Instructional Video7:40
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Security Policies

Higher Ed
NTFS permissions control files and folders, but there are plenty of other resources that need control. Security policies control factors such as login attempts, printer access, and password length/complexity. This clip is from the...
Instructional Video8:41
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Documents You Need to Know

Higher Ed
Good techs must be comfortable with the common documentation used by IT departments everywhere. From hardware inventory to network diagrams to the many policies used in our industry, tech should know when and how documentation comes into...
Instructional Video6:32
Healthcare Triage

The Unequal Impacts of Climate Change

Higher Ed
Climate change is driven by humans and will affect us all. But it’s not driven by everyone equally, and it doesn’t affect everyone equally. In the last 250 years, 77% of global emissions were emitted by Europe, North America, Australia,...
Instructional Video6:39
Healthcare Triage

Ways We Can Mitigate Climate Change

Higher Ed
We’ve spent a bunch of time this year examining the many, many health effects of climate change. And while we are no experts on climate change and what the best solutions are to address it, we are clearly interested in addressing it for...
Instructional Video9:44
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Troubleshooting Theory

Higher Ed
The CompTIA A+ defines a very specific workflow process to troubleshoot any problem on a system. These steps will help you mentally break down the steps to diagnose and repair a computer problem. This clip is from the chapter "Book...
Instructional Video11:59
Curated Video

CISSP Crash Course - Security Governance

Higher Ed
This video explains security policy and how to apply security governance. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Instructional Video8:40
Curated Video

CISSP Crash Course - Personnel Security Policies and Procedures

Higher Ed
This video explains personnel security policies and procedures. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Instructional Video4:24
Curated Video

CISSP Crash Course - Policy, Standards, Procedures, and Guidelines

Higher Ed
This video explains policy, standards, procedures, and guidelines. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Instructional Video3:03
Curated Video

HashiCorp Certified - Vault Associate Course - Vault Authentication Using the API

Higher Ed
This video helps you with the Vault authentication using the API. This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on comparing...
Instructional Video7:11
Curated Video

HashiCorp Certified - Vault Associate Course - Managing Tokens Using the CLI

Higher Ed
In this video, we will discuss how to use the Vault CLI to manage Vault tokens. This clip is from the chapter "Assess Vault Tokens" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on the Assess Vault...
Instructional Video11:43
Curated Video

HashiCorp Certified - Vault Associate Course - Introduction to Vault Tokens

Higher Ed
This video provides an introduction to Vault tokens. This clip is from the chapter "Assess Vault Tokens" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on the Assess Vault tokens.
Instructional Video2:50
Curated Video

HashiCorp Certified - Vault Associate Course - Exam Tips for Objective 2

Higher Ed
In this video, we will provide some exam tips for Objective 2 of the HashiCorp Certified Vault Associate certification exam. You will see some exam tips for Objective 2 to ensure that you are ready to tackle the questions related to this...
Instructional Video6:38
Curated Video

HashiCorp Certified - Vault Associate Course - Working with Policies

Higher Ed
In this video, you will learn working with the Vault policies on a day-to-day basis. This clip is from the chapter "Create Vault Policies" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on creating...
Instructional Video2:18
Curated Video

HashiCorp Certified - Vault Associate Course - Anatomy of a Vault Policy

Higher Ed
In this video, we will explore the anatomy of a HashiCorp Vault policy and how to write effective policies for securing Vault resources. When writing policies, it's important to understand the two parts that make up a policy. This clip...
Instructional Video8:57
Curated Video

HashiCorp Certified - Vault Associate Course - Introduction to Vault Policies

Higher Ed
This video provides an introduction to Vault policies. You will learn why policies are important in Vault and how they are used to secure your environment. This clip is from the chapter "Create Vault Policies" of the series "HashiCorp...
Instructional Video9:26
Curated Video

HashiCorp Certified - Vault Associate Course - Lab—Vault Entities

Higher Ed
This is a lab video on Vault entities. This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on comparing authentication methods.
Instructional Video11:18
Curated Video

Oracle Database Administration from Zero to Hero - Creating an Oracle Database (Part 3 of 3)

Higher Ed
In this video, we will continue the process of creating an Oracle database by exploring topics such as responding to the DBCA window, working with sample schemas, dropping Oracle databases, and following guidelines for creating Oracle...
Instructional Video8:25
Curated Video

Oracle Database Administration from Zero to Hero - Configuring RMAN Persistent Settings (Part 1 of 2)

Higher Ed
In this video, we will focus on configuring RMAN persistent settings. You will learn how to set the RMAN backup retention policy, which determines how long backup data is retained. This clip is from the chapter "Database Recovery" of the...
Instructional Video2:16
Curated Video

Design Microservices Architecture with Patterns and Principles - What Is Clean Architecture?

Higher Ed
In this video, we will delve deeper into the principles and components of Clean Architecture. We will explore the Dependency Rule, which governs the direction of dependencies within the system, and understand how it helps achieve...
Instructional Video8:28
Curated Video

Design Microservices Architecture with Patterns and Principles - Microservices Resilience, Observability, Monitoring Code Review - E-Commerce App

Higher Ed
In this video, a code review is conducted for the microservices' resilience, observability, and monitoring aspects in the e-commerce application. We will explore the codebase related to resilience patterns, logging, distributed tracing,...
Instructional Video3:43
MarketWatch

How to lower your home insurance premium

Higher Ed
Homeowners insurance costs are on the rise across the country. But there are still things you can do to reduce your monthly bill. Here are some tips to consider.
Instructional Video5:18
Curated Video

Power in Organizations: The Power of Governance

10th - Higher Ed
In this video, we will look at the power organizations derive from their governance structures and processes.
Instructional Video10:59
Financial Times

Al Gore on Big Oil, COP28, and the fight for climate action

Higher Ed
The former US vice-president tells Simon Mundy, at the start of the FT's Moral Money Summit Americas, why he thinks this year's COP28 climate change talks in the United Arab Emirates look likely to fail, and what it will take for the...
Instructional Video4:47
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - IAM Custom Policies (Guide)

Higher Ed
Let's understand how to apply the custom JSON policies explored in the last lecture to a new user created.