Curated Video
Fundamentals of Secure Software - CSP (Content Security Policy)
This video demonstrates the Content Security Policy.
Curated Video
Fundamentals of Secure Software - Cross-Site Scripting
This video explains cross-site scripting.
Curated Video
A Detailed Guide to the OWASP Top 10 - #1 Broken Access Control
This video explains A01:2021 - broken access control, which is the most significant security risk-facing application.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Integrating On-Premises Storage
How might you integrate storage at your location with Amazon Web Services (AWS) storage? This video introduces the AWS features that allow you to incorporate storage in this way.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Introduction to Amazon FSx
Short on time, but need to launch a robust, fully-managed file system quickly? Try Amazon's FSx, which can be configured to work with Windows File Server or Lustre, the high-performing file system from AWS.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Services, Part 2
This video continues the Amazon Web Services (AWS) offerings tour, finishing up where we left off in the previous video. By the end of this video, you will have a birds-eye view of the AWS services.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - DynamoDB
DynamoDB is a database solution used frequently for data stream capture and small, fast reads and writes. This video introduces DynamoDB.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Elastic Load Balancing (ELB)
What can you use to implement multiple servers to enhance performance or fault tolerance? In AWS, you can use Elastic Load Balancing (ELB), which is introduced in this video.
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Fuzzing with Burp Suite Intruder Overview
This video provides you with an overview of Fuzzing with the help of Burp Suite Intruder. This clip is from the chapter "Fuzzing with Burp Suite Intruder" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Variables and Types
This video explains the variables and types in Swift programming.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - What Is an Operating System
This video explains what an operating system is. This clip is from the chapter "The Visible Computer" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section explains the common safety procedures and hardware concerns as...
Curated Video
ChatGPT and DALL-E: Sell Your Creative Thinking with AI - How to Address AI Bias in Creative Work
In this video, we will explore some ways to address bias in creative work that involves AI systems. We will discuss the importance of being aware of bias and provide some tips on how to mitigate bias in your AI-generated content. This...
Curated Video
The Art of Doing - Web Development for Beginners - JavaScript Data Types
In this video, we will dive into different data types in JavaScript, including strings, numbers, Booleans, objects, and undefined. You will learn how to work with these data types and understand their properties and methods. This clip is...
Curated Video
Blender to Unreal Engine - Become a Dungeon Prop Artist - Direct and Infinite Light Sources
In this lesson, you will learn how to make use of light sources to light up your assets better.
Curated Video
Seasonal Changes and Their Impact on Life
Discover how seasons impact life across the globe. Learn why humans may feel down or eat more in winter, how animals like bears and tortoises hibernate to conserve energy, and why trees lose leaves to survive the cold. This guide...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Recycling and Data Destruction
Disposing of old computer gear means using environmentally friendly methods and wiping all your data from any storage devices. Batteries in computers need to go to special recycling centers. Data wiping methods take many forms, from...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Data You Need to Know
Data is everywhere in our networks. Good techs understand the types of data used on networks and how to handle that data from a business, legal, and moral standpoint. Organizing our data also helps us understand the types of protections...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Documents You Need to Know
Good techs must be comfortable with the common documentation used by IT departments everywhere. From hardware inventory to network diagrams to the many policies used in our industry, tech should know when and how documentation comes into...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Internet of Things (IoT)
Author explores some of the latest and greatest networking technologies with the Internet of Things (IoT). He describes the three common wireless technologies used to connect to IoT devices, 802.11, Zigbee, and Z-wave. The author...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Troubleshooting Wireless Connections
There are few worse feelings than a wireless connection that just doesn't…connect. In situations like this, good tech will have the right tools and skills to diagnose and repair the issue. This clip is from the chapter "Wireless...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Network Address Translation (NAT)
You'd be hard-pressed to find a home or small office router that isn't using Network Address Translation (NAT). NAT provides some amazing benefits but also has some serious limitations. This clip is from the chapter "Local Area...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Backing Up Your Data in Windows
Windows has provided many different tools over the years to enable techs (and users) to back up important files. A good tech knows these Windows tools to help their users recover data when things go wrong. This clip is from the chapter...
Curated Video
Behavioral Design Patterns in C++ - Spreadsheet Application - V
In this final video of the series, we will complete the implementation of the strategy pattern. This clip is from the chapter "Strategy" of the series "Behavioral Design Patterns in C++".In this section, you will learn about the strategy...
Curated Video
Behavioral Design Patterns in C++ - Overload Pattern
This video talks about the Overload pattern. This clip is from the chapter "Visitor" of the series "Behavioral Design Patterns in C++".This section focuses on the Visitor pattern.