Curated Video
Practical Cyber Hacking Skills for Beginners - The CIA and DAD Triads
This video will teach us more about confidentiality, integrity, availability, disclosure, alteration, and deniability.
Curated Video
Learning the Importance of Moderation
In this video, the Oryx teaches children about the importance of moderation in various aspects of life. Through the story of Basil, a boy addicted to video games, they learn about balancing leisure activities with responsibilities,...
Curated Video
Building Confidence: A Horse's Lesson on Overcoming Challenges and Believing in Yourself
In this video, Harry the Kiwi teaches children about the importance of confidence and trust. Through a heartwarming story about Andy and his horse friend, Harry, the audience learns that confidence is believing in oneself and finding...
Curated Video
The Message of Peace
In this video, a pigeon named Delicate shares stories about her travels and promotes the importance of peace. Through a heartwarming story about children resolving conflicts and lifting blockades in their neighborhood, Delicate teaches...
Curated Video
Self-discipline
In this video, Jade the Giraffe interviews Haley the Bee about the concept of self-discipline. Haley explains how bees are highly organized and work together in a structured manner to achieve their goals, such as producing honey. The...
Curated Video
The Power of Optimism
In this heartwarming video, Rolla the Rooster shares his perspective on optimism and how it has helped him navigate challenges on the farm. Through his story of selling green tea with his friend Hassan, Rolla teaches us the importance of...
Curated Video
The Importance of Honesty
In this video, Helen the hippo shares a story about the importance of honesty. When she accidentally eats fruits from a basket that belonged to her new friend Lisa, Helen must decide whether to tell the truth or not. Through her honesty,...
Curated Video
Fundamentals of Secure Software - SANS Top 25
This video provides an introduction to the SANS Top 25.
Curated Video
Fundamentals of Secure Software - Application Security Goals
In this video, we will continue defining terms and start talking about security goals.
Curated Video
Recommender Systems Complete Course Beginner to Advanced - Project 2: Movie Recommendation System Using Collaborative Filtering: Logarithm of Count
In this video, we will explore how to calculate the count of elements using the logarithm function.
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-How Hackers Find SQL Injections in Minutes with Sqlmap
This video provides an overview of the section. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on how...
Curated Video
Recommender Systems with Machine Learning - Logarithm of Count
This video helps you explain the logarithm of count. This clip is from the chapter "Project 2: Movie Recommendation System Using Collaborative Filtering" of the series "Recommender Systems with Machine Learning".null
Curated Video
CISSP Crash Course - Secure Coding Guidelines
This video explains the weaknesses in software and API security. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Assess Software Security
This video explains assessing software security and how to audit and log the changes. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Security Controls in the SDLC
This video explains SDLC practices and security controls in the SDLC. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Security in the SDLC
This video explains security in the SDLC, methodologies, and maturity models. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Physical Security and Safety
This video explains KPIS of physical security and safety. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Recovery and Response Strategies
This video explains recovery and response strategies with respect to disasters. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Patch and Vulnerability Management
This video explains the patch and vulnerability management process. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Operate Detective and Preventative Controls
This video explains firewalls and how to operate detective and preventative controls. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Resource Protection
This video explains media management and protection. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Security Operations Concepts
This video explains security operations concepts and separation of duties. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Configuration Management
This video explains configuration management. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Conducting Logging and Monitoring Activities
This video explains logging and monitoring activities as well as incident management steps. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...