Instructional Video8:00
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - S3 Bucket Properties

Higher Ed
Each S3 bucket has a collection of properties associated with it. These properties are explored in this video.
Instructional Video7:16
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - S3 Storage Class

Higher Ed
S3 is the primary file or object storage service in Amazon Web Services (AWS). What can you do with S3? This video explains the basic concepts of S3 storage and management.
Instructional Video13:21
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Creating an S3 Bucket

Higher Ed
In this video, you will learn how to create storage in the cloud. You will learn to use the Simple Storage Service (S3) to store your data. You will learn to create an S3 bucket, upload data, and set up permissions.
Instructional Video4:50
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Use the System

Higher Ed
Be sure to use the system to your advantage as you work toward studying and passing your CSA-A exam.
Instructional Video8:07
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Redshift

Higher Ed
When you need a data warehouse solution, Redshift may be the answer. A custom-built database solution offered in AWS, Redshift works well on massive data stores and allows you to analyze it quickly.
Instructional Video7:57
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Database Security

Higher Ed
When implementing databases, it is important to consider security. Databases store data and data may be sensitive at varying levels. In this video, database security is explored.
Instructional Video9:13
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Encrypting Mass Storage

Higher Ed
Securing mass storage is a critical aspect of system security. Make sure you know the many ways a system's mass storage can be encrypted. This clip is from the chapter "Implementing Mass Storage" of the series "CompTIA A+ Certification...
Instructional Video10:26
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Wireless Encryption

Higher Ed
Everything on an unencrypted (open) wireless network is easily intercepted by anyone with the right capture tools. Over the years, 80 2.11 has developed three different encryption standards, each with its own idiosyncrasies, strengths,...
Instructional Video1:00
One Minute History

198 - Code Talkers - One Minute History

12th - Higher Ed
In the heat of battle, knowledge is power. Messages must be sent and received quickly, accurately and if you plan on winning, they need to be encoded. October 1918 (World War I) France - Native American men from Oklahoma organize a...
Instructional Video1:00
One Minute History

199 - Navajo Code Talkers - One Minute History

12th - Higher Ed
On the morning of May 4, 1942, twenty nine Navajo men boarded a bus at Ft. Defiance, Arizona bound for Marine Corps training camp. These men were tasked with creating a code based on the complex, unwritten Navajo language. The Navajo...
Instructional Video9:20
Curated Video

Learn Azure Serverless Functions in a Weekend - Deploy Azure Service Bus

Higher Ed
This video helps deploy Azure Service Bus. This clip is from the chapter "Azure Service Bus" of the series "Learn Azure Serverless Functions in a Weekend".This section focuses on Azure Service Bus.
Instructional Video9:13
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Encrypting Mass Storage

Higher Ed
Securing mass storage is a critical aspect of system security. Make sure you know the many ways a system's mass storage can be encrypted. This clip is from the chapter "Book Chapter 9 - Implementing Mass Storage" of the series "CompTIA...
Instructional Video4:04
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - It's a Huge Mesh

Higher Ed
Mesh networking is here and gaining in popularity daily. But what does mesh networking do for your 80 2.11 network? Where do you use it and how is it deployed? This clip is from the chapter "Book Chapter 20 - Wireless Networking" of the...
Instructional Video13:06
Curated Video

CISSP Crash Course - Secure Communication

Higher Ed
This video explains how to implement secure communication. This clip is from the chapter "Communication and Network Security" of the series "CISSP Crash Course".This section covers domain 4, which focuses on communication and network...
Instructional Video5:44
Curated Video

CISSP Crash Course - Cryptanalytic Attacks

Higher Ed
This video explains cryptographic attacks and malware attacks such as Ransomware. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture...
Instructional Video11:01
Curated Video

CISSP Crash Course - Cryptographic Solutions

Higher Ed
This video explains cryptographic systems—asymmetric encryption and RSA algorithm. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Instructional Video8:46
Curated Video

CISSP Crash Course - Asset Handling

Higher Ed
This video explains information, asset handling, and how to deal with data. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and...
Instructional Video11:59
Curated Video

CISSP Crash Course - Security Governance

Higher Ed
This video explains security policy and how to apply security governance. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Instructional Video8:39
Curated Video

CISSP Crash Course - Information Assets

Higher Ed
This video explains information assets and data classification. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Instructional Video4:48
Curated Video

HashiCorp Certified - Vault Associate Course - Vault Initialization

Higher Ed
This video explains the process of initializing HashiCorp Vault, which is a one-time process that sets up the initial configuration and encryption key for Vault. You will need to initialize Vault when it is first provisioned, so this...
Instructional Video15:59
Curated Video

HashiCorp Certified - Vault Associate Course - Benefits and Use Cases of Vault

Higher Ed
This video outlines the benefits and various use cases of HashiCorp Vault. Learn all the cool things that Vault has to offer organizations that decide to use it to protect their secrets and other data. This clip is from the chapter...
Instructional Video3:14
Curated Video

Getting Started with HashiCorp Nomad - Demo - Secure Gossip Encryption

Higher Ed
We will continue securing our Nomad infrastructure in this demonstration by enabling gossip encryption on our servers. We will modify our configuration file, define the server configuration, and add the encrypt parameter. This clip is...
Instructional Video14:49
Curated Video

HashiCorp Certified - Vault Associate Course - Lab—Transit Secrets Engine

Higher Ed
This is a lab video on Transit Secrets Engine. This clip is from the chapter "Compare and Configure Secrets Engines" of the series "HashiCorp Certified - Vault Associate Course".null
Instructional Video20:21
Curated Video

HashiCorp Certified - Vault Associate Course - Using the Transit Secrets Engine

Higher Ed
This video will cover how to use the Transit Secrets Engine in Vault to securely encrypt and decrypt data at rest. This clip is from the chapter "Compare and Configure Secrets Engines" of the series "HashiCorp Certified - Vault Associate...