Instructional Video4:26
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Backups

Higher Ed
In this video, you will learn about backups and how to make backups for your computer or files. The author also shares some tips on how to best use your backups. This clip is from the chapter "Personal Security" of the series "The...
Instructional Video9:11
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Protecting Yourself Against SIM Card Swap Fraud

Higher Ed
In this video, you will learn how to protect yourself against SIM card swap fraud. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section talks about...
Instructional Video7:37
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Two-Factor Authentications

Higher Ed
In this video, you will learn about two-factor authentication, which is used to add an extra layer of security when logging into an account. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to...
Instructional Video4:25
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Introduction to Password Managers

Higher Ed
In this video, you will be introduced to password manager tools such as LastPass or dashlane. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section...
Instructional Video12:13
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Password Management

Higher Ed
In this video, you will learn about password management and the need for using strong passwords to keep your system safe. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023...
Instructional Video10:08
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Understanding Malware and Anti-Malware Products

Higher Ed
In this video, you will learn about malware and the various anti-malware products. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section talks about...
Instructional Video3:43
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Securing Your Home Router

Higher Ed
In this video, you will learn how to enhance the security of your home router by discovering the IP address associated with it. Gain valuable insights on securing your router effectively. This clip is from the chapter "Internet and...
Instructional Video2:10
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Creating New Accounts and Logging In (DO NOT DO THIS)

Higher Ed
In this video, you will learn to create a new account and log in to Reddit. This clip is from the chapter "Internet and Browsing Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section delves...
Instructional Video8:01
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Using VPNs

Higher Ed
In this video, you will learn about a security tool called Virtual Private Network or a VPN, which is used to provide a secure connection to another network over the Internet. This clip is from the chapter "Internet and Browsing...
Instructional Video9:09
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Introduction to Cookies

Higher Ed
In this video, you will be introduced to web cookies, which are pieces of text stored by a web server on your hard disk. This clip is from the chapter "Internet and Browsing Security" of the series "The Absolute Beginners Guide to...
Instructional Video4:21
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - HTTP and HTTPS

Higher Ed
In this video, you will learn the difference between HTTP and HTTPS by looking at two different websites. This clip is from the chapter "Internet and Browsing Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 -...
Instructional Video9:36
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Browser Security - Brave Browser

Higher Ed
In this video, you will dive into the realm of browser security, focusing on the specific features and tools available for enhancing security while using the Brave Browser. This clip is from the chapter "Internet and Browsing Security"...
Instructional Video16:32
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Browser Security - Mozilla Firefox

Higher Ed
In this video, you will explore browser security specifically tailored for Mozilla Firefox. This clip is from the chapter "Internet and Browsing Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
Instructional Video6:39
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Internet Privacy Tools

Higher Ed
In this video, the author talks about a few tools that you might want to start using if you are going to take your privacy seriously online; one such tool that you will learn is the Brave browser. This clip is from the chapter "Internet...
Instructional Video3:46
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Welcome to the Course

Higher Ed
In this video, the author talks about what to expect from this course and explains why cybersecurity is important. This clip is from the chapter "Introduction" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part...
Instructional Video6:06
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Root User

Higher Ed
In operating systems, it is common to have a root or admin user. In AWS, a root user exists as well. You must understand this root user account and the implications it introduces to the management and use of AWS.
Instructional Video5:41
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Hands-On with FSx

Higher Ed
Let's explore what it looks like to actually set up an Amazon FSx file system in this video.
Instructional Video7:32
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Elastic Block Store (EBS)

Higher Ed
While S3 and Glacier can be used to store files, what do you do when you need storage for a virtual machine (an instance) in Amazon Web Services (AWS)? The answer is in the AWS Elastic Block Store (EBS) service. This video introduces the...
Instructional Video8:00
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - S3 Bucket Properties

Higher Ed
Each S3 bucket has a collection of properties associated with it. These properties are explored in this video.
Instructional Video7:16
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - S3 Storage Class

Higher Ed
S3 is the primary file or object storage service in Amazon Web Services (AWS). What can you do with S3? This video explains the basic concepts of S3 storage and management.
Instructional Video13:21
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Creating an S3 Bucket

Higher Ed
In this video, you will learn how to create storage in the cloud. You will learn to use the Simple Storage Service (S3) to store your data. You will learn to create an S3 bucket, upload data, and set up permissions.
Instructional Video4:50
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Use the System

Higher Ed
Be sure to use the system to your advantage as you work toward studying and passing your CSA-A exam.
Instructional Video8:07
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Redshift

Higher Ed
When you need a data warehouse solution, Redshift may be the answer. A custom-built database solution offered in AWS, Redshift works well on massive data stores and allows you to analyze it quickly.
Instructional Video7:57
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Database Security

Higher Ed
When implementing databases, it is important to consider security. Databases store data and data may be sensitive at varying levels. In this video, database security is explored.