Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Embedded Systems
Embedded systems use an operating system burned into one or more chips and have a defined function, such as running an elevator or proving Wi-Fi services. In this episode, Industrial Control Systems, Internet of Things (IoT), Raspberry...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Creating Linux Users and Groups Lab
User and group management in Linux can be performed at the command line. This demo makes use of the user add and group add commands to create authentication identities. This clip is from the chapter "Identity and Account Management" of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Containers and Software-Defined Networking
Modern software development often uses application containers which serve as a logical boundary for app files and settings outside of the operating system. This episode also covers Software-Defined Networking (SDN). This clip is from the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Centralized Logging
Network infrastructure and host and application logs can be stored centrally such as with Linux or Windows log forwarding. This can then be fed into a centralized log ingestion and analysis system, otherwise called SIEM. This clip is...
Curated Video
Explain web security : The Course Overview
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
The Wall Street Journal
IBM CEO Arvind Krishna On AI, Quantum Computing, The Cloud and Beyond
IBM's newly appointed CEO, Arvind Krishna shares how he plans to reshape the legacy tech company into a top player in artificial intelligence and quantum computing.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Weak Configurations
A lack of secure configurations for networks, devices, and hosts results in an increased attack surface. Default settings, especially credentials, should not be used. Deprecated security protocols such as WEP and SSL should also be...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Log Files
Log files can provide valuable insights related to suspicious network, host or application activity, but only if log file integrity can be ensured. Centralized logging in the enterprise on a secured logging host ensures an accurate copy...
Curated Video
Apache Spark 3 for Data Engineering and Analytics with Python - Java Installation
We will be installing Java SE in this session (Windows). This clip is from the chapter "Introduction to Spark and Installation" of the series "Apache Spark 3 for Data Engineering and Analytics with Python".This section will give you a...
Curated Video
Complete Python Scripting for Automation - Linux for Developers on Windows
Windows Subsystem for Linux: Linux for Developers on Windows This clip is from the chapter "Windows Subsystem for Linux" of the series "Complete Python Scripting for Automation".The author explains about Linux for developers on Windows...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Linux Command-Line Tools
Security technicians must be comfortable with Linux commands for standard maintenance and security tasks using commands such as head, tail, grep, dig, and setting filesystem permissions with chmod. This clip is from the chapter "Tools of...
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- Additional Storage Options
In this video, we'll learn about Additional Storage Options. This clip is from the chapter "AWS Compute Services" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is about AWS compute services in...
Curated Video
Bash Shell Scripting- Environmental Set up to practice Bash shell scripting
This video shows how to set up the environment to practice Bash shell scripting. This clip is from the chapter "Introduction" of the series "Complete Bash Shell Scripting".This section introduces you to the course and helps you with the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Touring the CLI
The Command-Line Interface (CLI) allows technicians to interact with Windows, Linux, and MacOS systems by typing in commands such as ping and ipconfig. Windows uses a command prompt, MacOS uses a terminal shell, and Linux can use a...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Shells
Shells allow technicians to enter commands, such as a Linux bash shell or a Windows command prompt. Reverse shells are the result of infected victim machines that reach out to an attacker station. This clip is from the chapter "Tools of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Password Cracking
Passwords are often stored in hash format but can still be susceptible to attacks. The various password attacks include brute force, dictionary, and rainbow table. Salting and key stretching add another layer of security to hashed...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Security Assessment Tools
Open-source and proprietary (paid) security assessment tools are used by security analysts and malicious actors; what differs is the reason they are being used. The scanless tool uses web sites to perform port scans while the hping3 tool...
Curated Video
Apache Kafka - Real-time Stream Processing (Master Class) - Setting up Apache Kafka Development Environment
This video sets up Apache Kafka development environment. This clip is from the chapter "Appendix" of the series "Apache Kafka - Real-time Stream Processing (Master Class)".This section sets up Apache Kafka development environment.
Curated Video
Bash Shell Scripting - Process, Parent Process, Child Process, & Process ID (PID)
This video focusses on process, parent process, child process & PID. This clip is from the chapter "Process Handling and Running Scripts" of the series "Mastering Bash Shell Scripting: Automate your daily tasks [Updated for 2021]".This...
Curated Video
Complete Python Scripting for Automation - Practice script on platform and os module
OS Module: Practice script on platform and os module This clip is from the chapter "OS Module" of the series "Complete Python Scripting for Automation".In this section, the author introduces OS Module and Basic operation like os.path...
Curated Video
Learn Git in 3 Hours- What Is Version Control?
Learn what Version Control is as a concept, what it is used for, and why it can be so useful for software developers. • Overview of Version Control as an abstract concept • Look at an outline of Version Control’s major benefits • Explain...
Curated Video
Complete Python Scripting for Automation - Python setup on Linux (Installing required python on Linux)
Introduction: Python setup on Linux (Installing required python on Linux) This clip is from the chapter "Introduction" of the series "Complete Python Scripting for Automation".The author introduces the course and talks about Python setup...
APMonitor
Install Julia on Windows and Linux with Jupyter Notebook
Julia is a language that combines the ease of programming of MATLAB or Python with the speed of C or Java. This tutorial shows how to install Julia 0.5.0 on Windows or Linux (Ubuntu) and manage add-on packages.
Curated Video
Bash Shell Scripting- what is #!/usr/bin/env bash ?
This video explains #!/usr/bin/env bash. This clip is from the chapter "Basics of shell scripting" of the series "Complete Bash Shell Scripting".This section covers the basics of shell scripting.