diff --git a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/100-nfc.md b/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/100-nfc.md index 00d104f6f..af3245383 100644 --- a/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/100-nfc.md +++ b/src/data/roadmaps/cyber-security/content/100-basic-it-skills/101-connection-types/100-nfc.md @@ -35,4 +35,5 @@ To minimize the risks associated with NFC, follow these best practices: In conclusion, understanding the basics of NFC and adhering to security best practices will help ensure that you can safely and effectively use this innovative technology. - [The Beginner's Guide to NFCs](https://www.spiceworks.com/tech/networking/articles/what-is-near-field-communication/) -- [NFC Guide: All You Need to Know About Near Field Communication](https://squareup.com/us/en/the-bottom-line/managing-your-finances/nfc) \ No newline at end of file +- [NFC Guide: All You Need to Know About Near Field Communication](https://squareup.com/us/en/the-bottom-line/managing-your-finances/nfc) +- [NFC Explained: What is NFC? How NFC Works? Applications of NFC](https://youtu.be/eWPtt2hLnJk) \ No newline at end of file