Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Authentication
AWS provides two primary authentication methods (though more can be implemented) and these are covered in this video. Additionally, you will learn the basics of authentication.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Principals
With any identity and access management solution, it is essential to understand the principal that can be managed, such as users and groups. This video introduces you to the principals you will manage in AWS.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Services, Part 2
This video continues the Amazon Web Services (AWS) offerings tour, finishing up where we left off in the previous video. By the end of this video, you will have a birds-eye view of the AWS services.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Organizations
Over time, you may find that you have multiple AWS accounts. The IAM solution will be managed separately for each account by default. However, you can use AWS organizations to bring them all together and this video shows you how.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Cognito
What can you do if you want to integrate a local Active Directory or another identity management system with AWS? The answer is found in Cognito, an AWS solution for user identity and data synchronization or single sign-on (SSO).
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Amazon STS
The Amazon Security Token Service (STS) allows for secure communications and access between AWS services, such as between an EC2 instance and S3. You will learn about this service in this video.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - User Accounts
As we move forward with a foundational understanding of IAM from chapter 7, we will begin exploring practical application in this chapter. Here in video one, we will discuss best practices and tasks involved in user account creation and...
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - AWS Security Hub
AWS Security Hub offers a single console for a number of useful security options in AWS, including IDS with Amazon GuardDuty, vulnerability scans with Amazon Inspector, and automatic policy compliance scans with Amazon Macie.
Curated Video
The Modern Spy: How Your Daily Devices Can Be Compromised
In an age where technology is intertwined with daily life, learn how easily your devices can be hacked and used for spying. From mobile phones to computers, discover the methods used by modern spies to infiltrate your privacy. Follow...
Curated Video
CISSP Crash Course - Authentication System
This video explains the SSO on the Internet and networks, as well as OPENID and OAUTH. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on...
Curated Video
CISSP Crash Course - Federated Identities
This video explains centralized versus decentralized identities. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access...
Curated Video
CISSP Crash Course - Managed Identification
This video explains managed identification and authentication. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access management.
Curated Video
CISSP Crash Course - Identity Lifecycle
This video explains the identity and access lifecycle along with access review. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and...
Curated Video
CISSP Crash Course - Security Concepts
This video explains some basic security topics. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Curated Video
Data Science Prerequisites - Numpy, Matplotlib, and Pandas in Python - Generating Data
In this video, we will discuss how to generate data. This clip is from the chapter "NumPy" of the series "Data Science Prerequisites - NumPy, Matplotlib, and Pandas in Python".In this section of the course, we will dive into the world of...
Curated Video
HashiCorp Certified - Vault Associate Course - Introduction to Auth Methods
This video provides an introduction to Auth methods. You will be learning more about Vault authentication, how it works, and how it's used with client interaction with Vault. This clip is from the chapter "Compare Authentication Methods"...
Curated Video
JavaScript Masterclass - Zero to Job-Ready with Hands-On Projects - Id and Classes
This video explains ID and classes used to give a division to a tag. This clip is from the chapter "(Optional) HTML and CSS Refresher" of the series "JavaScript Masterclass - Zero to Job-Ready with Hands-On Projects".This section is an...
Curated Video
Mastering C++ Standard Library Features [Video] - Value Categories: The Full Picture
Learn about the more fine-grained value categories of the language, in order to increase your understanding of the rules that guide move semantics
Curated Video
Shakespeare's A Midsummer Night's Dream: Act 3, Scene 1 Analysis
In this video, we delve into Act 3 of Shakespeare's "A Midsummer Night's Dream," exploring the intricate interplay between the human and fairy worlds. We examine the concept of Borderlands as defined by feminist scholar Gloria Anzaldúa,...
Curated Video
Shakespeare's Othello: Act 4, Scene 1 Analysis
This video delves into Act 4 of Othello, focusing on themes of masculinity and the destructive impact of patriarchal structures. We examine how gender roles and expectations influence the characters' actions and lead to tragic outcomes,...
Curated Video
Shakespeare's Othello: Act 5, Scene 2 Analysis
In this final installment, we dive deep into the heart-wrenching conclusion of Othello, Act 5, Scene 2. Explore the devastating impact of miscommunication and silence as Othello confronts Desdemona, leading to the tragic climax. We...
Curated Video
The Tempest and Post-Colonial Theory: Calilban and Decolonization
This video delves into the nuanced portrayal of Caliban in Shakespeare's "The Tempest" and its implications for postcolonial criticism. By examining the ways Prospero's authority subverts Caliban's humanity, the analysis opens a...
Curated Video
Shakespeare's Othello: Act 3, Scene 3, Lines 1-220 Analysis
This video analyzes Act 3 of Othello, focusing on the recurring motifs of vision and perception. It explores how Iago manipulates Othello's view of the world and how subjective experiences shape their interpretations of reality.
Curated Video
Shakespeare's Othello: Act 2, Scene 3 Analysis
This video analyzes Act 2, Scene 3 of Othello, focusing on Iago's manipulation of Cassio and Desdemona's reputations. It explores the ways characters construct and interpret reputations through dialogue and actions, and how Iago uses...