Instructional Video4:05
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Privacy Attacks

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats.



The aim of this...
Instructional Video3:33
Curated Video

routing protocols : OSPF Hierarchy - Multiple areas

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols.



Routing Introduction: OSPF Hierarchy - Multiple...
Instructional Video6:34
Curated Video

Explain web security : What is Reconnaissance?

Higher Ed
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks.



The goal of this video is to get an overview of the first step of ethical...
Instructional Video2:32
Curated Video

Evaluate the impact of an AI application used in the real world. (case study) : Working with X-Ray images: Case Study - Part 2

Higher Ed
From the section: CNN-Industry Live Project: Find Medical Abnormalities and Save Life. This section includes a CNN-Industry live project on working with X-Ray images.



CNN-Industry Live Project: Find Medical Abnormalities and...
Instructional Video9:06
Curated Video

Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 2

Higher Ed
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images.



CNN-Industry Live Project: Playing with Real World Natural Images:...
Instructional Video4:13
Packt

Compare the breadth-first and depth-first search algorithms : Graph Data Structure

Higher Ed
From the section: Shortest Path Search (Breadth First Search). In this section, we will develop LinkedIn’s connection feature using Breadth First Search. We take the concepts of the earlier section forward and learn about queue and...
Instructional Video4:37
Curated Video

Call a function : Demo - String Operations

Higher Ed
From the section: Data Operations. In this section, you will learn about the different types of operators used in Python. This section will teach you the building blocks for any kind of operations in Python.



Data Operations:...
Instructional Video10:12
Packt

Introduction to computer hardware and software : USB Standards

Higher Ed
From the section: Essential Peripherals. In this section, we learn more about optical media, USB standard, configure USB’s for keyboard and mIce. The Universal Serial Bus (USB) interface is the main peripheral interface these days. Make...
Instructional Video10:57
Curated Video

Describe the different types of malware that could affect a computer system or network : Backdoors

Higher Ed
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Instructional Video4:16
Packt

Describe a data structure : What Are Data Structures and Why Are They Important?

Higher Ed
From the section: Introduction to Data Structures and Important Concepts. This section introduces Data Structures and important concepts of DS and explains why they are important



Introduction to Data Structures and Important...
Instructional Video2:23
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Attacks on Classification and How They Work

Higher Ed
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools.



The aim of this video is to describe why adversarial attacks...
Instructional Video3:05
Packt

Explain the negative impacts of artificial intelligence systems on society : Comparing Metrics and Choosing the Best Attack

Higher Ed
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Instructional Video3:59
Packt

Explain the negative impacts of artificial intelligence systems on society : PGD Attack Practical Configuration

Higher Ed
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see...
Instructional Video11:22
Curated Video

Test a computer program or algorithm : The On-success Block and Re-raising Exceptions

Higher Ed
From the section: Errors in Python. This section introduces you to errors in Python.<b<br/>r/>

This video explains the concept of on-success block and re-raising exceptions in Python.
Instructional Video9:01
Curated Video

Test a computer program or algorithm : Dealing with Python Errors

Higher Ed
From the section: Errors in Python. This section introduces you to errors in Python.<b<br/>r/>

This video shows how to deal with Python errors.
Instructional Video5:21
Curated Video

Implement a computer program using a classic algorithm : Project handoff: Bringing it together

Higher Ed
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc.



Design and build a project that utilizes the algorithms and tools that...
Instructional Video13:02
Curated Video

Evaluate two sorting or two search algorithms : Selection sort implementation

Higher Ed
From the section: Algorithms - Sort, performance, complexity and big O notation. This section is about Algorithms – sort, performance, complexity and big O notation.<b<br/>r/>

Implement the selection sort algorithm step by step
Instructional Video7:49
Packt

Introduction to computer hardware and software : Inside the PC

Higher Ed
From the section: The Visible Computer. In this section, we learn more about primary PC computer, external connections and learn more about computer. Geeks go into PC cases and this episode is a case in point, if you’ll pardon the pun....
Instructional Video11:09
Curated Video

Describe cyber attacks that could affect a computer system or network : Taking Control Over Target Browser with BeEf

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools.



In this video, we will learn about variety...
Instructional Video2:15
Curated Video

Describe computer programming : Section Goal

Higher Ed
From the section: Common Coding Concepts.This section will cover common coding concepts such as Scratch setup, bugs, pseudocode, decomposition, commenting and many more.



Common Coding Concepts: Se
ction Goal
• Use...
Instructional Video7:23
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Edge Detection and Gradient Calculations (Sobel, Laplace and Canny)

Higher Ed
From the section: Computer Vision Basics: Part 1. In this section, we’ll cover the basic features of Computer Vision.<b<br/>r/>

Computer Vision Basics: Part 1: [Activity] Edge Detection and Gradient Calculations (Sobel, Laplace and Canny)
Instructional Video17:56
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Introduction to Seaborn

Higher Ed
From the section: Python Crash Course [Optional]. In this section, we’ll continue diving into Python data structures with tuples and dictionaries, functions, Boolean Operations and Loops, and libraries like Pandas, MatPlotLib and...
Instructional Video2:35
Packt

Explain the negative impacts of artificial intelligence systems on society : DeepFool Attack Practical Configuration

Higher Ed
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see...
Instructional Video2:48
Curated Video

Evaluate the accuracy of an artificial intelligence system : Evaluate Accuracy of the DNN Model

Higher Ed
From the section: ANN & DNN With MXNet Package in R. This section is about ANN & DNN with MXNet Package in R.<b<br/>r/>

ANN & DNN With MXNet Package in R: Evaluate Accuracy of the DNN Model