Instructional Video8:09
Curated Video

Fundamentals Of Object-Oriented Programming: Java and IntelliJ - Inheritance

Higher Ed
In this video, we will look at inheritance in Java, where we have a superclass and a derived class, which inherits the attributes from the parent class.
Instructional Video4:05
Curated Video

SwiftUI iOS 16 Crash Course - Emoji Quote App in SwiftUI - ShareImageView - Part 4 - Store Image in Photo Album

Higher Ed
In this video, we will explore how to make the app store images into a photo album. You will learn to preview the images we want to store or share. We will provide options to copy the image and save it to storage. This clip is from the...
Instructional Video3:48
Curated Video

AutoCAD 2023 Masterclass - Produce Amazing Site Plans Quickly - How to Create and Verify an Account on Autodesk

Higher Ed
In this video, we will guide you on how to create and verify an account on Autodesk, the official website for AutoCAD software. You will learn step-by-step instructions on how to set up your account, which will be required for...
Instructional Video2:51
Curated Video

Fundamentals of Secure Software - Cross-Site Scripting

Higher Ed
This video explains cross-site scripting.
Instructional Video3:56
Curated Video

Fundamentals of Secure Software - Identification and Authentication Failures

Higher Ed
This video explains identification and authentication failures.
Instructional Video4:05
Curated Video

A Detailed Guide to the OWASP Top 10 - API5:2023 Broken Function Level Authorization

Higher Ed
In this session, we will analyze Broken Function Level Authorization, understanding its impact on API security and methods to prevent it.
Instructional Video10:04
Curated Video

A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures

Higher Ed
This video explains OWASP 07 - identification and authentication failures.
Instructional Video16:25
Curated Video

A Detailed Guide to the OWASP Top 10 - #3 SQL Injection Attacks

Higher Ed
This video explains the most common type of attack on a website, which is the SQL injection attack.
Instructional Video7:18
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - You Have Been HACKED - Now What?

Higher Ed
In this video, you will look at steps to take after you have been hacked and how exactly you would respond. This clip is from the chapter "Conclusion" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
Instructional Video3:05
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Set Up a Recovery Email

Higher Ed
In this video, the author shows you how to set up a recovery email account the right way. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part...
Instructional Video4:44
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Email Data Management

Higher Ed
In this video, the author talks about a few tips on how best to protect yourself in case your email gets hacked. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to...
Instructional Video8:54
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Phishing Attacks

Higher Ed
In this video, you will learn about Phishing attacks. It is an attempt by a hacker to obtain sensitive data by sending crafted emails to a potential victim while impersonating a known person or body. This clip is from the chapter "Social...
Instructional Video4:41
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Twitter Account

Higher Ed
In this video, you will discover effective strategies to enhance the security of your Twitter account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...
Instructional Video3:33
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Have I Been Pwned?

Higher Ed
In this video, the author introduces you to a web tool called “have I been pwnedâ€; this is a website where you can check whether your email address or password has been compromised. This clip is from the chapter "Personal Security" of...
Instructional Video7:37
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Two-Factor Authentications

Higher Ed
In this video, you will learn about two-factor authentication, which is used to add an extra layer of security when logging into an account. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to...
Instructional Video2:10
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Creating New Accounts and Logging In (DO NOT DO THIS)

Higher Ed
In this video, you will learn to create a new account and log in to Reddit. This clip is from the chapter "Internet and Browsing Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section delves...
Instructional Video6:26
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Cloud Computing Models

Higher Ed
You may be wondering how you can use the cloud. Do you have to move everything to the cloud or just some solutions? What do buzzwords such as IaaS, PaaS, and SaaS mean? You will find out in this video.
Instructional Video16:49
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Register User

Higher Ed
This video will guide you through the process of implementing user registration functionality for your Twitter Clone app's backend.
Instructional Video8:44
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Password Hashing with Bcrypt

Higher Ed
In this video, we will explore how to securely hash and store user passwords using Bcrypt.
Instructional Video13:36
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - User Model and Validator

Higher Ed
In this video, we will explore how to create a user model and use a validator to ensure that the user data meets certain requirements.
Instructional Video13:50
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Auth | RegisterView

Higher Ed
In this video, we will take you through the process of designing and implementing a RegisterView for your Twitter Clone app that collects user data, validates it, and stores it securely.
Instructional Video10:08
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - The Control Panel

Higher Ed
The Control Panel is a large collection of applets that are used for updating system settings, dealing with hardware, and troubleshooting. This video explores the basics of the Control Panel in Windows. This clip is from the chapter...
Instructional Video5:10
Curated Video

The Art of Doing - Web Development for Beginners - Final CSS Project Preview

Higher Ed
In this video, we will have a quick preview of our final CSS project, which involves building a website for a club, organization, team, and so on. We will discuss the required pages, HTML structure, and semantic elements that should be...
Instructional Video4:49
Curated Video

The Art of Doing - Web Development for Beginners - Store Front Preview

Higher Ed
In this video, we will create a three-page website for a made-up company. We will design a home page, an about page, and a contact page, all with proper HTML structure and semantic HTML elements. Additionally, we will ensure that each...