Instructional Video8:11
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Creating S3 Buckets Lab

Higher Ed
Would you like to see S3 in action? This video demonstrates the process of creating S3 buckets and then using those buckets for object (file) storage.
Instructional Video11:47
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - CloudTrail

Higher Ed
When you have IAM users, groups, roles, and policies defined, it's time to think about how you will track or log everything that's going on in AWS. In this video, you will learn about AWS CloudTrail and how it can help you monitor and...
Instructional Video7:49
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Tokens

Higher Ed
In this video, we will dive deeper into JWTs and learn how to use them for secure user authentication and authorization.
Instructional Video7:40
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Security Policies

Higher Ed
NTFS permissions control files and folders, but there are plenty of other resources that need control. Security policies control factors such as login attempts, printer access, and password length/complexity. This clip is from the...
Instructional Video5:14
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Users and Super Users

Higher Ed
This video explains users and super users. This clip is from the chapter "The Visible Computer" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section explains the common safety procedures and hardware concerns as a PC...
Instructional Video7:34
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Security

Higher Ed
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Instructional Video5:20
Curated Video

Behavioral Design Patterns in C++ - Logging System - I

Higher Ed
This video starts with another example in which we will implement a logging system. This example is implemented in three subsequent videos. This clip is from the chapter "Chain of Responsibility" of the series "Behavioral Design Patterns...
Instructional Video7:52
Curated Video

PowerShell for Automating Administration - Project Directory and File Structure

Higher Ed
This video demonstrates the project directory and file structure that will help you give an upper hand in customizing the automation part as per your requirement. This clip is from the chapter "Project Introduction" of the series...
Instructional Video8:05
Curated Video

PowerShell for Automating Administration - Learn PowerShell Logging Module

Higher Ed
This video explains automating systems and the application validation process. Here, you will be using the PowerShell Logging module, which helps automate complex operations that run error-free. This clip is from the chapter "PowerShell...
Instructional Video7:34
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Mobile Device Security

Higher Ed
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Instructional Video7:01
Curated Video

Kafka for Developers - Data Contracts Using Schema Registry - Build the Coffee Order Consumer

Higher Ed
In this video, we will build the consumer that will be used to consume the Kafka AVRO records from the Kafka topic. This clip is from the chapter "Build a Coffee Order Service Using Spring Boot and Schema Registry" of the series "Kafka...
Instructional Video5:41
Curated Video

Kafka for Developers - Data Contracts Using Schema Registry - Build the POST Endpoint for the CoffeeOrderService - /coffee_orders

Higher Ed
In this video, we will build the POST endpoint in the controller, using which we can post new coffee orders. This clip is from the chapter "Build a Coffee Order Service Using Spring Boot and Schema Registry" of the series "Kafka for...
Instructional Video12:49
Curated Video

CISSP Crash Course - Conducting Logging and Monitoring Activities

Higher Ed
This video explains logging and monitoring activities as well as incident management steps. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
Instructional Video8:28
Curated Video

Design Microservices Architecture with Patterns and Principles - Microservices Resilience, Observability, Monitoring Code Review - E-Commerce App

Higher Ed
In this video, a code review is conducted for the microservices' resilience, observability, and monitoring aspects in the e-commerce application. We will explore the codebase related to resilience patterns, logging, distributed tracing,...
Instructional Video5:34
Curated Video

Design Microservices Architecture with Patterns and Principles - Elastic Stack for Microservices Observability with Distributed Logging

Higher Ed
In this video, we will discover the Elastic Stack, a popular open-source solution for log management and analysis, and see how you can use tools such as Elasticsearch, Logstash, and Kibana to collect, process, and visualize log data from...
Instructional Video5:56
Curated Video

Design Microservices Architecture with Patterns and Principles - Sidecar Pattern and How Does the Sidecar Pattern Work for Microservices Deploy

Higher Ed
This video introduces the Sidecar pattern, commonly used in microservices deployments and explains the sidecar container that runs alongside a main application container and provides additional functionality or services. This clip is...
Instructional Video2:58
Great Big Story

EcoAcoustics: Listening to the Rainforest for Conservation

12th - Higher Ed
Explore the Kalimantan rainforest of Borneo, Indonesia, through the ears of Dr Eddie Game, an environmental scientist using bioacoustic monitoring to save this biodiverse ecosystem. Join the team as they deploy smart microphones to...
Instructional Video4:45
Curated Video

Build a DALL-E Image Generator using React, JavaScript, and OpenAI - Setting API DALL-E Image Data in the Application

Higher Ed
In this video, we will first test the image we generate, and the next step is to click on the generated image and then manipulate the state to bring the URL from the DALL-E application. This clip is from the chapter "Rendering and...
Instructional Video4:56
Curated Video

Mega Web Development Bootcamp with React Bootstrap 5, Redux, and REST API - Dispatch Action to Reducer after Successful Login

Higher Ed
In this video, you will learn how to dispatch an action to the reducer after a successful login, triggering state updates and enabling access to authenticated features. This clip is from the chapter "User Session, Dynamic Menu, Redux,...
Instructional Video8:26
The Guardian

Why is Russia still in love with Putin?

Pre-K - Higher Ed
Established politicians the world over are facing crises of confidence with their electorates. But 17 years after he took charge of Russia, Vladimir Putin’s approval ratings are still high. Shaun Walker visits Irkutsk in Siberia to...
Instructional Video4:25
Curated Video

5 Things About Jessi and Animals

Pre-K - Higher Ed
Jessi feels the need to share a few things about her life with animals. Five things to be exact. --
Instructional Video2:39
Curated Video

SkillSprints: Building Good Log-on and Log-off Habits

Pre-K - Higher Ed
Good log on and log off habits are part of building strong cybersecurity. In this video, you'll learn how to improve your log-on and log-off habits and better protect yourself online.
Instructional Video2:56
Curated Video

People of the Amazon

3rd - 8th
People of the Amazon analyzes how cultural patterns affect economic decisions and the daily lives of people in the Amazon.
Instructional Video3:19
Curated Video

Rain Forest Destruction

3rd - Higher Ed
Rain Forest Destruction researches current topics of rain forest destruction and the effects on the people in Brazil and around the world.