Instructional Video6:07
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Authentication

Higher Ed
AWS provides two primary authentication methods (though more can be implemented) and these are covered in this video. Additionally, you will learn the basics of authentication.
Instructional Video10:03
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Principals

Higher Ed
With any identity and access management solution, it is essential to understand the principal that can be managed, such as users and groups. This video introduces you to the principals you will manage in AWS.
Instructional Video7:32
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Services, Part 2

Higher Ed
This video continues the Amazon Web Services (AWS) offerings tour, finishing up where we left off in the previous video. By the end of this video, you will have a birds-eye view of the AWS services.
Instructional Video9:25
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Organizations

Higher Ed
Over time, you may find that you have multiple AWS accounts. The IAM solution will be managed separately for each account by default. However, you can use AWS organizations to bring them all together and this video shows you how.
Instructional Video3:33
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Cognito

Higher Ed
What can you do if you want to integrate a local Active Directory or another identity management system with AWS? The answer is found in Cognito, an AWS solution for user identity and data synchronization or single sign-on (SSO).
Instructional Video6:03
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Amazon STS

Higher Ed
The Amazon Security Token Service (STS) allows for secure communications and access between AWS services, such as between an EC2 instance and S3. You will learn about this service in this video.
Instructional Video11:17
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - User Accounts

Higher Ed
As we move forward with a foundational understanding of IAM from chapter 7, we will begin exploring practical application in this chapter. Here in video one, we will discuss best practices and tasks involved in user account creation and...
Instructional Video5:39
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - AWS Security Hub

Higher Ed
AWS Security Hub offers a single console for a number of useful security options in AWS, including IDS with Amazon GuardDuty, vulnerability scans with Amazon Inspector, and automatic policy compliance scans with Amazon Macie.
Instructional Video10:06
Curated Video

The Modern Spy: How Your Daily Devices Can Be Compromised

6th - Higher Ed
In an age where technology is intertwined with daily life, learn how easily your devices can be hacked and used for spying. From mobile phones to computers, discover the methods used by modern spies to infiltrate your privacy. Follow...
Instructional Video9:07
Curated Video

CISSP Crash Course - Authentication System

Higher Ed
This video explains the SSO on the Internet and networks, as well as OPENID and OAUTH. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on...
Instructional Video6:54
Curated Video

CISSP Crash Course - Federated Identities

Higher Ed
This video explains centralized versus decentralized identities. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access...
Instructional Video9:41
Curated Video

CISSP Crash Course - Managed Identification

Higher Ed
This video explains managed identification and authentication. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access management.
Instructional Video3:30
Curated Video

CISSP Crash Course - Identity Lifecycle

Higher Ed
This video explains the identity and access lifecycle along with access review. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and...
Instructional Video8:14
Curated Video

CISSP Crash Course - Security Concepts

Higher Ed
This video explains some basic security topics. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Instructional Video14:40
Curated Video

Data Science Prerequisites - Numpy, Matplotlib, and Pandas in Python - Generating Data

Higher Ed
In this video, we will discuss how to generate data. This clip is from the chapter "NumPy" of the series "Data Science Prerequisites - NumPy, Matplotlib, and Pandas in Python".In this section of the course, we will dive into the world of...
Instructional Video9:50
Curated Video

HashiCorp Certified - Vault Associate Course - Introduction to Auth Methods

Higher Ed
This video provides an introduction to Auth methods. You will be learning more about Vault authentication, how it works, and how it's used with client interaction with Vault. This clip is from the chapter "Compare Authentication Methods"...
Instructional Video8:57
Curated Video

JavaScript Masterclass - Zero to Job-Ready with Hands-On Projects - Id and Classes

Higher Ed
This video explains ID and classes used to give a division to a tag. This clip is from the chapter "(Optional) HTML and CSS Refresher" of the series "JavaScript Masterclass - Zero to Job-Ready with Hands-On Projects".This section is an...
Instructional Video4:47
Curated Video

Mastering C++ Standard Library Features [Video] - Value Categories: The Full Picture

Higher Ed
Learn about the more fine-grained value categories of the language, in order to increase your understanding of the rules that guide move semantics
Instructional Video7:49
Curated Video

Shakespeare's A Midsummer Night's Dream: Act 3, Scene 1 Analysis

12th - Higher Ed
In this video, we delve into Act 3 of Shakespeare's "A Midsummer Night's Dream," exploring the intricate interplay between the human and fairy worlds. We examine the concept of Borderlands as defined by feminist scholar Gloria Anzaldúa,...
Instructional Video12:20
Curated Video

Shakespeare's Othello: Act 4, Scene 1 Analysis

12th - Higher Ed
This video delves into Act 4 of Othello, focusing on themes of masculinity and the destructive impact of patriarchal structures. We examine how gender roles and expectations influence the characters' actions and lead to tragic outcomes,...
Instructional Video8:28
Curated Video

Shakespeare's Othello: Act 5, Scene 2 Analysis

12th - Higher Ed
In this final installment, we dive deep into the heart-wrenching conclusion of Othello, Act 5, Scene 2. Explore the devastating impact of miscommunication and silence as Othello confronts Desdemona, leading to the tragic climax. We...
Instructional Video7:53
Curated Video

The Tempest and Post-Colonial Theory: Calilban and Decolonization

12th - Higher Ed
This video delves into the nuanced portrayal of Caliban in Shakespeare's "The Tempest" and its implications for postcolonial criticism. By examining the ways Prospero's authority subverts Caliban's humanity, the analysis opens a...
Instructional Video9:45
Curated Video

Shakespeare's Othello: Act 3, Scene 3, Lines 1-220 Analysis

12th - Higher Ed
This video analyzes Act 3 of Othello, focusing on the recurring motifs of vision and perception. It explores how Iago manipulates Othello's view of the world and how subjective experiences shape their interpretations of reality.
Instructional Video8:53
Curated Video

Shakespeare's Othello: Act 2, Scene 3 Analysis

12th - Higher Ed
This video analyzes Act 2, Scene 3 of Othello, focusing on Iago's manipulation of Cassio and Desdemona's reputations. It explores the ways characters construct and interpret reputations through dialogue and actions, and how Iago uses...