Hi, what do you want to do?
Curated Video
Linux Crash Course for Beginners - 2023 - Connect Linux VM Through Putty
In this video, you will learn how to access our Linux machine through Putty.
Curated Video
Building Microservices API in Go - Introduction
In this video, we will provide an overview of the advanced topics covered in this section. We will introduce the concepts and techniques that will be covered in the subsequent videos.
<
br/>
This clip is from the chapter "Advanced...
<
br/>
This clip is from the chapter "Advanced...
Curated Video
Building Microservices API in Go - Structured Logging
In this video, we will discuss the importance of structured logging in application development and introduce the popular logging library uber/zap for implementing structured logging in our Go application.
<
br/>
This clip is from...
<
br/>
This clip is from...
Curated Video
The Ultimate ChatGPT Guide with React Native - Develop Mobile Apps - useEffect Hooks and Rendering Optimization with React Native
In this video, we will explore the useEffect hook in React Native, which is used for handling side effects such as network requests, state updates, and rendering optimizations. By the end of this video, you will have a better...
Curated Video
Learn Java from Scratch - A Beginner's Guide - Step 07 - Java Modularization - 04 - a Quick Review
In this video, Let's look at some important points to remember about modularization.
Curated Video
Learn Java from Scratch - A Beginner's Guide - Step 03 - Getting Started with Java Modularization
In this video, we will understand Java modularization.
Curated Video
Express Framework Fundamentals - Secure Sign-Up with Auth0 and Node.js - Sign-Up Form and Styling with EJS
In this video, we will create a sign-up form and styling with EJS.
<
br/>
This clip is from the chapter "Authenticating Username and Password with Express and Passport" of the series "Express Framework Fundamentals - Secure Sign-Up...
<
br/>
This clip is from the chapter "Authenticating Username and Password with Express and Passport" of the series "Express Framework Fundamentals - Secure Sign-Up...
Curated Video
Express Framework Fundamentals - Secure Sign-Up with Auth0 and Node.js - Logout Functionality for Users and Live Interaction
In this video, we will use the logout functionality for users and live interaction.
<
br/>
This clip is from the chapter "Authenticating Username and Password with Express and Passport" of the series "Express Framework Fundamentals...
<
br/>
This clip is from the chapter "Authenticating Username and Password with Express and Passport" of the series "Express Framework Fundamentals...
Curated Video
Fundamentals of Secure Software - Security Logging and Monitoring Failures
This video demonstrates insecure logging.
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Two-Factor Authentications
In this video, you will learn about two-factor authentication, which is used to add an extra layer of security when logging into an account.
<
br/>
This clip is from the chapter "Personal Security" of the series "The Absolute...
<
br/>
This clip is from the chapter "Personal Security" of the series "The Absolute...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Creating New Accounts and Logging In (DO NOT DO THIS)
In this video, you will learn to create a new account and log in to Reddit.
<
br/>
This clip is from the chapter "Internet and Browsing Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
<
br/>
This clip is from the chapter "Internet and Browsing Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Creating S3 Buckets Lab
Would you like to see S3 in action? This video demonstrates the process of creating S3 buckets and then using those buckets for object (file) storage.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - CloudTrail
When you have IAM users, groups, roles, and policies defined, it's time to think about how you will track or log everything that's going on in AWS. In this video, you will learn about AWS CloudTrail and how it can help you monitor and...
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Tokens
In this video, we will dive deeper into JWTs and learn how to use them for secure user authentication and authorization.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Security Policies
NTFS permissions control files and folders, but there are plenty of other resources that need control. Security policies control factors such as login attempts, printer access, and password length/complexity.
<
br/>
This clip is...
<
br/>
This clip is...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Users and Super Users
This video explains users and super users.
<
br/>
This clip is from the chapter "The Visible Computer" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section explains the common safety procedures and hardware...
<
br/>
This clip is from the chapter "The Visible Computer" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section explains the common safety procedures and hardware...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Security
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Curated Video
Behavioral Design Patterns in C++ - Logging System - I
This video starts with another example in which we will implement a logging system. This example is implemented in three subsequent videos.
<
br/>
This clip is from the chapter "Chain of Responsibility" of the series "Behavioral...
<
br/>
This clip is from the chapter "Chain of Responsibility" of the series "Behavioral...
Curated Video
PowerShell for Automating Administration - Project Directory and File Structure
This video demonstrates the project directory and file structure that will help you give an upper hand in customizing the automation part as per your requirement.
<
br/>
This clip is from the chapter "Project Introduction" of the...
<
br/>
This clip is from the chapter "Project Introduction" of the...
Curated Video
PowerShell for Automating Administration - Learn PowerShell Logging Module
This video explains automating systems and the application validation process. Here, you will be using the PowerShell Logging module, which helps automate complex operations that run error-free.
<
br/>
This clip is from the chapter...
<
br/>
This clip is from the chapter...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Mobile Device Security
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Curated Video
Kafka for Developers - Data Contracts Using Schema Registry - Build the Coffee Order Consumer
In this video, we will build the consumer that will be used to consume the Kafka AVRO records from the Kafka topic.
<
br/>
This clip is from the chapter "Build a Coffee Order Service Using Spring Boot and Schema Registry" of the...
<
br/>
This clip is from the chapter "Build a Coffee Order Service Using Spring Boot and Schema Registry" of the...
Curated Video
Kafka for Developers - Data Contracts Using Schema Registry - Build the POST Endpoint for the CoffeeOrderService - /coffee_orders
In this video, we will build the POST endpoint in the controller, using which we can post new coffee orders.
<
br/>
This clip is from the chapter "Build a Coffee Order Service Using Spring Boot and Schema Registry" of the series...
<
br/>
This clip is from the chapter "Build a Coffee Order Service Using Spring Boot and Schema Registry" of the series...
Curated Video
CISSP Crash Course - Conducting Logging and Monitoring Activities
This video explains logging and monitoring activities as well as incident management steps.
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on...
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on...