Instructional Video6:02
TED Talks

TED: Europe's plan to become the first carbon-neutral continent | Ursula von der Leyen

12th - Higher Ed
With the ambitious goal of becoming the first carbon-neutral continent by 2050, the European Union has committed to creating a greener world for future generations. In this bold talk, Ursula von der Leyen, President of the European...
Instructional Video17:04
TED Talks

TED: How labor unions shape society | Margaret Levi

12th - Higher Ed
The weekend. Social Security. Health insurance. What do these things have in common? They all exist thanks to the advocacy of labor unions. Political economist Margaret Levi explains how these organizations forge equality and protect...
Instructional Video18:19
TED Talks

TED: The ethical dilemma of designer babies | Paul Knoepfler

12th - Higher Ed
Creating genetically modified people is no longer a science fiction fantasy; it's a likely future scenario. Biologist Paul Knoepfler estimates that within fifteen years, scientists could use the gene editing technology CRISPR to make...
Instructional Video8:06
Let's Tute

Understanding the key aspects of Insurance

9th - Higher Ed
In this session you will understand the different key aspects of Insurance. 1] Transaction Cycle 2] Claim Settlement Procedure 3] Exclusions 4] Nomination and Assignments In the transactions cycle you will know the research on insurance....
Instructional Video11:12
Curated Video

The History of Cracker Barrel

12th - Higher Ed
Weird History Food is talking about the history of Cracker Barrel. We're pulling off on the next exit because we saw a billboard for the Cracker Barrel. Originally built as a filling station, we're going to show you how Cracker Barrel...
Instructional Video4:55
Curated Video

Should a Project Manager Get Involved in Contract Negotiations?

10th - Higher Ed
Should a Project Manager get involved in Contract Negotiations? This is the essence of a question I was asked. If we leave the negotiations entirely to procurement teams, then decisions will be based on: • Procurement rules • Simplistic...
Instructional Video5:54
Curated Video

European Space Agency's Exciting Missions and Future Plans in 2005

Pre-K - Higher Ed
In 2005, the European Space Agency achieved significant milestones in space exploration and technology. From landing on Titan and sampling its atmosphere to launching the heaviest commercial launcher, the Arian 510 ton, Europe made great...
Instructional Video7:38
Curated Video

What is Business Analysis? And what is a Business Analyst?

10th - Higher Ed
Project Management and Business Analysis. It's like strawberries and cream - you can't have one without another. But what is Business Analysis and what does a Business Analyst do? Business Analysis is the process of identifying business...
Instructional Video3:23
Curated Video

What are Project Constraints?

10th - Higher Ed
Some things constrain the choices you can make, when you plan and deliver your project. They get in your way and it will not do, to ignore​ them. So, what are Project Constraints?
Instructional Video6:00
Curated Video

Practical Cyber Hacking Skills for Beginners - Creating a Sample Outbound Rule

Higher Ed
In this lesson, we will look at creating a sample outbound rule; we will test it out by trying to block internet access by setting outbound rules for the Google Chrome browser.
Instructional Video4:03
Wonderscape

King Charles III's Coronation: Tradition Meets Modern Values

K - 5th
King Charles III's coronation on May 6, 2023, balanced royal tradition with contemporary touches. From a gospel choir performance to sustainable choices in his attire and ceremony, the King brought a modern sensibility to the historic...
Instructional Video14:55
Curated Video

Hands-On Continuous Integration and Automation with Jenkins - Configure the EC2 Plugin

Higher Ed
This video introduces AWS concepts like IAM policy, IAM user, and AMI, and shows how to add AWS credentials to Jenkins and install and configure the EC2 plugin.
Instructional Video6:30
Curated Video

Data Science Model Deployments and Cloud Computing on GCP - Lab - Set Up Alerting for Cloud-Run Applications

Higher Ed
In this lab video, you will be setting up an alerting system for cloud-run applications. This clip is from the chapter "Cloud Scheduler and Application Monitoring" of the series "Data Science Model Deployments and Cloud Computing on...
Instructional Video5:06
Curated Video

Fundamentals of Secure Software - Security Models

Higher Ed
This video explains the various security models and their purpose.
Instructional Video5:11
Curated Video

Fundamentals of Secure Software - CSP (Content Security Policy)

Higher Ed
This video demonstrates the Content Security Policy.
Instructional Video6:59
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Data Security Policies

Higher Ed
It would be remiss to discuss database design without addressing policies. We discussed security in general earlier and now will explain why policies are important.
Instructional Video12:30
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Authorization Policies

Higher Ed
Once authenticated, the user will have full capabilities or limited capabilities based on permissions within AWS. A primary method of permission management is authorization policy, which is covered here.
Instructional Video7:04
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Identity and Access Management (IAM) Overview

Higher Ed
How do you control who or what has access to your AWS account and the services running in it? The answer is Identity and Access Management (IAM) and this video introduces the fundamental concepts of IAM.
Instructional Video6:58
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Endpoints

Higher Ed
What if you want services to access other services indirectly? You can use endpoints. Unlike the traditional term in networking, AWS uses the term endpoint to refer to something different. This video explains how AWS uses the term.
Instructional Video9:48
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Storage Access Security Lab

Higher Ed
Creating storage solutions in Amazon Web Services (AWS) is one thing, and it is another thing to ensure their security. In this video, you will explore the storage security features of AWS, including the console and CLI.
Instructional Video13:00
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - IAM…What?

Higher Ed
In this video, we will understand the Identity and Access Management (IAM) service used to secure access to AWS services, manage the root account, create users, group permissions, roles, and more.
Instructional Video8:13
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Policy Conditions

Higher Ed
Policy conditions impact when and how a policy is applied in AWS. In this video, you will see how to create an IAM policy and define policy conditions.
Instructional Video8:10
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - IAM Roles

Higher Ed
When you want an application or CLI interface to access AWS and its services, you can use IAM roles. This video explores the process used to create and manage roles in AWS.
Instructional Video5:02
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Principle of Least Privilege

Higher Ed
One of the biggest and most common mistakes made in security management is granting too many permissions to a user. The principle of least privilege can assist in preventing this and it is covered in this video.