Curated Video
API Testing with Postman - Validating APIs with Postman Requests
Show how to check that an API is returning expected results. • Set up a request • Add a check on the test tab of the request • Demonstrate sharing tests between requests at the collection level This clip is from the chapter "Automating...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Creating and Merging a Pull Request
This video demonstrates the process of creating and merging a pull request. This clip is from the chapter "Pull Requests" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to pull request...
Curated Video
REST API Automation Testing from Scratch - REST Assured Java - Integrating Web UI Automation to Generate an Authorization Code
This video explains how to integrate Web UI automation to generate an authorization code. This clip is from the chapter "REST Assured Automation for OAuth 2.0 Authorization Code" of the series "REST API Automation Testing from Scratch -...
Curated Video
Modern HTML and CSS from the Beginning (Including Sass) - Showcase Header - Website Deployment - Shared Host
Website Deployment - Shared Host: Showcase Header This clip is from the chapter "Website Deployment - Shared Host" of the series "Modern HTML and CSS from the Beginning (Including Sass)".In this Section, we’ll deploy a website in a...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part I
In Part I of this engaging module, you will learn how targeted email phishing is executed against you, as well as recognize some of the major red flags to be able to readily detect these emails in the future. This clip is from the...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part II
In Part II of this engaging module, you will continue to see new examples of targeted phishing emails, and to recognize some of the major red flags in them. This clip is from the chapter "Targeted Email Phishing and Social Engineering"...
Curated Video
The Complete Guide to ASP.NET Core MVC (.NET 5) - Confirm Email for Authorized Company User
In this video, we'll look at confirming email for authorized company user. This clip is from the chapter "Shopping Cart Management" of the series "The Complete Guide to ASP.NET Core MVC (.NET 5)".In this section, let's look at shopping...
IDG TECHtalk
Preventing data leakage in Windows (3:29)
Set data loss prevention policies in Windows 10 to prevent data leakage.
Packt
User Login Reducer and Action
This video focuses on user login reducer and action. This clip is from the chapter "Front-end User Authentication and Profile" of the series "MERN E-commerce from Scratch".This section focuses on front-end user authentication and profile.
Packt
Getting an Order by ID Endpoint
This video shows how to get an order by ID endpoint. This clip is from the chapter "Checkout Process-Part 2" of the series "MERN E-commerce from Scratch".This is the second part of a two-part section that explains the checkout process.
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Git Shortlog
This video explains the Git shortlog command. This clip is from the chapter "Advanced Git" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to clone one of the public repositories. It...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Pushing Branch to Remote
This video demonstrates how to push branch to remote. This clip is from the chapter "Pull Requests" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to pull request and how to create a...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - MAC, HMAC, SSL, and TLS
CISSP Domain 3: System Architecture and Engineering: MAC, HMAC, SSL, and TLS. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Curated Video
Phrasal Verbs for Introducing Speaking Part 2 Answers
Phrasal Verbs for Introducing Speaking Part 2 Answers
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Whois Information Gathering
In this video, you'll learn about a footprinting tool called ‘whois'. This clip is from the chapter "Passive Information Gathering and Footprinting" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Curated Video
REST APIs with Flask and Python - Setting Your Domain Name System (DNS) Records
This video explains how to set your DNS records so that your server is accessible from your domain name. This clip is from the chapter "Security in Your Rest API" of the series "REST APIs with Flask and Python".This section explains all...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Messaging
In this revealing video, you will learn how similar and effective messaging attacks are to other common social engineering methods. You will also learn how they use some of the very same tactics as used in phishing emails to hack you....
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Password Management
In this video, you will understand the major (and sometimes annoying) issues around password management. This includes how to keep track of all of your passwords in a secure manner, and why sharing weak passwords across multiple websites...
Curated Video
Google Apps Script - Exercise Coding Projects - Introduction to Google Workspace Services: Docs, Calendar, Drive, Forms, Gmail, and Sheets
This video introduces you to Google Workspace services such as Docs, Calendar, Drive, Forms, Gmail, and Sheets. This clip is from the chapter "Google Workspace Services: Docs, Calendar, Drive, Forms, Gmail, and Sheets Slides" of the...
Seven Dimensions
Effective Presentation Techniques
This video discusses the shortcomings of using presentations to convey complex information and suggests alternative methods such as writing reports or sending emails.
Jabzy
Border Reivers - Stuff That I Find Interesting
In this video, Jabzy brings us historical tidbits and unknown facts about the Border Reivers
Next Animation Studio
Thousands of Disney+ accounts stolen by hackers
Hackers started targeting Disney’s new streaming service just hours after it was launched on November 12.
Curated Video
Comprehensive Android Developer Bootcamp - Login Screen
Build a Journal App with Firestore:Login Screen This clip is from the chapter "Build a Journal App with Firestore" of the series "The Comprehensive Android Developer Bootcamp".In this section you will see how to build your own journal...
Curated Video
The Full Stack Web Development - Form Validation and User Register
Backend programming with Node.js: Form Validation and User Register This clip is from the chapter "Backend programming with Node.js" of the series "The Full Stack Web Development".In this section, we work with the backend technology like...