Instructional Video7:54
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Dealing with Threats

Higher Ed
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This video covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Instructional Video9:23
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Troubleshooting

Higher Ed
Mobile devices can encounter problems ranging from unresponsive touchscreens to complete system lockout. This video explores common symptoms, such as slow performance (caused by excessive app running) or overheating, and their solutions....
Instructional Video8:52
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - The World Wide Web

Higher Ed
The web puts a graphical face on the Internet. You access it via a web browser, connecting with HTTP (insecure) or HTTPS (secure). Certificates give you a resource for whether a website can be trusted. This clip is from the chapter "The...
Instructional Video6:03
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Advanced Router Configuration

Higher Ed
Even the most basic router has settings beyond the basic setup. Protocols such as Quality of Service (QoS), Universal Plug and Play (UPnP), and Simple Network Management Protocol (SNMP) give extra features to enhance the capabilities of...
Instructional Video7:03
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Windows Sharing with macOS and Linux

Higher Ed
Both macOS and Linux systems know how to use Windows naming functions to connect using Workgroups and Domains and share resources using Samba. The trick is to understand how they do it and to configure them to work with an existing...
Instructional Video5:59
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Windows Naming

Higher Ed
Microsoft introduced a series of naming protocols, some of which predate the Internet. Interestingly, these protocols (or at least their modern versions) are still alive and well not only on Windows systems but on Linux and macOS systems...
Instructional Video8:59
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Working with Connections

Higher Ed
When two computers begin the process of sharing data, they create what we call a connection (or session). A good tech knows how to use common utilities to observe these connections and diagnose issues. This clip is from the chapter...
Instructional Video11:01
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Advanced Linux Commands

Higher Ed
The CompTIA exam covers a few more advanced Linux commands. These commands enable some unique navigation. This clip is from the chapter "Working with the Command-Line Interface" of the series "CompTIA A+ Certification Core 2...
Instructional Video7:39
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Advanced Windows Commands

Higher Ed
The Windows command line also provides hundreds of tools, and many have nothing to do with managing files, folders, and drives. A good tech should understand commands for manipulating processes and group policies. This clip is from the...
Instructional Video12:49
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Working with Drives

Higher Ed
Every CLI provides a complete set of tools to administer our mass storage drives. You will find tools to format and partition drives, scan for errors and correct them, and more. This clip is from the chapter "Working with the...
Instructional Video9:00
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Working with Applications

Higher Ed
This video covers these requirements, as well as some tips for using and troubleshooting applications. This clip is from the chapter "Maintaining and Optimizing Operating Systems" of the series "CompTIA A+ Certification Core 2...
Instructional Video6:08
Curated Video

ASP.NET 6.0 - Build Hands-On Web Projects - Create the Index View (Customer Controller)

Higher Ed
This video walks through the coding for creating the index view for the Customer Controller. The application is run to see the Customer list. This clip is from the chapter "Coding Project Part 2: Consume the Web API Using an ASP.NET Core...
Instructional Video10:59
Curated Video

ASP.NET 6.0 - Build Hands-On Web Projects - Creating the Home Controller

Higher Ed
At the end of this video, you will be able to customize a home controller that indicates the state of the API. This clip is from the chapter "Coding Project Part 1: Build a Web API" of the series "ASP.NET 6.0 - Build Hands-On Web...
Instructional Video16:48
Curated Video

ASP.NET 6.0 - Build Hands-On Web Projects - Migrating ASP.NET Core 3.1 to ASP.NET 6.0 (Current)

Higher Ed
This is a premium video on migrating your Web API and MVC Consume project into the latest and newly released current version of ASP.NET 6.0. The video describes how you could still easily migrate from 3.1 to 6.0 directly (as you have...
Instructional Video14:05
Curated Video

Learn Azure Serverless Functions in a Weekend - Developing Azure Functions in Local Functions App

Higher Ed
This video helps you with developing Azure Functions in the local functions app. This clip is from the chapter "Azure Functions Local Development Environment" of the series "Learn Azure Serverless Functions in a Weekend".This section...
Instructional Video5:26
Curated Video

Learn Azure Serverless Functions in a Weekend - What Is Azure Functions

Higher Ed
This video explains Azure Functions in detail. This clip is from the chapter "Introduction to the Course" of the series "Learn Azure Serverless Functions in a Weekend".This section provides an introduction to the course.
Instructional Video7:22
Curated Video

Learning GitHub Actions for DevOps CI/CD - Deploying Dockers with GitHub Actions

Higher Ed
Learn how to deploy Docker containers using GitHub Actions in this video tutorial. This clip is from the chapter "Building, Pushing, and Deploying Docker Containers" of the series "Learning GitHub Actions for DevOps CI/CD".This section...
Instructional Video13:29
Curated Video

Learning GitHub Actions for DevOps CI/CD - Continuous Integration

Higher Ed
This video explains Continuous Integration (CI) from scratch. This clip is from the chapter "Continuous Integration and Continuous Deployment" of the series "Learning GitHub Actions for DevOps CI/CD".This section focuses on Continuous...
Instructional Video7:55
Curated Video

Learning GitHub Actions for DevOps CI/CD - Running Jobs on Self-Hosted Runner

Higher Ed
This video explains and demonstrates running jobs on a self-hosted runner. This clip is from the chapter "GitHub Runners" of the series "Learning GitHub Actions for DevOps CI/CD".This section focuses on GitHub runners.
Instructional Video6:41
Curated Video

Learning GitHub Actions for DevOps CI/CD - Adding a Self-Hosted Runner

Higher Ed
This video demonstrates how to add a self-hosted runner. This clip is from the chapter "GitHub Runners" of the series "Learning GitHub Actions for DevOps CI/CD".This section focuses on GitHub runners.
Instructional Video3:57
Curated Video

Learning GitHub Actions for DevOps CI/CD - Default GitHub Variables

Higher Ed
This video explains the default GitHub variables and its use cases. This clip is from the chapter "GitHub Actions: Exploring the Features" of the series "Learning GitHub Actions for DevOps CI/CD".This section focuses on exploring the...
Instructional Video19:12
Curated Video

React JS Masterclass - Go From Zero To Job Ready - API: Product List / 104

Higher Ed
This video discusses the context in React, a method to pass props from parent to child component(s) by storing the props in a store. We will create a "cart" context to store items in our shopping cart.
Instructional Video6:11
Curated Video

React JS Masterclass - Go From Zero To Job Ready - Project Structure / 086

Higher Ed
In this video, you will learn to validate our forms in React. Here, the form will force us to enter details before we are taken to the product confirmation page.
Instructional Video22:10
Curated Video

React JS Masterclass - Go From Zero To Job Ready - Authentication - II / 264

Higher Ed
Firestore security rules can be evaluated using user authentication metadata, data from incoming queries, and existing data in your database.