Sort by

Newest

Oldest

Popular

NumPy Arrays & Statistics in Python | Mean, Variance, Axis Explained | FDP Day 3
01:48:48
Drivers of Big Data Explained | Social Media, IoT, Cloud & Mobile Data | Big Data Tutorial
00:15:20
Python Installation & NumPy Tutorial | Setup Data Science Environment | FDP Day 2 | Scikit-learn
01:33:01
Introduction to Big Data Platform | Architecture, Components & Real-World Example
00:22:50
History of Big Data Innovation | Evolution of Big Data & Hadoop | Big Data Timeline Explained
00:16:50
Data Science ML & AI FDP – Day 1 | Basics of Data Science & Artificial Intelligence
01:25:33
Introduction to Big Data | What is Big Data? Types of Digital Data Explained | AKTU BCS061
00:20:16
Big Data Syllabus Explained | AKTU BCS061 Big Data Course Overview | Hadoop, HDFS, Spark
00:11:01
IoT-Powered Smart Ecosystems 🌍 | Smart Cities, Agriculture & Hospitality | Expert Webinar 2026
01:11:27
Impersonation & Hoaxes Explained | Social Engineering Attacks, Deepfakes, BEC & Cyber Deception
00:07:59
Shoulder Surfing & Dumpster Diving Explained | Real-Life Cybersecurity Attacks You Must Know
00:01:01
Social Engineering Tactics Explained | Authority, Urgency, Trust & Psychological Attacks
00:02:53
Social Engineering Attacks Explained | Pretexting, Quid Pro Quo & Identity Fraud
00:01:13
Threat Intelligence & Research Sources Explained | CVE, Dark Web, IOC & AIS
00:01:28
Backdoors & Rootkits Explained | How Hackers Gain Hidden Access | Cybersecurity Threats
00:01:22
Threat Complexity Explained | Advanced Persistent Threats, Algorithm Attacks & Cybersecurity Risks
00:01:16
Threats to Applications | Application Security Risks, Vulnerabilities & Data Loss
00:00:44
Threats to Public Cloud Security | SaaS, PaaS & IaaS Risks Explained
00:01:11
Threats to Private Cloud Security | Private Cloud Attacks, Risks & Vulnerabilities Explained
00:00:41
Threats to Local Area Network (LAN) | LAN Security Risks, Attacks & Misconfigurations
00:00:58
Threats to Devices Explained | Cybersecurity Risks, Malware, USB Attacks & Outdated Software
00:01:01
Cisco Packet Tracer Logical & Physical Mode Explained | CCNA Tutored Activity Step-by-Step
00:06:01
Getting Started with Cisco Packet Tracer | Complete Beginner Guide for CCNA & Networking
00:13:15
Reinforcement Learning Explained (Advanced): MDPs, Q-Learning, DQN, PPO & Real-World Applications
00:10:24
How DNS Works Step by Step | DNS Explained with Diagram (Beginner Friendly)
00:03:34
📢 AI-Enhanced Pedagogy: Re-imagining Your Classroom with Adaptive Insights 📢 | Day 8
01:48:16
Session 3 | Impact of Security Models (IT Infrastructure & Information) | CIA Triad | Cyber Security
01:34:42
Natural Language Processing (NLP) Full Course | NLP Explained from Basics to Advanced | AI & ML
00:06:21
Course Structure | Complete Networking & CCNA Roadmap | Beginner to Advanced
00:02:38
IPv6 Overview Explained | Why IPv6 Was Introduced | IPv6 vs IPv4 | Networking Basics
00:02:32