Richard Gent
1 Game Maker Introduction
7:12
Richard Gent
4. Player Objects and platforming controls
36:33
Richard Gent
3. Tilemaps and Rooms
18:52
Richard Gent
6. Asteroid ship control scheme
13:22
Richard Gent
2 Sprites In GameMaker
13:13
Richard Gent
5. Dungeon crawler control scheme
9:15
Richard Gent
Boolean Algebra laws
10:02
Richard Gent
The operating system kernel
13:38
Richard Gent
Organisational security for network security
3:16
Richard Gent
Physical Security for securing a networked system
3:36
Richard Gent
Policies and Procedures for network security
7:17
Richard Gent
Risk Assessment and reduction of network security issues
5:47
Richard Gent
User Responsibilities for network users
5:02
Richard Gent
Education of Staff for Network security
5:09
Richard Gent
Multi User Operating Systems
3:51
Richard Gent
Utility, Application, proprietary and open source software
19:51
Richard Gent
Week 4, P3 introduction video
6:10
Richard Gent
Single user operating systems
5:31
Richard Gent
Operating system security features
5:02
Richard Gent
Factors affecting the choice of operating systems
8:30
Richard Gent
Real Time Operating Systems
2:42
Richard Gent
Operating systems, an overview
5:11
Richard Gent
Operating systems user Interfaces
5:20
Richard Gent
Factors affecting choice of hardware
21:34
Richard Gent
Dos (Denial of Service) Attack
3:58
Richard Gent
Port Scanning and Idle Scanning
4:50
Richard Gent
How to add a background image
6:49
Richard Gent
How to add multiple background images
6:33
Richard Gent
Week 3, Intrusion Detection Systems
14:47
Richard Gent
Computer based threats and IP addresses
17:31
Richard Gent
Wiretapping
2:40
Richard Gent
Creating a basic form
4:51
Richard Gent
Smurf Attacks
5:37
Richard Gent
SQL Injection attacks
5:26
Richard Gent
ARP Spoofing
17:45
Richard Gent
How to add text in front of images
10:49
Richard Gent
Cloud Computing Risks
5:23
Richard Gent
Week 3, web architecture
27:23
Richard Gent
Week 2, protecting a network
24:33
Richard Gent
Week 3, video 2, storage devices
4:19
Richard Gent
Week 3, video 4, NAS
2:09
Richard Gent
Week 3, video 3, RAID
16:25
Richard Gent
Wireshark Demo
6:08
Richard Gent
Week 3, video 1, input and outputs
7:44
Richard Gent
Week 1, network threats
22:43
Richard Gent
Recent network threats video
4:49
Richard Gent
The CPU, an overview
6:15
Richard Gent
Motherboards
6:09
Richard Gent
week 2 web coding intro
22:08
Richard Gent
Web coding: Hyperlinks
5:30
Richard Gent
Hard drives (HDD's)
8:40
Richard Gent
Internal components overview
7:00
Richard Gent
Web coding: Arranging text
6:24
Richard Gent
Web coding: Moving and arranging images
14:15
Richard Gent
Solid State Drives (SSD's)
3:59
Richard Gent
Cache
3:40
Richard Gent
Multi-functional device components
4:40
Richard Gent
Backing Storage
4:08
Richard Gent
Folder structure with images
2:49
Richard Gent
Random Access Memory (RAM), An overview
3:14
Richard Gent
Flash Memory
2:10
Richard Gent
Mobile Device components
4:49
Richard Gent
Making your first HTML page
17:11
Richard Gent
Other types of attacks
1:36
Richard Gent
Network system security week 1
11:24
Richard Gent
Website development hardware and software components
36:08
Richard Gent
Types of Computer systems
19:17
Richard Gent
Denial of Service attacks, an overview
3:11
Richard Gent
Spoofing, A brief overview
1:56
Richard Gent
Trojan Horses, A brief overview
3:00
Richard Gent
Adware Explained
3:04
Richard Gent
Mathematical attacks, a brief overview
4:49