Instructional Video6:18
Curated Video

Learning Angular 2 Directives (Video 12)

Higher Ed
Get up to speed with the building blocks of Angular 2. New technologies and new patterns are emerging on a daily basis. Coding for the front end is extremely demanding, but at the same time more interesting and challenging than ever...
Instructional Video5:26
Curated Video

Learning Akka (Video 19)

Higher Ed
Akka helps you to build scalable, resilient, and fault-tolerant distributed systems that can provide outstanding performance on local machines as well as over remote networks. Employing the actor model, it is possible to leverage these...
Instructional Video7:07
Curated Video

Bug Bounty Program Certification 7.2: Install DVWA Framework In Kali Linux

Higher Ed
This video will help you host DVWA (Buggy Application). • Explore DVWA application • Download DVWA in Kali Linux • DVWA hosting in server
Instructional Video6:31
Curated Video

Bug Bounty Program Certification 7.1: Install Web Server in Kali Linux

Higher Ed
In this video, you will learn about Xampp installation. • Learn about Xampp • Download Xampp server in Kali Linux • Installation of Xampp server in Kali Linux OS
Instructional Video5:22
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- Introduction to On-Premises Networking

Higher Ed
In this video, we'll learn about on-premises networking. This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is about AWS...
Instructional Video3:35
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - What is a Git Hosting Service?

Higher Ed
This video explains the concept of a Git hosting service. This clip is from the chapter "GitHub and Remote Repositories" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains Git hosting service....
Instructional Video3:00
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 4 Exam Question Review

Higher Ed
Managing Linux host authentication can involve the use of many command-line utilities. This episode focuses on the sequence of steps needed to enable SSH public key authentication. This clip is from the chapter "Tools of the Trade" of...
Instructional Video5:00
Curated Video

Understanding the Monty Hall Problem

Pre-K - Higher Ed
The Monty Hall problem is a famous probability puzzle named after the host of a television game show. The problem involves choosing between two doors after one empty door has been revealed. Many people mistakenly believe that the...
Instructional Video5:25
Curated Video

DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK, JIRA - Jenkins Plugin Basic

Higher Ed
In this video, you will be able to install the plugins and do basic configuration. This clip is from the chapter "Continuous Integration and Continuous Deploy" of the series "DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK,...
Instructional Video5:07
Professor Dave Explains

Phylum Cycliophora: Ring-Bearing Symbions

12th - Higher Ed
Creatures in the cycliophora phylum have a particularly strange structure and lifestyle. All of these animals live their lives attached symbiotically to the mouthparts of cold-water lobsters. Let's look at their anatomy and reproductive...
Instructional Video9:32
Curated Video

Bug Bounty Program Certification 5.2: Find Major Bugs in Server

Higher Ed
In this video, we will learn about advance scanning using vulnerability scanner. • Use Nessus network vulnerability scanner • Use advance scan, find bugs in server • Explanation of bug available in server
Instructional Video17:41
Curated Video

Create a computer network: Classic Network Device Interaction Examples

Higher Ed
From the section: Interacting with Classic Network Devices. In this section, we will look at how to interact with classic network devices with Python libraries. We will explain what we define as classic network devices and use Netmiko...
Instructional Video4:21
IDG TECHtalk

Guide to key Windows 10 event logs you need to monitor

Higher Ed
These are the event logs that will help you identify malicious activity on your network.
Instructional Video4:12
Curated Video

Ansible for the Absolute Beginner - Conditionals

Higher Ed
This video explains the concept of conditionals in Ansible. This clip is from the chapter "Conditionals" of the series "Ansible for the Absolute Beginner - Hands-On – DevOps".This section focuses on conditional statements in Ansible.
Instructional Video10:09
Curated Video

Bash Shell Scripting - Command Substitution

Higher Ed
This video focusses on command substitution. This clip is from the chapter "Understanding Variables" of the series "Mastering Bash Shell Scripting: Automate your daily tasks [Updated for 2021]".This video focuses on variables.
Instructional Video14:51
Curated Video

CISSP®- Laws and Regulations

Higher Ed
This video focuses on the laws and regulations. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and...
Instructional Video4:23
History Hit

Conquest 1066, Told By the Teacher You Wish You'd Had: The battle of Stamford bridge

12th - Higher Ed
What mistake did Harold make while waiting for the contenders to the crown? What happened on September 1066? Conquest 1066, Told By the Teacher You Wish You'd Had, Part 2
Instructional Video5:04
Curated Video

Ansible for the Absolute Beginner - Demo - Ansible Inventory

Higher Ed
This video demonstrates how to use Ansible inventory. This clip is from the chapter "Introduction to Ansible Inventory" of the series "Ansible for the Absolute Beginner - Hands-On – DevOps".This section focuses on Ansible inventory.
Instructional Video5:47
Curated Video

AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - Advanced Amazon Elastic Compute Cloud (Amazon EC2) Management

Higher Ed
This video illustrates the various Amazon EC2 management options, such as resource optimization in Amazon Web Services (AWS) cost management, host recovery for EC2 instances, and traffic monitoring. This clip is from the chapter...
Instructional Video4:22
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - Creating a Simple Website Using GitHub Pages

Higher Ed
This video explains how to create a simple website using GitHub Pages. This clip is from the chapter "GitHub Pages" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to create GitHub pages...
Instructional Video8:21
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - Installing Git on Linux

Higher Ed
This video demonstrates how to install Git on Linux. This clip is from the chapter "Installation of Git and Configuration of the Shell" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section demonstrates...
Instructional Video4:36
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Nmap Lab

Higher Ed
IT network reconnaissance begins with discover hosts and services on the network. This episode uses the nmap command to map out hosts on the network. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+...
Instructional Video2:40
Curated Video

World of Computer Networking Your CCNA start - Network - Example 1

Higher Ed
This video explains network with an example. This clip is from the chapter "Networks" of the series "World of Computer Networking: Your CCNA start".This section introduces you to networks.
Instructional Video1:14
Curated Video

World of Computer Networking Your CCNA start - Domain Name

Higher Ed
This video introduces you to the concept of domain names. This clip is from the chapter "Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS)" of the series "World of Computer Networking: Your CCNA start".This section...