Curated Video
Learn Java from Scratch - A Beginner's Guide - Step 10 - Java Ternary Operation - an Introduction
In this video, you will learn about Java ternary operation—an introduction.
Curated Video
Learn Java from Scratch - A Beginner's Guide - Step 01 - Basics of Designing a Class - Class, Object, State, and Behavior
In this video, you will learn about the basics of designing a class—class, object, state, and behavior.
Curated Video
Learn Java from Scratch - A Beginner's Guide - Step 07 - Understanding Basics of Encapsulation with Setter Methods
In this video, we will understand the basics of encapsulation with setter methods.
Curated Video
Learn Java from Scratch - A Beginner's Guide - Step 06 - Introducing State of an Object with Speed Variable
In this video, you will learn about introducing the state of an object with the speed variable.
Curated Video
Express Framework Fundamentals - Secure Sign-Up with Auth0 and Node.js - Setting Up Auth0 with Express and Passport
This video helps you with setting up Auth0 with Express and Passport. This clip is from the chapter "Auth0" of the series "Express Framework Fundamentals - Secure Sign-Up with Auth0 and Node.js".This section focuses on Auth0 in detail.
Curated Video
Microsoft Project 2021 From Beginners to Advanced - Calculated Custom Field - Part 2
In this video, continuing from Part 1, we will explore calculated custom fields further. We will delve deeper into creating and configuring these fields to perform advanced calculations that enhance our project analysis capabilities....
Curated Video
Microsoft Project 2021 From Beginners to Advanced - Exercise 08-1
In this exercise demonstration, we will turn on and view tasks on the critical path, filter tasks on the critical path, take project snapshots in their present state, assign them to the baseline, and then clear the baseline. This clip is...
Curated Video
Building a ChatGPT AI with JavaScript - An OpenAI Code-Along Guide - Async Await Fetch OpenAI and ChatGPT Post Request Pattern
This video demonstrates the use of async/await and fetch to send a post request to the OpenAI API, allowing ChatGPT to respond to user input in real time.
Curated Video
Building a ChatGPT AI with JavaScript - An OpenAI Code-Along Guide - onSubmit Functionality for OpenAI API Connection with ChatGPT
In this video, you will learn how to add onSubmit functionality for OpenAI API connection with ChatGPT, enabling your application to query the OpenAI API and display responses based on user input.
Curated Video
A Detailed Guide to the OWASP Top 10 - #1 Broken Access Control Prevention
This video explains how to prevent broken access control on our website or on our applications.
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Facebook Account
In this video, you will discover effective strategies to enhance the security of your Facebook account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...
Curated Video
Linux PAM Security Administration - The PAM File Configuration - Module Interface
This video explains the first column of the PAM file configuration, which is the module interface or type.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Backups Lab
Getting your data into a database is just a portion of the important tasks related to databases. You must also backup your databases regularly. The good news is that AWS RDS does this for you and you can manually do it as well.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - EFS and PrivateLink
How can you ensure secure connections between your VPCs, services, and applications in AWS? Check out PrivateLink to find out.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Setting Up a Glacier Vault Lab
Now that you understand Glacier as a concept, it's time to explore the process of creating Glacier storage. This storage is called a vault with archives. This video demonstrates their creation and use.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Security Policies
NTFS permissions control files and folders, but there are plenty of other resources that need control. Security policies control factors such as login attempts, printer access, and password length/complexity. This clip is from the...
Curated Video
ChatGPT for Creatives - Creating Settings and Monsters
In this video, you will learn about creating settings and monsters for our manga and comics. We will discuss various techniques and tips for creating unique and interesting settings that will enhance the story's mood and themes. We will...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Malware in Action
This video demonstrates some destructive malware and ransomware applications to give you an idea of what to look for when you suspect a system has been infected. WARNING! If you attempt these at home, be sure you're in a sandbox or...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Security
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Mobile Devices and E-Mail
Corporate or ISP e-mail setup requires various configuration options, such as POP or IMAP for incoming mail and SMTP for outgoing mail. S/MIME was a way to encrypt e-mail attachments. Standard Google or Apple accounts are set up with a...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Proxy Servers
In this video, the author describes how proxy servers work to block certain websites and filter outgoing or incoming content. The video shows how to set up a browser to connect to a proxy server. This clip is from the chapter "The...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Wireless Encryption
Everything on an unencrypted (open) wireless network is easily intercepted by anyone with the right capture tools. Over the years, 80 2.11 has developed three different encryption standards, each with its own idiosyncrasies, strengths,...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Network IDs and Subnet Masks
IP addressing was designed from the ground up for flexibility in supporting LANs and WANs of any size. The first step towards understanding this flexibility is to understand Network IDs and how they interact with a subnet mask to get...
Curated Video
ASP.NET 6.0 - Build Hands-On Web Projects - Edit the appsettings.json File to Include the Connection String
The appsettings.json file is modified to include a connection string to the database for communication. This clip is from the chapter "Coding Project Part 1: Build a Web API" of the series "ASP.NET 6.0 - Build Hands-On Web Projects".This...