PLASU   Scheduling online meeting or Virtual Class using google meet
MERSAT DIGITAL SOLUTIONS
PLASU Scheduling online meeting or Virtual Class using google meet
5:59
How to Schedule virtual Meetings and Take Online Classeses using google Meet
MERSAT DIGITAL SOLUTIONS
How to Schedule virtual Meetings and Take Online Classeses using google Meet
9:12
AYM PBNC   KANTAU   JENGRE HOSPITAL 2025 REPORT
MERSAT DIGITAL SOLUTIONS
AYM PBNC KANTAU JENGRE HOSPITAL 2025 REPORT
4:38
PLASU ICT Students Portal Tutorials    course reg, exam card, profile etc
MERSAT DIGITAL SOLUTIONS
PLASU ICT Students Portal Tutorials course reg, exam card, profile etc
10:18
PLASU Student Challenge in Printing Exam Card
MERSAT DIGITAL SOLUTIONS
PLASU Student Challenge in Printing Exam Card
3:39
AMS103   Introduction to Data Processing
MERSAT DIGITAL SOLUTIONS
AMS103 Introduction to Data Processing
26:17
Computer Operations & Internet Basics, emails and online safty
MERSAT DIGITAL SOLUTIONS
Computer Operations & Internet Basics, emails and online safty
45:36
PROBLEMS OF MIS (Managment Information System)
MERSAT DIGITAL SOLUTIONS
PROBLEMS OF MIS (Managment Information System)
22:48
PT   Configure Router on a Stick Inter VLAN Routing
MERSAT DIGITAL SOLUTIONS
PT Configure Router on a Stick Inter VLAN Routing
24:37
PT   Configure Layer 3 Switching and Inter VLAN Routing
MERSAT DIGITAL SOLUTIONS
PT Configure Layer 3 Switching and Inter VLAN Routing
29:07
PT   Configure Trunks and assign native vlan to trunk ports
MERSAT DIGITAL SOLUTIONS
PT Configure Trunks and assign native vlan to trunk ports
13:39
PT   VLAN Configuration   How to create VLAN and Assign ports to the VLAN
MERSAT DIGITAL SOLUTIONS
PT VLAN Configuration How to create VLAN and Assign ports to the VLAN
19:25
1.1.7 Part2 CISCO CCNA2 PT Activity Basic Switch Configuration   Physical Mode PART2
MERSAT DIGITAL SOLUTIONS
1.1.7 Part2 CISCO CCNA2 PT Activity Basic Switch Configuration Physical Mode PART2
54:19
CCNA2   Packet Tracer 1 3 6   Configure SSH
MERSAT DIGITAL SOLUTIONS
CCNA2 Packet Tracer 1 3 6 Configure SSH
17:14
CISCO CCNA2 Packet Tracer 3 6 1   Implement VLANs and Trunking
MERSAT DIGITAL SOLUTIONS
CISCO CCNA2 Packet Tracer 3 6 1 Implement VLANs and Trunking
36:53
1.1.7 Part1 CISCO CCNA2 PT Activity Basic Switch Configuration   Physical Mode PART1
MERSAT DIGITAL SOLUTIONS
1.1.7 Part1 CISCO CCNA2 PT Activity Basic Switch Configuration Physical Mode PART1
10:05
How to Write Moodle Quiz Exam
MERSAT DIGITAL SOLUTIONS
How to Write Moodle Quiz Exam
20:34
Introduction to Cybersecurity  Module 4  Protecting your organization
MERSAT DIGITAL SOLUTIONS
Introduction to Cybersecurity Module 4 Protecting your organization
45:18
Introduction to Cybersecurity Module 3
MERSAT DIGITAL SOLUTIONS
Introduction to Cybersecurity Module 3
27:28
Introduction to Cybersecurity   Module 2
MERSAT DIGITAL SOLUTIONS
Introduction to Cybersecurity Module 2
44:18
Introduction to Cybersecurity   Module 1
MERSAT DIGITAL SOLUTIONS
Introduction to Cybersecurity Module 1
37:03
Computer Software   Application, system & Utility software
MERSAT DIGITAL SOLUTIONS
Computer Software Application, system & Utility software
22:31
Computer Hardware   input, output, storage, processing and pheripherial hardware devices
MERSAT DIGITAL SOLUTIONS
Computer Hardware input, output, storage, processing and pheripherial hardware devices
33:36
Introduction to Computer   definitional characteristics of computer, Brief history of computer
MERSAT DIGITAL SOLUTIONS
Introduction to Computer definitional characteristics of computer, Brief history of computer
19:35
Introduction to Computer   Overview Course Outline
MERSAT DIGITAL SOLUTIONS
Introduction to Computer Overview Course Outline
11:15
CCNA1 Mod 13   ICMP
MERSAT DIGITAL SOLUTIONS
CCNA1 Mod 13 ICMP
1:08:54
Introduction to Microsoft 365 Applications: how to access all the applications from your email
