Instructional Video5:05
Curated Video

Linux Crash Course for Beginners - 2023 - Connect Linux VM Through Putty

Higher Ed
In this video, you will learn how to access our Linux machine through Putty.
Instructional Video2:25
Curated Video

Building Microservices API in Go - Introduction

Higher Ed
In this video, we will provide an overview of the advanced topics covered in this section. We will introduce the concepts and techniques that will be covered in the subsequent videos.
<
br/>
This clip is from the chapter "Advanced...
Instructional Video16:24
Curated Video

Building Microservices API in Go - Structured Logging

Higher Ed
In this video, we will discuss the importance of structured logging in application development and introduce the popular logging library uber/zap for implementing structured logging in our Go application.
<
br/>
This clip is from...
Instructional Video4:21
Curated Video

The Ultimate ChatGPT Guide with React Native - Develop Mobile Apps - useEffect Hooks and Rendering Optimization with React Native

Higher Ed
In this video, we will explore the useEffect hook in React Native, which is used for handling side effects such as network requests, state updates, and rendering optimizations. By the end of this video, you will have a better...
Instructional Video4:10
Curated Video

Learn Java from Scratch - A Beginner's Guide - Step 07 - Java Modularization - 04 - a Quick Review

Higher Ed
In this video, Let's look at some important points to remember about modularization.
Instructional Video4:09
Instructional Video6:01
Curated Video

Express Framework Fundamentals - Secure Sign-Up with Auth0 and Node.js - Sign-Up Form and Styling with EJS

Higher Ed
In this video, we will create a sign-up form and styling with EJS.
<
br/>
This clip is from the chapter "Authenticating Username and Password with Express and Passport" of the series "Express Framework Fundamentals - Secure Sign-Up...
Instructional Video5:52
Curated Video

Express Framework Fundamentals - Secure Sign-Up with Auth0 and Node.js - Logout Functionality for Users and Live Interaction

Higher Ed
In this video, we will use the logout functionality for users and live interaction.
<
br/>
This clip is from the chapter "Authenticating Username and Password with Express and Passport" of the series "Express Framework Fundamentals...
Instructional Video5:45
Instructional Video7:37
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Two-Factor Authentications

Higher Ed
In this video, you will learn about two-factor authentication, which is used to add an extra layer of security when logging into an account.
<
br/>
This clip is from the chapter "Personal Security" of the series "The Absolute...
Instructional Video2:10
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Creating New Accounts and Logging In (DO NOT DO THIS)

Higher Ed
In this video, you will learn to create a new account and log in to Reddit.
<
br/>
This clip is from the chapter "Internet and Browsing Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
Instructional Video8:11
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Creating S3 Buckets Lab

Higher Ed
Would you like to see S3 in action? This video demonstrates the process of creating S3 buckets and then using those buckets for object (file) storage.
Instructional Video11:47
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - CloudTrail

Higher Ed
When you have IAM users, groups, roles, and policies defined, it's time to think about how you will track or log everything that's going on in AWS. In this video, you will learn about AWS CloudTrail and how it can help you monitor and...
Instructional Video7:49
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Tokens

Higher Ed
In this video, we will dive deeper into JWTs and learn how to use them for secure user authentication and authorization.
Instructional Video7:40
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Security Policies

Higher Ed
NTFS permissions control files and folders, but there are plenty of other resources that need control. Security policies control factors such as login attempts, printer access, and password length/complexity.
<
br/>
This clip is...
Instructional Video5:14
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Users and Super Users

Higher Ed
This video explains users and super users.
<
br/>
This clip is from the chapter "The Visible Computer" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section explains the common safety procedures and hardware...
Instructional Video7:34
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Security

Higher Ed
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Instructional Video5:20
Curated Video

Behavioral Design Patterns in C++ - Logging System - I

Higher Ed
This video starts with another example in which we will implement a logging system. This example is implemented in three subsequent videos.
<
br/>
This clip is from the chapter "Chain of Responsibility" of the series "Behavioral...
Instructional Video7:52
Curated Video

PowerShell for Automating Administration - Project Directory and File Structure

Higher Ed
This video demonstrates the project directory and file structure that will help you give an upper hand in customizing the automation part as per your requirement.
<
br/>
This clip is from the chapter "Project Introduction" of the...
Instructional Video8:05
Curated Video

PowerShell for Automating Administration - Learn PowerShell Logging Module

Higher Ed
This video explains automating systems and the application validation process. Here, you will be using the PowerShell Logging module, which helps automate complex operations that run error-free.
<
br/>
This clip is from the chapter...
Instructional Video7:34
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Mobile Device Security

Higher Ed
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Instructional Video7:01
Curated Video

Kafka for Developers - Data Contracts Using Schema Registry - Build the Coffee Order Consumer

Higher Ed
In this video, we will build the consumer that will be used to consume the Kafka AVRO records from the Kafka topic.
<
br/>
This clip is from the chapter "Build a Coffee Order Service Using Spring Boot and Schema Registry" of the...
Instructional Video5:41
Curated Video

Kafka for Developers - Data Contracts Using Schema Registry - Build the POST Endpoint for the CoffeeOrderService - /coffee_orders

Higher Ed
In this video, we will build the POST endpoint in the controller, using which we can post new coffee orders.
<
br/>
This clip is from the chapter "Build a Coffee Order Service Using Spring Boot and Schema Registry" of the series...
Instructional Video12:49
Curated Video

CISSP Crash Course - Conducting Logging and Monitoring Activities

Higher Ed
This video explains logging and monitoring activities as well as incident management steps.
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on...