Curated Video
Linux Operating System: A Complete Linux Guide for Beginners - Networking - Introduction
In this video, we will get introduced to some basic network commands such as hostname, ping, host. This clip is from the chapter "Networking" of the series "Linux Operating System: A Complete Linux Guide for Beginners".In this section,...
Curated Video
CISSP Crash Course - Federated Identities
This video explains centralized versus decentralized identities. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access...
Curated Video
CISSP Crash Course - Understand and Comply with Investigations
This video explains evidence collection, forensics, and handling investigations. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Control Physical and Logical Access
This video explains control physical and logical access as well as type of assets that are part of a system. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5,...
Curated Video
CISSP Crash Course - Information Assets
This video explains information assets and data classification. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Curated Video
CISSP Crash Course - Policy, Standards, Procedures, and Guidelines
This video explains policy, standards, procedures, and guidelines. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Curated Video
CISSP Crash Course - Security Concepts
This video explains some basic security topics. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Curated Video
Oracle Database Administration from Zero to Hero - Creating an Oracle Database (Part 1 of 3)
In this video, you will learn how to create an Oracle database using the 19c software. We will cover the necessary steps for preparing the software installation and perform the installation itself. This clip is from the chapter...
Curated Video
JavaScript Masterclass - Zero to Job-Ready with Hands-On Projects - Project Deployment Using GitHub and Netlify / 317
This video explains how to push the code onto GitHub and Netlify. This clip is from the chapter "Project: Kanban Application" of the series "JavaScript Masterclass - Zero to Job-Ready with Hands-On Projects".This section explains a...
Curated Video
JavaScript Masterclass - Zero to Job-Ready with Hands-On Projects - Project Deployment Using GitHub and Netlify / 316
This video explains how to deploy the code using GitHub and Netlify. This clip is from the chapter "Project: Budget Tracker" of the series "JavaScript Masterclass - Zero to Job-Ready with Hands-On Projects".This section explains a new...
Curated Video
JavaScript Masterclass - Zero to Job-Ready with Hands-On Projects - DOM In-Depth / 045
This video explains how and when the DOM interface is loaded. This clip is from the chapter "Document Object Model" of the series "JavaScript Masterclass - Zero to Job-Ready with Hands-On Projects".This section explains the document...
Curated Video
JavaScript Masterclass - Zero to Job-Ready with Hands-On Projects - Project Deployment Using GitHub and Netlify / 321
This video explains how to deploy the code for the quiz application using GitHub and Netlify. This clip is from the chapter "Project: Quiz Application" of the series "JavaScript Masterclass - Zero to Job-Ready with Hands-On Projects".In...
Curated Video
Design Microservices Architecture with Patterns and Principles - Microservices Decomposition Pattern - Decompose by Subdomain
In this video, we will explore the decomposition pattern of decomposing microservices by subdomains, which are cohesive and bounded parts of a business domain. We will understand subdomain-driven decomposition with Domain-Driven Design...
Curated Video
Design Microservices Architecture with Patterns and Principles - Layers of Clean Architecture
In this video, we will explore the layers constituting Clean Architecture, such as the Entities, Use Cases, and Interface Adapters. We will understand the responsibilities of each layer and how they collaborate to create a decoupled and...
Curated Video
Design Microservices Architecture with Patterns and Principles - Understand E-Commerce Domain - Use Cases - Functional Requirement
In this video, we will explore the various use cases and functional requirements specific to the e-commerce domain. We will gain a deeper understanding of the essential functionalities that an e-commerce platform should support. This...
Curated Video
Design Microservices Architecture with Patterns and Principles - Design and Adapt Microservices Architecture with Decomposition Patterns
In this video, we will investigate the design and adaptation of a microservices architecture using decomposition patterns. You will learn to map the identified microservices to their respective bounded contexts, define their interfaces,...
Curated Video
Design Microservices Architecture with Patterns and Principles - Analysis E-Commerce Domain - Use Cases
In this video, we will analyze the e-commerce domain and explore various use cases within the context of microservices architecture and gain insights into the specific requirements and functionalities of an e-commerce system, and how...
Curated Video
Design Microservices Architecture with Patterns and Principles - Identify Bounded Context Boundaries for Each Microservices
In this video, you will learn practical techniques and strategies to identify Bounded Context boundaries for each microservice in your architecture. We will understand the importance of isolating domains and ensuring that each...
Curated Video
Design Microservices Architecture with Patterns and Principles - Bounded Context Pattern (Domain-Driven Design - DDD)
In this video, we will explore the Bounded Context pattern, a key concept in Domain-Driven Design (DDD) for designing microservices. We will understand how to identify and define Bounded Contexts to create clear boundaries and...
Curated Video
Design Microservices Architecture with Patterns and Principles - When Not to Use Microservices - Anti-Patterns of Microservices
In this video, we will explore anti-patterns and scenarios where microservices may not be the best architectural choice. We will understand the trade-offs and challenges associated with microservices, such as increased complexity,...
Curated Video
Design Microservices Architecture with Patterns and Principles - DEMO: Modular Monolithic Architecture Code Review - E-Commerce App
In this video, we will dive into a code review of a real-world e-commerce application implemented using a modular monolithic architecture. We will explore the code structure, module interactions, and design patterns employed in the...
Curated Video
Design Microservices Architecture with Patterns and Principles - Evaluate: Clean Architecture with Scalability - Load Balancer - E-Commerce App
In this video, we will evaluate the effectiveness of a clean architecture approach in achieving scalability and integrating load balancing into an e-commerce application. We will assess the impact of these architectural changes on...
Curated Video
Battle of Tours: Charlemagne's Defeat of the Umayyad Caliphate
This video provides a detailed account of the pivotal Battle of Tours in 732 between the Frankish forces led by Charlemagne and the Umayyad Caliphate, highlighting the complex political landscape of the time and the strategic maneuvers...
Curated Video
What is Leadership? and Why do We Need Leaders?
In this video, I answer two questions, to kick off our series on Leadership: what is leadership, and why do we need it?