MERSAT DIGITAL SOLUTIONS
Introduction to Microsoft 365 Applications: how to access all the applications from your email
22:55
NBTE CCNA1 Module 8  Network Layer
MERSAT DIGITAL SOLUTIONS
NBTE CCNA1 Module 8 Network Layer
53:52
System Analysis & Design
MERSAT DIGITAL SOLUTIONS
System Analysis & Design
26:59
Data Processing   DAta storage and file organization
MERSAT DIGITAL SOLUTIONS
Data Processing DAta storage and file organization
16:04
Introduction to Data Processing, system analysis & design course
MERSAT DIGITAL SOLUTIONS
Introduction to Data Processing, system analysis & design course
22:24
Data Processing   Overview and Course Outline
MERSAT DIGITAL SOLUTIONS
Data Processing Overview and Course Outline
2:31
Module 10 Tools and Code Analysis
MERSAT DIGITAL SOLUTIONS
Module 10 Tools and Code Analysis
1:33:27
Module 8 Performing Post Exploitation Techniques
MERSAT DIGITAL SOLUTIONS
Module 8 Performing Post Exploitation Techniques
1:56:37
Module 9 Reporting and Communication
MERSAT DIGITAL SOLUTIONS
Module 9 Reporting and Communication
1:58:32
Ethical Hacker Module 7 Cloud, Mobile, and IoT Security
MERSAT DIGITAL SOLUTIONS
Ethical Hacker Module 7 Cloud, Mobile, and IoT Security
1:38:23
Ethical Hacker Module 6b Exploiting Application Based Vulnerabilities
MERSAT DIGITAL SOLUTIONS
Ethical Hacker Module 6b Exploiting Application Based Vulnerabilities
1:58:19
MIS  Characteristics of Management Information Systems MIS
MERSAT DIGITAL SOLUTIONS
MIS Characteristics of Management Information Systems MIS
19:56
Ethical Hacker Module 6a Exploiting Application Based Vulnerabilities
MERSAT DIGITAL SOLUTIONS
Ethical Hacker Module 6a Exploiting Application Based Vulnerabilities
1:31:00
MIS Chater 1   Introduction to Management Information Systems
MERSAT DIGITAL SOLUTIONS
MIS Chater 1 Introduction to Management Information Systems
15:59
MIS   General Ovew   Course outline
MERSAT DIGITAL SOLUTIONS
MIS General Ovew Course outline
4:50
Computer Application Chp 2   Computer Ethics   10 Commandmends of Computer
MERSAT DIGITAL SOLUTIONS
Computer Application Chp 2 Computer Ethics 10 Commandmends of Computer
15:19
Computer Application : Chapter 1  Review of Introduction to Computer
MERSAT DIGITAL SOLUTIONS
Computer Application : Chapter 1 Review of Introduction to Computer
24:55
Computer Application  Course   Overview
MERSAT DIGITAL SOLUTIONS
Computer Application Course Overview
2:12
Ethical Hacker Module 5a Exploiting Wired and Wireless Network
MERSAT DIGITAL SOLUTIONS
Ethical Hacker Module 5a Exploiting Wired and Wireless Network
1:44:48
Ethical Hacker Module 4a Social Engineering
MERSAT DIGITAL SOLUTIONS
Ethical Hacker Module 4a Social Engineering
29:12
Ethical Hacker module 4d Social Engineering
MERSAT DIGITAL SOLUTIONS
Ethical Hacker module 4d Social Engineering
17:28
Ethical Hacker module 4c Social Engineering
MERSAT DIGITAL SOLUTIONS
Ethical Hacker module 4c Social Engineering
7:42
Ethical Hacker Module 4b Social Engineering
MERSAT DIGITAL SOLUTIONS
Ethical Hacker Module 4b Social Engineering
50:55
Ethical Hacker module 4e Social Engineering
MERSAT DIGITAL SOLUTIONS
Ethical Hacker module 4e Social Engineering
14:46
Ethical Hacker Module 3b Information Gathering and Vulnerability Scanning
MERSAT DIGITAL SOLUTIONS
Ethical Hacker Module 3b Information Gathering and Vulnerability Scanning
48:26
Ethical Hacker Module 3a Information Gathering and Vulnerability Scanning
MERSAT DIGITAL SOLUTIONS
Ethical Hacker Module 3a Information Gathering and Vulnerability Scanning
20:49
Network Defense   Module 10 Network Security Data
MERSAT DIGITAL SOLUTIONS
Network Defense Module 10 Network Security Data
54:41
Network Defense:   Module 9  Technologies and Protocols
MERSAT DIGITAL SOLUTIONS
Network Defense: Module 9 Technologies and Protocols
53:14
Network Basics 06  Module 5: Communication principales   OSI Model & TCP IP model
