Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part II
In Part II of this engaging module, you will continue to see new examples of targeted phishing emails, and to recognize some of the major red flags in them. This clip is from the chapter "Targeted Email Phishing and Social Engineering"...
IDG TECHtalk
Preventing data leakage in Windows (3:29)
Set data loss prevention policies in Windows 10 to prevent data leakage.
Packt
User Login Reducer and Action
This video focuses on user login reducer and action. This clip is from the chapter "Front-end User Authentication and Profile" of the series "MERN E-commerce from Scratch".This section focuses on front-end user authentication and profile.
Packt
Getting an Order by ID Endpoint
This video shows how to get an order by ID endpoint. This clip is from the chapter "Checkout Process-Part 2" of the series "MERN E-commerce from Scratch".This is the second part of a two-part section that explains the checkout process.
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Git Shortlog
This video explains the Git shortlog command. This clip is from the chapter "Advanced Git" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to clone one of the public repositories. It...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Pushing Branch to Remote
This video demonstrates how to push branch to remote. This clip is from the chapter "Pull Requests" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to pull request and how to create a...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - MAC, HMAC, SSL, and TLS
CISSP Domain 3: System Architecture and Engineering: MAC, HMAC, SSL, and TLS. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Curated Video
Phrasal Verbs for Introducing Speaking Part 2 Answers
Phrasal Verbs for Introducing Speaking Part 2 Answers
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Whois Information Gathering
In this video, you'll learn about a footprinting tool called ‘whois'. This clip is from the chapter "Passive Information Gathering and Footprinting" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Curated Video
REST APIs with Flask and Python - Setting Your Domain Name System (DNS) Records
This video explains how to set your DNS records so that your server is accessible from your domain name. This clip is from the chapter "Security in Your Rest API" of the series "REST APIs with Flask and Python".This section explains all...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Messaging
In this revealing video, you will learn how similar and effective messaging attacks are to other common social engineering methods. You will also learn how they use some of the very same tactics as used in phishing emails to hack you....
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Password Management
In this video, you will understand the major (and sometimes annoying) issues around password management. This includes how to keep track of all of your passwords in a secure manner, and why sharing weak passwords across multiple websites...
Curated Video
Google Apps Script - Exercise Coding Projects - Introduction to Google Workspace Services: Docs, Calendar, Drive, Forms, Gmail, and Sheets
This video introduces you to Google Workspace services such as Docs, Calendar, Drive, Forms, Gmail, and Sheets. This clip is from the chapter "Google Workspace Services: Docs, Calendar, Drive, Forms, Gmail, and Sheets Slides" of the...
Seven Dimensions
Effective Presentation Techniques
This video discusses the shortcomings of using presentations to convey complex information and suggests alternative methods such as writing reports or sending emails.
Jabzy
Border Reivers - Stuff That I Find Interesting
In this video, Jabzy brings us historical tidbits and unknown facts about the Border Reivers
Next Animation Studio
Thousands of Disney+ accounts stolen by hackers
Hackers started targeting Disney’s new streaming service just hours after it was launched on November 12.
Curated Video
Comprehensive Android Developer Bootcamp - Login Screen
Build a Journal App with Firestore:Login Screen This clip is from the chapter "Build a Journal App with Firestore" of the series "The Comprehensive Android Developer Bootcamp".In this section you will see how to build your own journal...
Curated Video
The Full Stack Web Development - Form Validation and User Register
Backend programming with Node.js: Form Validation and User Register This clip is from the chapter "Backend programming with Node.js" of the series "The Full Stack Web Development".In this section, we work with the backend technology like...
Curated Video
The Full Stack Web Development - Using cURL With CouchDB
Learning CouchDB: Using cURL With CouchDB This clip is from the chapter "Learning CouchDB" of the series "The Full Stack Web Development".For CouchDB which is also no SQL database, we will checkout Fauxton – a web interface to manage our...
Curated Video
The Full Stack Web Development - String Commands
Redis - The Cache Database: String Commands This clip is from the chapter "Redis - The Cache Database" of the series "The Full Stack Web Development".In this section, we look into Redis – part of other essential technology and it is...
IDG TECHtalk
Preventing malicious links in Windows (5:28)
Set Office 365 Advanced Threat Protection policies to block known malicious URL addresses.
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Understanding Azure Active Directory - Lab Activity
In this video, we will understand Azure Active Directory - lab activity. This clip is from the chapter "Identity" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section introduces identities and Azure Active...
Curated Video
.NET Core Microservices - Direct Exchange RabbitMQ Sender
This video explains direct exchange RabbitMQ sender. This clip is from the chapter "RabbitMQ" of the series ".NET Core Microservices - The Complete Guide (.NET 6 MVC)".null
Curated Video
.NET Core Microservices - What We will Build?
This video introduces you to what we will build in the course. This clip is from the chapter "Introduction" of the series ".NET Core Microservices - The Complete Guide (.NET 6 MVC)".This section introduces you to the course.