Instructional Video6:08
Curated Video

Linux Network Administration - Tracing Network Traffic - Traceroute

Higher Ed
This video explains how to troubleshoot any network issue in the environment using traceroute.
Instructional Video10:27
Curated Video

Linux Network Administration - File Transfer Commands

Higher Ed
This video explains file transfer commands used to transfer files from one server to another.
Instructional Video7:47
Curated Video

Linux Network Administration - Downloading Files and Apps

Higher Ed
This video explains how to download files and applications in Linux using the wget command.
Instructional Video17:45
Curated Video

Linux Network Administration - NIC Bonding

Higher Ed
This video explains one of the very important and critical aspect of Linux, which is NIC bonding.
Instructional Video9:28
Curated Video

Linux Network Administration - Network Files and Commands

Higher Ed
This video explains network files and commands that helps us configure the machine.
Instructional Video3:03
Curated Video

Linux Network Administration - Network Components

Higher Ed
This video explains the network components in Linux, which helps in building or installing Linux machines.
Instructional Video3:03
Curated Video

Linux Network Administration - Enabling Internet in Linux

Higher Ed
This video explains how to enable internet access in the virtual machine.
Instructional Video3:31
Curated Video

Linux Network Administration - Course Overview

Higher Ed
This video explains the concepts that the author will cover in the course.
Instructional Video5:45
Instructional Video2:33
Curated Video

A Detailed Guide to the OWASP Top 10 - API8:2023 Security Misconfiguration

Higher Ed
In this video, explore Security Misconfiguration risks in APIs, highlighting common misconfigurations and how to secure API settings.
Instructional Video4:45
Curated Video

A Detailed Guide to the OWASP Top 10 - API7:2023 Server Side Request Forgery

Higher Ed
In this session, tackle the issue of Server Side Request Forgery (SSRF) in APIs, including detection and prevention strategies.
Instructional Video4:14
Curated Video

A Detailed Guide to the OWASP Top 10 - #2 Cryptographic Failures

Higher Ed
This video explains A02: 2021 - cryptographic failures, which focuses on failures related to cryptography.
Instructional Video3:43
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Securing Your Home Router

Higher Ed
In this video, you will learn how to enhance the security of your home router by discovering the IP address associated with it. Gain valuable insights on securing your router effectively. This clip is from the chapter "Internet and...
Instructional Video8:01
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Using VPNs

Higher Ed
In this video, you will learn about a security tool called Virtual Private Network or a VPN, which is used to provide a secure connection to another network over the Internet. This clip is from the chapter "Internet and Browsing...
Instructional Video6:59
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Data Security Policies

Higher Ed
It would be remiss to discuss database design without addressing policies. We discussed security in general earlier and now will explain why policies are important.
Instructional Video9:54
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Working with Security Groups

Higher Ed
You might wonder how you can control who has access to the EC2 instances you implement. One method is with the use of security groups and this video introduces the concept.
Instructional Video7:56
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Gateways (VPGs and CGWs)

Higher Ed
Do you want to connect your local network to AWS in a seemingly permanent way that is also secure? If so, you need to understand VPGs and CGWs, the topic of this video.
Instructional Video7:43
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - VPC Peering

Higher Ed
When you have more than one VPC, you may want them connected so that instances in one can talk to instances in another and vice versa. This video explains how this is done with VPC peering.
Instructional Video4:47
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Elastic Network Interfaces (ENIs)

Higher Ed
Virtual servers need virtual network interfaces. In AWS, these interfaces are called Elastic Network Interfaces (ENIs). This video introduces the concept and use of ENIs.
Instructional Video4:19
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Configuring DHCP Options Lab

Higher Ed
You can configure some DHCP options for the devices that participate in your VPC. This video shows you how to configure these options.
Instructional Video9:47
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Virtual Private Cloud (VPC) Overview

Higher Ed
An organization can internally run its own cloud solutions, called a private cloud. AWS provides the same concept in their cloud, and they call it the Virtual Private Cloud (VPC). This video introduces the VPC concept.
Instructional Video6:27
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Storage Services

Higher Ed
Amazon Web Services (AWS) offers many storage functions. Many cloud services provide storage alone, but AWS offers advanced storage services and many compute services. This video introduces the array of storage services offered.
Instructional Video8:13
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Cloud Computing Defined

Higher Ed
What exactly is cloud computing? In this video, you will learn the answer to this important question and discover some examples of cloud computing service providers.
Instructional Video2:29
Curated Video

Recommender Systems Complete Course Beginner to Advanced - Project Amazon Product Recommendation System: Two-Tower Model

Higher Ed
This lecture elaborates on the two-tower model, which we have already seen in the previous projects and modules of the course.