Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Encrypting Mass Storage
Securing mass storage is a critical aspect of system security. Make sure you know the many ways a system's mass storage can be encrypted. This clip is from the chapter "Implementing Mass Storage" of the series "CompTIA A+ Certification...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Wireless Encryption
Everything on an unencrypted (open) wireless network is easily intercepted by anyone with the right capture tools. Over the years, 80 2.11 has developed three different encryption standards, each with its own idiosyncrasies, strengths,...
One Minute History
198 - Code Talkers - One Minute History
In the heat of battle, knowledge is power. Messages must be sent and received quickly, accurately and if you plan on winning, they need to be encoded. October 1918 (World War I) France - Native American men from Oklahoma organize a...
One Minute History
199 - Navajo Code Talkers - One Minute History
On the morning of May 4, 1942, twenty nine Navajo men boarded a bus at Ft. Defiance, Arizona bound for Marine Corps training camp. These men were tasked with creating a code based on the complex, unwritten Navajo language. The Navajo...
Curated Video
Learn Azure Serverless Functions in a Weekend - Deploy Azure Service Bus
This video helps deploy Azure Service Bus. This clip is from the chapter "Azure Service Bus" of the series "Learn Azure Serverless Functions in a Weekend".This section focuses on Azure Service Bus.
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Encrypting Mass Storage
Securing mass storage is a critical aspect of system security. Make sure you know the many ways a system's mass storage can be encrypted. This clip is from the chapter "Book Chapter 9 - Implementing Mass Storage" of the series "CompTIA...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - It's a Huge Mesh
Mesh networking is here and gaining in popularity daily. But what does mesh networking do for your 80 2.11 network? Where do you use it and how is it deployed? This clip is from the chapter "Book Chapter 20 - Wireless Networking" of the...
Curated Video
CISSP Crash Course - Secure Communication
This video explains how to implement secure communication. This clip is from the chapter "Communication and Network Security" of the series "CISSP Crash Course".This section covers domain 4, which focuses on communication and network...
Curated Video
CISSP Crash Course - Cryptanalytic Attacks
This video explains cryptographic attacks and malware attacks such as Ransomware. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture...
Curated Video
CISSP Crash Course - Cryptographic Solutions
This video explains cryptographic systems—asymmetric encryption and RSA algorithm. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Curated Video
CISSP Crash Course - Asset Handling
This video explains information, asset handling, and how to deal with data. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and...
Curated Video
CISSP Crash Course - Security Governance
This video explains security policy and how to apply security governance. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Curated Video
CISSP Crash Course - Information Assets
This video explains information assets and data classification. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Curated Video
HashiCorp Certified - Vault Associate Course - Vault Initialization
This video explains the process of initializing HashiCorp Vault, which is a one-time process that sets up the initial configuration and encryption key for Vault. You will need to initialize Vault when it is first provisioned, so this...
Curated Video
HashiCorp Certified - Vault Associate Course - Benefits and Use Cases of Vault
This video outlines the benefits and various use cases of HashiCorp Vault. Learn all the cool things that Vault has to offer organizations that decide to use it to protect their secrets and other data. This clip is from the chapter...
Curated Video
Getting Started with HashiCorp Nomad - Demo - Secure Gossip Encryption
We will continue securing our Nomad infrastructure in this demonstration by enabling gossip encryption on our servers. We will modify our configuration file, define the server configuration, and add the encrypt parameter. This clip is...
Curated Video
HashiCorp Certified - Vault Associate Course - Lab—Transit Secrets Engine
This is a lab video on Transit Secrets Engine. This clip is from the chapter "Compare and Configure Secrets Engines" of the series "HashiCorp Certified - Vault Associate Course".null
Curated Video
HashiCorp Certified - Vault Associate Course - Using the Transit Secrets Engine
This video will cover how to use the Transit Secrets Engine in Vault to securely encrypt and decrypt data at rest. This clip is from the chapter "Compare and Configure Secrets Engines" of the series "HashiCorp Certified - Vault Associate...
Curated Video
HashiCorp Certified - Vault Associate Course - Encrypting Data with the Transit Secrets Engine
In this video, we will explore the Transit Secrets Engine in Vault, which provides a way to encrypt data in transit. We will also talk about its features and how to use it. This clip is from the chapter "Compare and Configure Secrets...
Curated Video
Oracle Database Administration from Zero to Hero - Using Oracle Data Pump (Part 3 of 3)
In this video, we will continue our exploration of Oracle Data Pump. You will discover the essential parameters for importing data using Data Pump and learn how to implement parallelism to enhance the performance of your Data Pump...
Curated Video
How to Make Simple a Secret Decoder
People have been using codes throughout history to keep their messages private and my two little spies needed a way to sent their secret messages to each other too. So I came up with this simple paper plate decoder for them to have fun.
Curated Video
AWS Tutorial AWS Solutions Architect and SysOps Administrator - Secrets Manager Use Cases
This video demonstrates Secrets Manager use cases. This clip is from the chapter "Secrets Manager - Rotate, Manage, and Retrieve Secrets Through Their Lifecycle" of the series "AWS Tutorial: AWS Solutions Architect and SysOps...
Curated Video
AWS Tutorial AWS Solutions Architect and SysOps Administrator - S3 Encryption
This video talks about S3 encryption. This clip is from the chapter "Key Management Service - Generate and Manage AWS Encryption Keys" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section focuses on...
Curated Video
AWS Tutorial AWS Solutions Architect and SysOps Administrator - EBS Volume Encryption
This video explains EBS volume encryption. This clip is from the chapter "Key Management Service - Generate and Manage AWS Encryption Keys" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section...