MERSAT DIGITAL SOLUTIONS
Network Basics 06 Module 5: Communication principales OSI Model & TCP IP model
43:52
ISOC   Steps to Join ISOC Nigeria Chapter
MERSAT DIGITAL SOLUTIONS
ISOC Steps to Join ISOC Nigeria Chapter
3:24
ISOC Nigeria   How to Register and Enroll in a Course
MERSAT DIGITAL SOLUTIONS
ISOC Nigeria How to Register and Enroll in a Course
14:07
Endpoint Security Module 5 Wireless Network Communication
MERSAT DIGITAL SOLUTIONS
Endpoint Security Module 5 Wireless Network Communication
1:06:29
Endpoint Security Module 4b Attacking What We Do
MERSAT DIGITAL SOLUTIONS
Endpoint Security Module 4b Attacking What We Do
21:25
Endpoint Security Module 4 Attacking What We Do
MERSAT DIGITAL SOLUTIONS
Endpoint Security Module 4 Attacking What We Do
1:30:07
Endpoint Security Module 3b   Attacking the Foundation
MERSAT DIGITAL SOLUTIONS
Endpoint Security Module 3b Attacking the Foundation
16:10
Endpoint Security Module 3a   Attacking the Foundation
MERSAT DIGITAL SOLUTIONS
Endpoint Security Module 3a Attacking the Foundation
1:16:15
What is ISOC? What are the Membership Benefits? How can I become a Member?
MERSAT DIGITAL SOLUTIONS
What is ISOC? What are the Membership Benefits? How can I become a Member?
11:41
Network Defense   Module 8  Cryptography
MERSAT DIGITAL SOLUTIONS
Network Defense Module 8 Cryptography
51:34
Network Basics 04: Module3- Wireless and Mobile Networks
MERSAT DIGITAL SOLUTIONS
Network Basics 04: Module3- Wireless and Mobile Networks
26:57
Network Defense   Module 7 Cloud Security
MERSAT DIGITAL SOLUTIONS
Network Defense Module 7 Cloud Security
1:13:40
Network Defense   Module 5 Firewall Technologies, Module 6 Zone-Based Policy Firewalls
MERSAT DIGITAL SOLUTIONS
Network Defense Module 5 Firewall Technologies, Module 6 Zone-Based Policy Firewalls
1:17:41
Network Basics   Module 2   Network Components Types and Connections
MERSAT DIGITAL SOLUTIONS
Network Basics Module 2 Network Components Types and Connections
29:18
Network Defense :  Module 4b   Access Control List ACL
MERSAT DIGITAL SOLUTIONS
Network Defense : Module 4b Access Control List ACL
1:23:49
Network Basics  03 Module 1   Communications in a Connected World
MERSAT DIGITAL SOLUTIONS
Network Basics 03 Module 1 Communications in a Connected World
40:32
Network Basics   02   Introduction Overview
MERSAT DIGITAL SOLUTIONS
Network Basics 02 Introduction Overview
10:55
Network Basics   01   Welcome Mesage
MERSAT DIGITAL SOLUTIONS
Network Basics 01 Welcome Mesage
2:55
Endpoint Security: Module 2: Securing Networks
MERSAT DIGITAL SOLUTIONS
Endpoint Security: Module 2: Securing Networks
1:02:39
Endpoint Security: Module 1: Cybersecurity Threats, Vulnerabilities, and Attacks
MERSAT DIGITAL SOLUTIONS
Endpoint Security: Module 1: Cybersecurity Threats, Vulnerabilities, and Attacks
1:57:35
Network Defense : Module 4a: Access Control Lists (ACL)
MERSAT DIGITAL SOLUTIONS
Network Defense : Module 4a: Access Control Lists (ACL)
1:31:17
Network Defense: Module 3b  Access Control
MERSAT DIGITAL SOLUTIONS
Network Defense: Module 3b Access Control
1:19:19
Network Defense Module 3a   Access Control
MERSAT DIGITAL SOLUTIONS
Network Defense Module 3a Access Control
1:46:39
Ethical Hacking Module 2 Planning and Scoping a Penetration Testing Assessment
MERSAT DIGITAL SOLUTIONS
Ethical Hacking Module 2 Planning and Scoping a Penetration Testing Assessment
1:42:10
Ethical Hacking : Module 1: Introduction to Ethical Hacking and Penetration Testing
MERSAT DIGITAL SOLUTIONS
Ethical Hacking : Module 1: Introduction to Ethical Hacking and Penetration Testing
1:17:06
Network Defense: Module 2 System and Network Defense
MERSAT DIGITAL SOLUTIONS
Network Defense: Module 2 System and Network Defense
1:59:37
Network Defense Module1  Understanding Defense
MERSAT DIGITAL SOLUTIONS
Network Defense Module1 Understanding Defense
1:42:20