics with TensorFlow 9.2: Implementing an RNN for Spam Prediction

Higher Ed
We will see how to implement an RNN in TensorFlow to predict spam/ham from texts. • Construct RNN network • Perform the training • Plot accuracy over time
Instructional Video12:15
Programming Electronics Academy

Which Arduino IDE should I use?

Higher Ed
Did you know that the Arduino company provides for free three different tools for programming your Arduino board? They're called Integrated Development Environments or IDEs. If you're trying to figure out which one you should use, then...