Instructional Video6:56
Curated Video

Learn Java from Scratch - A Beginner's Guide - Step 08 - List and ArrayList - Choosing Iteration Approach for Printing and Delete

Higher Ed
In this video, you will learn about list and ArrayList—choosing iteration approach for printing and deleting.
Instructional Video4:37
Curated Video

Learn Java from Scratch - A Beginner's Guide - Step 03 - List Interface - Immutability and Introduction of Implementations – Array

Higher Ed
In this video, we will explore the concept of immutability in the context of the List interface and discuss the array implementation as an introduction to different list implementations available in Java.
Instructional Video7:05
Curated Video

Learn Java from Scratch - A Beginner's Guide - Step 02 - List Interface - Introduction - Position Is King

Higher Ed
In this video, you will learn about the list interface and its introduction. The concept of "position is king" will be emphasized throughout the discussion.
Instructional Video2:59
Curated Video

Learn Java from Scratch - A Beginner's Guide - Step 07 - List and ArrayList - Iterating Around Elements

Higher Ed
In this video, you will learn about list and ArrayList—iterating around elements.
Instructional Video7:55
Curated Video

Beyond Anorexia and Bulimia: Exploring the Spectrum of Eating Disorders

6th - Higher Ed
Dive deep into the lesser-known world of eating disorders that affect a significant percentage of the population. From neophobia, where individuals fear new foods, to those who only consume foods of a specific color or texture, explore...
Instructional Video6:41
Curated Video

Deep Learning - Crash Course 2023 - MP Neuron Introduction

Higher Ed
In this video, you will learn about the MP Neuron model, also called McCulloch Pitts model. This clip is from the chapter "MP Neuron Model" of the series "Deep Learning - Crash Course 2023".In this section, you will learn how to build...
Instructional Video3:16
Curated Video

Deep Learning - Crash Course 2023 - Bias

Higher Ed
In this video, you will learn about bias in neural networks. This clip is from the chapter "Getting the Basics Right" of the series "Deep Learning - Crash Course 2023".In this section, you will learn some basic terms used in deep learning.
Instructional Video3:49
Curated Video

Advanced Chatbots with Deep Learning and Python - Max Story and Question Length

Higher Ed
In this video, you will learn to define the project's story length and question length, determined by the number of words in the story or question.
Instructional Video1:47
Curated Video

Advanced Chatbots with Deep Learning and Python - Encoder Decoder

Higher Ed
In this video, we will understand what encoder and decoder are, their architecture, and long short-term memory (LSTM), a neural network used in deep learning.
Instructional Video5:52
Curated Video

Advanced Chatbots with Deep Learning and Python - Conventional Versus AI Chatbots

Higher Ed
In this video, we will understand conventional and artificial intelligence-based chatbots and understand the differences between the two kinds.
Instructional Video1:52
Curated Video

Fundamentals of Secure Software - IAST (Interactive Application Security Testing)

Higher Ed
This video demonstrates IAST (Interactive Application Security Testing).
Instructional Video1:57
Curated Video

Fundamentals of Secure Software - DAST (Dynamic Application Security Testing)

Higher Ed
This video demonstrates DAST (Dynamic Application Security Testing).
Instructional Video5:33
Curated Video

Fundamentals of Secure Software - SAST (Static Application Security Testing)

Higher Ed
This video provides an introduction to SAST (Static Application Security Testing).
Instructional Video3:03
Curated Video

Fundamentals of Secure Software - Use, Abuse, and Misuse cases

Higher Ed
This video focuses on the use, abuse, and misuse cases.
Instructional Video5:20
Curated Video

Fundamentals of Secure Software - Password Management

Higher Ed
This video explains how to handle passwords securely.
Instructional Video5:48
Curated Video

Fundamentals of Secure Software - Hashing Overview

Higher Ed
This video provides an introduction and overview of hashing.
Instructional Video7:14
Curated Video

Fundamentals of Secure Software - Introduction to Threat Modeling

Higher Ed
This video provides an introduction to threat modeling.
Instructional Video6:47
Curated Video

Fundamentals of Secure Software - Source Code Review

Higher Ed
This video explains how to perform a secure code review.
Instructional Video7:28
Curated Video

Fundamentals of Secure Software - Vulnerable and Outdated Components

Higher Ed
This video explores using components with known vulnerabilities.
Instructional Video5:24
Curated Video

Fundamentals of Secure Software - Broken Access Control

Higher Ed
This video talks about Broken authentication.
Instructional Video8:55
Curated Video

Fundamentals of Secure Software - API Security

Higher Ed
This video explains API security.
Instructional Video6:49
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - AWS Compliance Program

Higher Ed
AWS implements templates and recommended architectures that comply with various regulatory constraints under the AWS compliance program. This video introduces the compliance program and reveals where you can get detailed information...
Instructional Video3:28
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Multi-Factor Authentication

Higher Ed
What if you don't trust a single authentication method, such as a username and password pair? Then you can use multi-factor authentication, which is presented in this video.
Instructional Video7:04
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Identity and Access Management (IAM) Overview

Higher Ed
How do you control who or what has access to your AWS account and the services running in it? The answer is Identity and Access Management (IAM) and this video introduces the fundamental concepts of IAM.