Instructional Video5:17
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Understanding App Permissions

Higher Ed
This video talks about app permissions and the kind of permissions that an application demands while you install them on your phone. These permissions can be features or tools that the app needs in order to function properly. This clip...
Instructional Video1:49
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Introduction

Higher Ed
This is an introduction to the section in which the author talks about mobile cybersecurity. This clip is from the chapter "Mobile Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".In this section, you...
Instructional Video3:05
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Set Up a Recovery Email

Higher Ed
In this video, the author shows you how to set up a recovery email account the right way. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part...
Instructional Video3:20
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Google Account - Part 2

Higher Ed
In part 2 of the video, which focuses on securing your Google account, you will look at signing into other sites part of the security. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute...
Instructional Video4:51
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Google Account

Higher Ed
In this video, you will learn to secure your Google account. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section focuses on...
Instructional Video4:41
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Twitter Account

Higher Ed
In this video, you will discover effective strategies to enhance the security of your Twitter account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...
Instructional Video4:25
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Introduction to Password Managers

Higher Ed
In this video, you will be introduced to password manager tools such as LastPass or dashlane. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section...
Instructional Video12:13
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Password Management

Higher Ed
In this video, you will learn about password management and the need for using strong passwords to keep your system safe. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023...
Instructional Video8:01
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Using VPNs

Higher Ed
In this video, you will learn about a security tool called Virtual Private Network or a VPN, which is used to provide a secure connection to another network over the Internet. This clip is from the chapter "Internet and Browsing...
Instructional Video10:41
Curated Video

Linux PAM Security Administration - PAM Configuration File - Modules

Higher Ed
This video explains the third or the last column of the PAM configuration files, which is the modules column.
Instructional Video5:25
Curated Video

Linux PAM Security Administration - The PAM File Configuration - Module Interface

Higher Ed
This video explains the first column of the PAM file configuration, which is the module interface or type.
Instructional Video4:09
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Additional Application Services

Higher Ed
Some application services are focused mainly on web mobility (web apps on mobile devices) such as AWS Amplify, AppSync and Device Farm. This video addresses these services as well as some additional machine learning tools.
Instructional Video5:13
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Key Security Services

Higher Ed
The selection and use of security services is essential, and this video explores services such as AWS Shield, WAF, SSO, and Secrets Manager and how they apply to your deployments.
Instructional Video9:22
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Federated Directory Services

Higher Ed
Active Directory Federation Services (ADFS) allows you to pass-through the authentication of a local AD logon to access AWS resources. This video explores the concept.
Instructional Video6:07
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Multiple Permissions

Higher Ed
To understand practical permissions, you must understand multiple permissions. Permissions can come from multiple sources, and they aggregate to form practical or applied permissions. In this video, you will explore multiple permissions.
Instructional Video6:07
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Authentication

Higher Ed
AWS provides two primary authentication methods (though more can be implemented) and these are covered in this video. Additionally, you will learn the basics of authentication.
Instructional Video6:06
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Root User

Higher Ed
In operating systems, it is common to have a root or admin user. In AWS, a root user exists as well. You must understand this root user account and the implications it introduces to the management and use of AWS.
Instructional Video10:03
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Principals

Higher Ed
With any identity and access management solution, it is essential to understand the principal that can be managed, such as users and groups. This video introduces you to the principals you will manage in AWS.
Instructional Video7:56
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Gateways (VPGs and CGWs)

Higher Ed
Do you want to connect your local network to AWS in a seemingly permanent way that is also secure? If so, you need to understand VPGs and CGWs, the topic of this video.
Instructional Video9:47
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Virtual Private Cloud (VPC) Overview

Higher Ed
An organization can internally run its own cloud solutions, called a private cloud. AWS provides the same concept in their cloud, and they call it the Virtual Private Cloud (VPC). This video introduces the VPC concept.
Instructional Video9:48
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Storage Access Security Lab

Higher Ed
Creating storage solutions in Amazon Web Services (AWS) is one thing, and it is another thing to ensure their security. In this video, you will explore the storage security features of AWS, including the console and CLI.
Instructional Video6:52
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Elastic File System (EFS)

Higher Ed
Do you need to store data in your Amazon Web Services (AWS) cloud that can be accessed by multiple AWS virtual machines (instances)? If so, you need a Storage Area Network (SAN) in the cloud. The Elastic File System (EFS) provides this...
Instructional Video5:41
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - S3 and Tape Gateway

Higher Ed
What do you do if your antiquated system requires backing up to a physical tape? AWS now has the solution with Tape Gateway, which these systems see as a physical tape, yet cleverly backs up to a server.
Instructional Video8:11
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Creating S3 Buckets Lab

Higher Ed
Would you like to see S3 in action? This video demonstrates the process of creating S3 buckets and then using those buckets for object (file) storage.