1  Game Maker Introduction
Richard Gent
1 Game Maker Introduction
7:12
4.  Player Objects and platforming controls
Richard Gent
4. Player Objects and platforming controls
36:33
3.  Tilemaps and Rooms
Richard Gent
3. Tilemaps and Rooms
18:52
6.  Asteroid ship control scheme
Richard Gent
6. Asteroid ship control scheme
13:22
2  Sprites In GameMaker
Richard Gent
2 Sprites In GameMaker
13:13
5.  Dungeon crawler control scheme
Richard Gent
5. Dungeon crawler control scheme
9:15
Boolean Algebra laws
Richard Gent
Boolean Algebra laws
10:02
The operating system kernel
Richard Gent
The operating system kernel
13:38
Organisational security for network security
Richard Gent
Organisational security for network security
3:16
Physical Security for securing a networked system
Richard Gent
Physical Security for securing a networked system
3:36
Policies and Procedures for network security
Richard Gent
Policies and Procedures for network security
7:17
Risk Assessment and reduction of network security issues
Richard Gent
Risk Assessment and reduction of network security issues
5:47
User Responsibilities for network users
Richard Gent
User Responsibilities for network users
5:02
Education of Staff for Network security
Richard Gent
Education of Staff for Network security
5:09
Multi User Operating Systems
Richard Gent
Multi User Operating Systems
3:51
Utility, Application, proprietary and open source software
Richard Gent
Utility, Application, proprietary and open source software
19:51
Week 4, P3 introduction video
Richard Gent
Week 4, P3 introduction video
6:10
Single user operating systems
Richard Gent
Single user operating systems
5:31
Operating system security features
Richard Gent
Operating system security features
5:02
Factors affecting the choice of operating systems
Richard Gent
Factors affecting the choice of operating systems
8:30
Real Time Operating Systems
Richard Gent
Real Time Operating Systems
2:42
Operating systems, an overview
Richard Gent
Operating systems, an overview
5:11
Operating systems user Interfaces
Richard Gent
Operating systems user Interfaces
5:20
Factors affecting choice of hardware
Richard Gent
Factors affecting choice of hardware
21:34
Dos (Denial of Service) Attack
Richard Gent
Dos (Denial of Service) Attack
3:58
Port Scanning and Idle Scanning
Richard Gent
Port Scanning and Idle Scanning
4:50
How to add a background image
Richard Gent
How to add a background image
6:49
How to add multiple background images
Richard Gent
How to add multiple background images
6:33
Week 3, Intrusion Detection Systems
Richard Gent
Week 3, Intrusion Detection Systems
14:47
Computer based threats and IP addresses
Richard Gent
Computer based threats and IP addresses
17:31
Wiretapping
Richard Gent
Wiretapping
2:40
Creating a basic form
Richard Gent
Creating a basic form
4:51
Smurf Attacks
Richard Gent
Smurf Attacks
5:37
SQL Injection attacks
Richard Gent
SQL Injection attacks
5:26
ARP Spoofing
Richard Gent
ARP Spoofing
17:45
How to add text in front of images
Richard Gent
How to add text in front of images
10:49
Cloud Computing Risks
Richard Gent
Cloud Computing Risks
5:23
Week 3, web architecture
Richard Gent
Week 3, web architecture
27:23
Week 2, protecting a network
Richard Gent
Week 2, protecting a network
24:33
Week 3, video 2, storage devices
Richard Gent
Week 3, video 2, storage devices
4:19
Week 3, video 4, NAS
Richard Gent
Week 3, video 4, NAS
2:09
Week 3, video 3, RAID
Richard Gent
Week 3, video 3, RAID
16:25
Wireshark Demo
Richard Gent
Wireshark Demo
6:08
Week 3, video 1, input and outputs
Richard Gent
Week 3, video 1, input and outputs
7:44
Week 1, network threats
Richard Gent
Week 1, network threats
22:43
Recent network threats video
Richard Gent
Recent network threats video
4:49
The CPU, an overview
Richard Gent
The CPU, an overview
6:15
Motherboards
Richard Gent
Motherboards
6:09
week 2 web coding intro
Richard Gent
week 2 web coding intro
22:08
Web coding: Hyperlinks
Richard Gent
Web coding: Hyperlinks
5:30
Hard drives (HDD's)
Richard Gent
Hard drives (HDD's)
8:40
Internal components overview
Richard Gent
Internal components overview
7:00
Web coding: Arranging text
Richard Gent
Web coding: Arranging text
6:24
Web coding: Moving and arranging images
Richard Gent
Web coding: Moving and arranging images
14:15
Solid State Drives (SSD's)
Richard Gent
Solid State Drives (SSD's)
3:59
Cache
Richard Gent
Cache
3:40
Multi-functional device components
Richard Gent
Multi-functional device components
4:40
Backing Storage
Richard Gent
Backing Storage
4:08
Folder structure with images
Richard Gent
Folder structure with images
2:49
Random Access Memory (RAM), An overview
Richard Gent
Random Access Memory (RAM), An overview
3:14
Flash Memory
Richard Gent
Flash Memory
2:10
Mobile Device components
Richard Gent
Mobile Device components
4:49
Making your first HTML page
Richard Gent
Making your first HTML page
17:11
Other types of attacks
Richard Gent
Other types of attacks
1:36
Network system security week 1
Richard Gent
Network system security week 1
11:24
Website development hardware and software components
Richard Gent
Website development hardware and software components
36:08
Types of Computer systems
Richard Gent
Types of Computer systems
19:17
Denial of Service attacks, an overview
Richard Gent
Denial of Service attacks, an overview
3:11
Spoofing, A brief overview
Richard Gent
Spoofing, A brief overview
1:56
Trojan Horses, A brief overview
Richard Gent
Trojan Horses, A brief overview
3:00
Adware Explained
Richard Gent
Adware Explained
3:04
Mathematical attacks, a brief overview
Richard Gent
Mathematical attacks, a brief overview
4:49