Instructional Video3:49
Curated Video

Learn Java from Scratch - A Beginner's Guide - Step 19 - Java Interface Versus Abstract Class - a Comparison

Higher Ed
In this video, we will explore the similarities and differences between Java interfaces and abstract classes and discuss the scenarios where one might be more appropriate than the other for a given programming task.
Instructional Video10:57
Curated Video

Fundamentals of Secure Software - Encryption Use Cases

Higher Ed
This video focuses on various use cases for encryption.
Instructional Video2:12
Curated Video

Fundamentals of Secure Software - Penetration Testing

Higher Ed
This video explains penetration testing.
Instructional Video4:16
Curated Video

Fundamentals of Secure Software - PKI (Public Key Infrastructure)

Higher Ed
This video explains the PKI (Public Key Infrastructure) and how it is used.
Instructional Video8:55
Curated Video

Fundamentals of Secure Software - API Security

Higher Ed
This video explains API security.
Instructional Video3:57
Curated Video

A Detailed Guide to the OWASP Top 10 - API10:2023 Unsafe Consumption of APIs

Higher Ed
In this video, we will delve into the dangers of Unsafe Consumption of APIs, emphasizing the need for secure API usage practices.
Instructional Video6:46
Curated Video

A Detailed Guide to the OWASP Top 10 - API9:2023 Improper Inventory Management

Higher Ed
In this session, we will address the challenges of Improper Inventory Management in API ecosystems and propose solutions for better management.
Instructional Video11:03
Curated Video

A Detailed Guide to the OWASP Top 10 - API4:2023 Unrestricted Resource Consumption

Higher Ed
In this video, explore how Unrestricted Resource Consumption can affect API performance and security, and how to protect against it.
Instructional Video2:02
Curated Video

A Detailed Guide to the OWASP Top 10 - Software and Data Integrity Failures Prevention

Higher Ed
This video explains how we can prevent software and data integrity failures.
Instructional Video2:20
Curated Video

A Detailed Guide to the OWASP Top 10 - #6 Vulnerable and Outdated Components Prevention

Higher Ed
This video explains how to prevent vulnerable and outdated components from becoming an issue.
Instructional Video3:28
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Multi-Factor Authentication

Higher Ed
What if you don't trust a single authentication method, such as a username and password pair? Then you can use multi-factor authentication, which is presented in this video.
Instructional Video10:56
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Power Management

Higher Ed
Saving power is important, especially on mobile devices and laptops. Every CPU has a built-in feature to shut down different parts of a computer to reduce power needs. It's up to the techs to make sure the power management settings are...
Instructional Video4:47
Curated Video

Social Media Automation using Python - Linking Gmail with SMTP

Higher Ed
This video demonstrates how to link a Gmail account with the SMTP client or server to send automated emails. This clip is from the chapter "Email Automation" of the series "Social Media Automation Using Python".This section focuses on...
Instructional Video7:04
Curated Video

CISSP Crash Course - Supply Chain Risk

Higher Ed
This video explains supply chain risk management and the minimum-security requirements. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on...
Instructional Video3:49
Curated Video

CISSP Crash Course - Design and Validate Assessment, Test, and Audit

Higher Ed
This video explains design and validate assessment, tests, internal and external audits. This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which focuses on...
Instructional Video4:30
Curated Video

CISSP Crash Course - Security Controls from Requirements

Higher Ed
This video explains common criteria guidelines for security controls. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and...
Instructional Video2:34
Curated Video

CISSP Crash Course - Asset Retention

Higher Ed
This video explains asset retention, end-of-life, end-of-support, and end-of-service-life. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security,...
Instructional Video4:58
Curated Video

The Friendly Letter

K - 8th
Mr. Griot describes the characteristics of a friendly letter. He also models writing a rough draft of a friendly letter.
Instructional Video4:38
Curated Video

Resolving Conflict

3rd - 8th
Dr. Forrester explains what a conflict is and then describes some techniques for resolving a conflict.
Instructional Video5:05
Curated Video

The Buildup to the American Revolution

3rd - Higher Ed
Dr. Forrester talks about taxation, religious freedom, and other important issues that led the colonists to break away from Great Britain.
Instructional Video2:18
Curated Video

What is Presidents' Day?

9th - Higher Ed
Every year, on the third Monday of February, Americans celebrate Presidents’ Day. A federal holiday that originally began as a birthday celebration for George Washington, the first President of the United States.
Instructional Video6:16
Brainwaves Video Anthology

Tim Alberta - American Carnage: On the Front Lines of the Republican Civil War and the Rise of President Trump

Higher Ed
Tim Alberta, a staff writer for The Atlantic magazine and author of "American Carnage," discusses the transformation of the Republican Party during the transition from George W. Bush to Donald Trump. He highlights how various societal,...
Instructional Video6:12
Curated Video

Borrowing to Solve Subtraction Problems

K - 8th
Mr. Addit reviews the two subtraction methods, the traditional method and the counting back strategy.
Instructional Video5:40
Curated Video

Factors

K - 8th
Mr. Addit explains how to find factors of a number by using the multiplication facts we know.