Instructional Video13:06
Curated Video

CISSP Crash Course - Secure Communication

Higher Ed
This video explains how to implement secure communication. This clip is from the chapter "Communication and Network Security" of the series "CISSP Crash Course".This section covers domain 4, which focuses on communication and network...
Instructional Video20:38
Curated Video

CISSP Crash Course - Secure Design in Networks

Higher Ed
This video explains the OSI model and the TCP/IP Or DOD model. This clip is from the chapter "Communication and Network Security" of the series "CISSP Crash Course".This section covers domain 4, which focuses on communication and network...
Instructional Video15:43
Curated Video

CISSP Crash Course - Security in Facility Design

Higher Ed
This video explains how to apply security principles and controls to facility design. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Instructional Video6:56
Curated Video

CISSP Crash Course - Security Models

Higher Ed
This video explains security models definition and trusted computing. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and...
Instructional Video7:17
Curated Video

CISSP Crash Course - Engineering Processes and Secure Design

Higher Ed
This video explains engineering processes and secure design. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and engineering.
Instructional Video3:07
Curated Video

CISSP Crash Course - Understand and Comply with Investigations

Higher Ed
This video explains evidence collection, forensics, and handling investigations. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video3:08
Curated Video

CISSP Crash Course - Collect Security Process Data

Higher Ed
This video explains collecting security process data and account management and review. This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which focuses on...
Instructional Video3:01
Curated Video

CISSP Crash Course - Implement and Manage Authorization

Higher Ed
This video explains how to implement and manage authorization. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access management.
Instructional Video3:04
Curated Video

CISSP Crash Course - Control Physical and Logical Access

Higher Ed
This video explains control physical and logical access as well as type of assets that are part of a system. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5,...
Instructional Video2:34
Curated Video

CISSP Crash Course - Asset Retention

Higher Ed
This video explains asset retention, end-of-life, end-of-support, and end-of-service-life. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security,...
Instructional Video4:18
Curated Video

CISSP Crash Course - Data Roles

Higher Ed
This video explains data roles, data owner, and asset owner in domain 2. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Instructional Video9:19
Curated Video

CISSP Crash Course - Threat Modeling

Higher Ed
This video explains threat modeling and identifying threats. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Instructional Video8:40
Curated Video

CISSP Crash Course - Personnel Security Policies and Procedures

Higher Ed
This video explains personnel security policies and procedures. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Instructional Video6:56
Curated Video

Master SQL for Data Analysis - Virtual Tables (Views)

Higher Ed
In this lesson, we will look at creating virtual tables to look at tables in a different way than their existing database structures. This clip is from the chapter "SQL – Simplify Queries (Views, CTEs)" of the series "Master SQL for Data...
Instructional Video3:40
Curated Video

HashiCorp Certified - Vault Associate Course - Unsealing with Transit Auto Unseal

Higher Ed
There are so many options for unsealing Vault, including this option that allows you to unseal using another Vault cluster. It's a pretty cool option. This video provides an overview of the transit auto-unseal feature in HashiCorp Vault,...
Instructional Video4:07
Curated Video

HashiCorp Certified - Vault Associate Course - Lab—Configuring Auth Methods Using the UI

Higher Ed
This is a lab video on configuring Auth methods using the UI. This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on comparing authentication...
Instructional Video3:18
Curated Video

HashiCorp Certified - Vault Associate Course - Auth Methods—Section Overview

Higher Ed
This video provides a section overview of the Auth methods. This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on comparing authentication...
Instructional Video4:43
Curated Video

HashiCorp Certified - Vault Associate Course - Audit Devices

Higher Ed
In this video, we will explore the concept of audit devices in HashiCorp Vault, which are responsible for recording and storing audit logs of Vault operations. This video will help you better understand what audit devices are and how to...
Instructional Video2:57
Curated Video

HashiCorp Certified - Vault Associate Course - Pros and Cons of Unseal Options

Higher Ed
In this video, we will compare and contrast the different methods of unsealing HashiCorp Vault. We have learned a lot about seal and unseal options, but which do we use? This short video will walk you through the pros and cons of each...
Instructional Video5:15
Curated Video

HashiCorp Certified - Vault Associate Course - Unsealing with Key Shards

Higher Ed
In this video, we will explore the process of unsealing HashiCorp Vault using key shards, which is a method of distributing the unsealing keys across multiple individuals or systems for added security. This clip is from the chapter...
Instructional Video2:56
Curated Video

HashiCorp Certified - Vault Associate Course - Why Organizations Choose Vault

Higher Ed
This video explains why organizations choose HashiCorp Vault as their go-to solution for managing secrets and sensitive data. This clip is from the chapter "Introduction to Vault" of the series "HashiCorp Certified - Vault Associate...
Instructional Video7:02
Curated Video

HashiCorp Certified - Vault Associate Course - How Vault Works

Higher Ed
In this video, we will dive deep into how HashiCorp Vault works. This video shows you how it works using a familiar analogy to help us easily understand the basic concepts. This clip is from the chapter "Introduction to Vault" of the...
Instructional Video6:28
Curated Video

HashiCorp Certified - Vault Associate Course - What Is Vault?

Higher Ed
This video provides a general introduction to HashiCorp Vault. Vault is a powerful open-source tool developed by HashiCorp that provides a secure and centralized way to manage secrets, encryption keys, and other sensitive data used in...
Instructional Video13:45
Curated Video

Chatbots for Beginners: A Complete Guide to Build Chatbots - Chatbot Development with AWS Lex and AWS Lambda: Chatbot Deployment on WhatsApp with Twilio

Higher Ed
In this video, we will look at making sure that the chatbot is being communicated with correctly and that we do not need to avail the Lex interface to use the chatbot. This clip is from the chapter "Chatbots Development with Amazon Lex"...