Curated Video
Fundamentals of Secure Software - Broken Access Control
This video talks about Broken authentication.
Curated Video
A Detailed Guide to the OWASP Top 10 - API2:2023 Broken Authentication
In this video, examine the critical security risk of Broken Authentication within APIs and discuss methods for securing authentication mechanisms.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Federated Directory Services
Active Directory Federation Services (ADFS) allows you to pass-through the authentication of a local AD logon to access AWS resources. This video explores the concept.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Multi-Factor Authentication
What if you don't trust a single authentication method, such as a username and password pair? Then you can use multi-factor authentication, which is presented in this video.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Authentication
AWS provides two primary authentication methods (though more can be implemented) and these are covered in this video. Additionally, you will learn the basics of authentication.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Principals
With any identity and access management solution, it is essential to understand the principal that can be managed, such as users and groups. This video introduces you to the principals you will manage in AWS.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Services, Part 2
This video continues the Amazon Web Services (AWS) offerings tour, finishing up where we left off in the previous video. By the end of this video, you will have a birds-eye view of the AWS services.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Organizations
Over time, you may find that you have multiple AWS accounts. The IAM solution will be managed separately for each account by default. However, you can use AWS organizations to bring them all together and this video shows you how.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Cognito
What can you do if you want to integrate a local Active Directory or another identity management system with AWS? The answer is found in Cognito, an AWS solution for user identity and data synchronization or single sign-on (SSO).
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Amazon STS
The Amazon Security Token Service (STS) allows for secure communications and access between AWS services, such as between an EC2 instance and S3. You will learn about this service in this video.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - User Accounts
As we move forward with a foundational understanding of IAM from chapter 7, we will begin exploring practical application in this chapter. Here in video one, we will discuss best practices and tasks involved in user account creation and...
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - AWS Security Hub
AWS Security Hub offers a single console for a number of useful security options in AWS, including IDS with Amazon GuardDuty, vulnerability scans with Amazon Inspector, and automatic policy compliance scans with Amazon Macie.
Curated Video
The Modern Spy: How Your Daily Devices Can Be Compromised
In an age where technology is intertwined with daily life, learn how easily your devices can be hacked and used for spying. From mobile phones to computers, discover the methods used by modern spies to infiltrate your privacy. Follow...
Curated Video
CISSP Crash Course - Authentication System
This video explains the SSO on the Internet and networks, as well as OPENID and OAUTH. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on...
Curated Video
CISSP Crash Course - Federated Identities
This video explains centralized versus decentralized identities. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access...
Curated Video
CISSP Crash Course - Managed Identification
This video explains managed identification and authentication. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access management.
Curated Video
CISSP Crash Course - Identity Lifecycle
This video explains the identity and access lifecycle along with access review. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and...
Curated Video
CISSP Crash Course - Security Concepts
This video explains some basic security topics. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Curated Video
Data Science Prerequisites - Numpy, Matplotlib, and Pandas in Python - Generating Data
In this video, we will discuss how to generate data. This clip is from the chapter "NumPy" of the series "Data Science Prerequisites - NumPy, Matplotlib, and Pandas in Python".In this section of the course, we will dive into the world of...
Curated Video
HashiCorp Certified - Vault Associate Course - Introduction to Auth Methods
This video provides an introduction to Auth methods. You will be learning more about Vault authentication, how it works, and how it's used with client interaction with Vault. This clip is from the chapter "Compare Authentication Methods"...
Curated Video
JavaScript Masterclass - Zero to Job-Ready with Hands-On Projects - Id and Classes
This video explains ID and classes used to give a division to a tag. This clip is from the chapter "(Optional) HTML and CSS Refresher" of the series "JavaScript Masterclass - Zero to Job-Ready with Hands-On Projects".This section is an...
Curated Video
Mastering C++ Standard Library Features [Video] - Value Categories: The Full Picture
Learn about the more fine-grained value categories of the language, in order to increase your understanding of the rules that guide move semantics
Curated Video
Shakespeare's A Midsummer Night's Dream: Act 3, Scene 1 Analysis
In this video, we delve into Act 3 of Shakespeare's "A Midsummer Night's Dream," exploring the intricate interplay between the human and fairy worlds. We examine the concept of Borderlands as defined by feminist scholar Gloria Anzaldúa,...
Curated Video
Shakespeare's Othello: Act 4, Scene 1 Analysis
This video delves into Act 4 of Othello, focusing on themes of masculinity and the destructive impact of patriarchal structures. We examine how gender roles and expectations influence the characters' actions and lead to tragic outcomes,...