Instructional Video6:46
Curated Video

API Testing with Postman - Validating APIs with Postman Requests

Higher Ed
Show how to check that an API is returning expected results. • Set up a request • Add a check on the test tab of the request • Demonstrate sharing tests between requests at the collection level This clip is from the chapter "Automating...
Instructional Video9:13
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - Creating and Merging a Pull Request

Higher Ed
This video demonstrates the process of creating and merging a pull request. This clip is from the chapter "Pull Requests" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to pull request...
Instructional Video7:02
Curated Video

REST API Automation Testing from Scratch - REST Assured Java - Integrating Web UI Automation to Generate an Authorization Code

Higher Ed
This video explains how to integrate Web UI automation to generate an authorization code. This clip is from the chapter "REST Assured Automation for OAuth 2.0 Authorization Code" of the series "REST API Automation Testing from Scratch -...
Instructional Video4:46
Curated Video

Modern HTML and CSS from the Beginning (Including Sass) - Showcase Header - Website Deployment - Shared Host

Higher Ed
Website Deployment - Shared Host: Showcase Header This clip is from the chapter "Website Deployment - Shared Host" of the series "Modern HTML and CSS from the Beginning (Including Sass)".In this Section, we’ll deploy a website in a...
Instructional Video4:48
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part I

Higher Ed
In Part I of this engaging module, you will learn how targeted email phishing is executed against you, as well as recognize some of the major red flags to be able to readily detect these emails in the future. This clip is from the...
Instructional Video1:35
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part II

Higher Ed
In Part II of this engaging module, you will continue to see new examples of targeted phishing emails, and to recognize some of the major red flags in them. This clip is from the chapter "Targeted Email Phishing and Social Engineering"...
Instructional Video6:08
Curated Video

The Complete Guide to ASP.NET Core MVC (.NET 5) - Confirm Email for Authorized Company User

Higher Ed
In this video, we'll look at confirming email for authorized company user. This clip is from the chapter "Shopping Cart Management" of the series "The Complete Guide to ASP.NET Core MVC (.NET 5)".In this section, let's look at shopping...
Instructional Video3:16
IDG TECHtalk

Preventing data leakage in Windows (3:29)

Higher Ed
Set data loss prevention policies in Windows 10 to prevent data leakage.
Instructional Video10:35
Packt

User Login Reducer and Action

Higher Ed
This video focuses on user login reducer and action. This clip is from the chapter "Front-end User Authentication and Profile" of the series "MERN E-commerce from Scratch".This section focuses on front-end user authentication and profile.
Instructional Video5:25
Packt

Getting an Order by ID Endpoint

Higher Ed
This video shows how to get an order by ID endpoint. This clip is from the chapter "Checkout Process-Part 2" of the series "MERN E-commerce from Scratch".This is the second part of a two-part section that explains the checkout process.
Instructional Video1:44
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - Git Shortlog

Higher Ed
This video explains the Git shortlog command. This clip is from the chapter "Advanced Git" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to clone one of the public repositories. It...
Instructional Video5:00
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - Pushing Branch to Remote

Higher Ed
This video demonstrates how to push branch to remote. This clip is from the chapter "Pull Requests" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to pull request and how to create a...
Instructional Video2:48
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - MAC, HMAC, SSL, and TLS

Higher Ed
CISSP Domain 3: System Architecture and Engineering: MAC, HMAC, SSL, and TLS. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Instructional Video3:47
Curated Video

Phrasal Verbs for Introducing Speaking Part 2 Answers

9th - Higher Ed
Phrasal Verbs for Introducing Speaking Part 2 Answers
Instructional Video6:41
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Whois Information Gathering

Higher Ed
In this video, you'll learn about a footprinting tool called ‘whois'. This clip is from the chapter "Passive Information Gathering and Footprinting" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Instructional Video7:38
Curated Video

REST APIs with Flask and Python - Setting Your Domain Name System (DNS) Records

Higher Ed
This video explains how to set your DNS records so that your server is accessible from your domain name. This clip is from the chapter "Security in Your Rest API" of the series "REST APIs with Flask and Python".This section explains all...
Instructional Video1:38
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Messaging

Higher Ed
In this revealing video, you will learn how similar and effective messaging attacks are to other common social engineering methods. You will also learn how they use some of the very same tactics as used in phishing emails to hack you....
Instructional Video7:44
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Password Management

Higher Ed
In this video, you will understand the major (and sometimes annoying) issues around password management. This includes how to keep track of all of your passwords in a secure manner, and why sharing weak passwords across multiple websites...
Instructional Video3:29
Curated Video

Google Apps Script - Exercise Coding Projects - Introduction to Google Workspace Services: Docs, Calendar, Drive, Forms, Gmail, and Sheets

Higher Ed
This video introduces you to Google Workspace services such as Docs, Calendar, Drive, Forms, Gmail, and Sheets. This clip is from the chapter "Google Workspace Services: Docs, Calendar, Drive, Forms, Gmail, and Sheets Slides" of the...
Instructional Video2:37
Seven Dimensions

Effective Presentation Techniques

Higher Ed
This video discusses the shortcomings of using presentations to convey complex information and suggests alternative methods such as writing reports or sending emails.
Instructional Video2:26
Jabzy

Border Reivers - Stuff That I Find Interesting

12th - Higher Ed
In this video, Jabzy brings us historical tidbits and unknown facts about the Border Reivers
Instructional Video1:00
Next Animation Studio

Thousands of Disney+ accounts stolen by hackers

12th - Higher Ed
Hackers started targeting Disney’s new streaming service just hours after it was launched on November 12.
Instructional Video9:19
Curated Video

Comprehensive Android Developer Bootcamp - Login Screen

Higher Ed
Build a Journal App with Firestore:Login Screen This clip is from the chapter "Build a Journal App with Firestore" of the series "The Comprehensive Android Developer Bootcamp".In this section you will see how to build your own journal...
Instructional Video18:36
Curated Video

The Full Stack Web Development - Form Validation and User Register

Higher Ed
Backend programming with Node.js: Form Validation and User Register This clip is from the chapter "Backend programming with Node.js" of the series "The Full Stack Web Development".In this section, we work with the backend technology like...