Hi, what do you want to do?
Curated Video
Fundamentals of Secure Software - SCA (Software Composition Analysis)
This video talks about the SCA (Software Composition Analysis).
Curated Video
Fundamentals of Secure Software - PKI (Public Key Infrastructure)
This video explains the PKI (Public Key Infrastructure) and how it is used.
Curated Video
Fundamentals of Secure Software - Prepping for Microsoft Threat Model Tool
This video will help you get ready to use the Microsoft Threat Model tool.
Curated Video
Fundamentals of Secure Software - Introduction to Threat Modeling
This video provides an introduction to threat modeling.
Curated Video
Fundamentals of Secure Software - Scanning for OSS Vulnerabilities with Software Composition Analysis
This video helps in using SCA to find OSS (Open-Source Software) vulnerabilities.
Curated Video
Fundamentals of Secure Software - Cryptographic Failures
This video explains what sensitive data exposure is and talks about cryptographic failures.
Curated Video
A Detailed Guide to the OWASP Top 10 - #9 Security Logging and Monitoring Failures Prevention
This video explains the steps to prevent security logging and monitoring failures.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Incident Response
Although procedures can vary among companies, the CompTIA A+ objectives follow a logical set of responses. This video describes each step.
<
br/>
This clip is from the chapter "Securing Computers" of the series "CompTIA A+...
<
br/>
This clip is from the chapter "Securing Computers" of the series "CompTIA A+...
Curated Video
Behavioral Design Patterns in C++ - Boolean Evaluator
This video explains the Boolean Evaluator.<br<br/>/>
This clip is from the chapter "Interpreter" of the series "Behavioral Design Patterns in C++".This section focuses on the Interpreter pattern.
This clip is from the chapter "Interpreter" of the series "Behavioral Design Patterns in C++".This section focuses on the Interpreter pattern.
Curated Video
Behavioral Design Patterns in C++ - Basic Implementation-Mediator
This video demonstrates the basic implementation of the Mediator pattern.<br<br/>/>
This clip is from the chapter "Mediator" of the series "Behavioral Design Patterns in C++".This section focuses on the Mediator pattern.
This clip is from the chapter "Mediator" of the series "Behavioral Design Patterns in C++".This section focuses on the Mediator pattern.
Curated Video
Maternal Marvels: The Super Senses of Pregnancy and Motherhood
Explore the enhanced senses that develop during pregnancy, such as heightened smell, which persists into motherhood, allowing new mothers to recognize their baby's unique scent and cries among many. This video delves into the...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Installing and Troubleshooting RAM
Upgrading your RAM is one of the quickest tasks that you can do to immediately increase system performance. Whether you are doing a new PC build, or simply updating your system, you are going to need to know how to install and...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - What's On the CompTIA A+ Core 1 (220-1101) Exam?
The Core 1 (220-1101) exam tackles five big subject areas: mobile devices, networking, hardware, virtualization and cloud computing, and hardware and network troubleshooting. Steve dives into the sub-objectives in this episode,...
Curated Video
PowerShell for Automating Administration - Software Installations with PowerShell – Part 1
This video explains PowerShell and helps you understand ways to install and download the applications/tools with the help of PowerShell.
<
br/>
This clip is from the chapter "PowerShell to Install Software on Multiple Remote...
<
br/>
This clip is from the chapter "PowerShell to Install Software on Multiple Remote...
Curated Video
Recommender Systems with Machine Learning - Quiz
This is a quiz video on the concepts learned in this module/section.
<
br/>
This clip is from the chapter "Machine Learning for Recommender System" of the series "Recommender Systems with Machine Learning".This section focuses on...
<
br/>
This clip is from the chapter "Machine Learning for Recommender System" of the series "Recommender Systems with Machine Learning".This section focuses on...
Curated Video
Chatbots for Beginners: A Complete Guide to Build Chatbots - Overview of Chatbots: Quiz
This video is a quiz/exercise based on the concepts learned in this section so far.
<
br/>
This clip is from the chapter "Basics of Chatbots with Machine Learning and Python" of the series "Chatbots for Beginners: A Complete Guide...
<
br/>
This clip is from the chapter "Basics of Chatbots with Machine Learning and Python" of the series "Chatbots for Beginners: A Complete Guide...
Curated Video
CISSP Crash Course - Threat Modeling
This video explains threat modeling and identifying threats.
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Curated Video
Master SQL for Data Analysis - Distinct Values (DISTINCT)
Let's explore the way to find distinct values among multiple rows of data as part of a preliminary preparation process.
<
br/>
This clip is from the chapter "SQL - Retrieving Data with Queries" of the series "Master SQL for Data...
<
br/>
This clip is from the chapter "SQL - Retrieving Data with Queries" of the series "Master SQL for Data...
Curated Video
Master SQL for Data Analysis - Null Values
In this video, you will learn what a null value is, how it affects the functioning of a table, and how to be careful when analyzing null values.
<
br/>
This clip is from the chapter "Databases - Terminology" of the series "Master...
<
br/>
This clip is from the chapter "Databases - Terminology" of the series "Master...
Curated Video
Master SQL for Data Analysis - Primary and Foreign Keys
In this video, we will look at a primary key used to identify a row in a table and a foreign key used to navigate from one table to another.
<
br/>
This clip is from the chapter "Databases - Terminology" of the series "Master SQL...
<
br/>
This clip is from the chapter "Databases - Terminology" of the series "Master SQL...
Curated Video
ChatGPT and Prompt Engineering With Advanced Data Analysis - How to Identify Whether the Content Is AI-Generated or Human-Written?
In this lecture, we will identify if the content is generated by AI or written by a human. We will discuss the characteristics and patterns of language that may indicate the use of AI-generated content and how to distinguish it from...
Curated Video
ChatGPT and Prompt Engineering With Advanced Data Analysis - Continuing with VLookUp
Continuing on the previous video, this video will provide advanced techniques for using VLookUp in Excel with the assistance of ChatGPT. We will apply VLookUp in more complex scenarios, such as nested and multiple criteria VLookUp, and...
Curated Video
ChatGPT and Prompt Engineering With Advanced Data Analysis - Creating a Computer Program and Debugging
In this video, you will learn to use ChatGPT to create a computer program and effectively debug it. We will use ChatGPT's capabilities to generate code snippets, optimize algorithms, and identify and fix bugs, leveraging ChatGPT3 as a...
Curated Video
Alteryx Advanced - Machine Learning Part 5
This video covers best practices for building and deploying ML models in Alteryx, providing examples of how machine learning can be used to solve specific business problems, customer segmentation, fraud detection, and churn...