Instructional Video4:33
Curated Video

Serverless JavaScript Projects 1.3: AWS Lambda Functions Are the Way to Go in FaaS Architectures

Higher Ed
We will show that AWS Lambda is the only way to go if you want to have production quality code running in serverless setups. • Understand what AWS FaaS is • Show how AWS Lambda is the only solid option • Sign up for AWS
Instructional Video5:43
Curated Video

Tips, Tricks, and Techniques for Node.js Development 2.1: Using const and arrow Functions

Higher Ed
In this video, we will learn how we can benefit from the new features of ECMAScript, const, let, and arrow functions. • Understand let and const • Change var statements into const statements • Use arrow functions instead of function...
Instructional Video4:59
Curated Video

Learning D3.JS 5.0 9.4: Updating the Nodes

Higher Ed
Learn how to update nodes. • Create the nodeUpdate • Use the methods .transition and .duration • Create the nodeExit
Instructional Video3:44
Curated Video

Learning D3.JS 5.0 4.5: Modifying Elements

Higher Ed
In this video, we will learn which methods can modify the elementsand the difference from other methods. • Navigate to GitHub to read for the attr() and text() methods. • Use these methods. Understand and write the examples. • Talk about...
Instructional Video4:18
Curated Video

Learning D3.JS 5.0 3.2: Creating Paths

Higher Ed
In this video, we will learn how we can create paths. • Learn about path commands • Create a shape with straight lines • Create a shape with curved lines
Instructional Video9:32
Curated Video

Bug Bounty Program Certification 8.2: Find Bug and Hack Database of a Website Using Kali Linux Tools

Higher Ed
This video explores database attack using Kali Linux tool. • Understand sqlmap tool • Explore web database penetration using sqlmap commands in Kali Linux • Explanation of commands
Instructional Video9:39
Curated Video

Bug Bounty Program Certification 3.4: Find Bugs Using Network Vulnerability Scanner

Higher Ed
This video explores Nessus installation steps. • Download Nessus network vulnerability scanner • Install process of Nessus tool • Learn about basic scanning using Nessus
Instructional Video4:44
Curated Video

Bug Bounty Program Certification 2.4: Update and Upgrade Kali Linux Operating System

Higher Ed
This video will help you learn how to update and upgrade process. • Learn about update and upgrade process • Update process • Upgrade process
Instructional Video5:05
Curated Video

Bug Bounty Program Certification 1.4: Bug Bounty Latest Terminologies

Higher Ed
In this video, you will learn about terms in bug bounty. • Explore basic terminologies • Explain different terminologies in bug bounty • Difference between different terminologies in bug bounty
Instructional Video4:52
Packt

Introduction to computer hardware and software : Projectors

Higher Ed
From the section: Display Technologies. In this section, we explore our display options for per our uses. It’s easy to think of projectors as nothing more than monitors that project on a wall but that’s a bit short-sighted. Projectors...
Instructional Video2:22
Curated Video

Ensemble Machine Learning Techniques 4.4: Predicting Churn Using Boosting

Higher Ed
This video aims to teach the viewer how to use Boosting in a real-world scenario. • We see the problem we are trying to solve • We use Boosting to find out customer churn
Instructional Video5:43
Curated Video

Java 11 Programming for Beginners 5.1: Using Generics and Collections

Higher Ed
This video introduces the features of generics and collections, two features that very much work together. • An example problem: the personal finance analyzer • A quick chat on the theory of collections and generics • Establish basic...
Instructional Video2:49
Curated Video

Java 11 Programming for Beginners 1.3: Setting Up Environment and Prerequisites

Higher Ed
The goal is to set up the skeleton of the project that will have the Hello World program. It will show how to create a basic Gradle configuration file for Java use. • Prepare the directory • Create the gradle configuration file • Open...
Instructional Video5:14
Curated Video

Mastering Tableau 2018.1, Second Edition 9.5: Using Filters and LODs

Higher Ed
In this video, we’ll see the difference between LODs and filters. • Apply filters in LODs
Instructional Video6:51
Curated Video

Mastering Tableau 2018.1, Second Edition 9.1: Exploring Level-of-Detail (LOD) Expressions

Higher Ed
In this video, we’ll see learn how to write LOD expressions. • Understand what Level-of-Detail expression means • Implement LOD expressions
Instructional Video8:07
Curated Video

Tips, Tricks, and Techniques for Node.js Development 6.5: Detecting Vulnerabilities

Higher Ed
In this video, we will learn how to audit our Node.js application for vulnerabilities. • Run retire.js on your node application • Look at NSP plugin on GitHub • Show HTTP header test
Instructional Video2:28
Curated Video

Learning D3.JS 5.0 4.4: The append() Method

Higher Ed
In this video, we will learn what the append() method is and how to use it. • Continue the code by adding the append() method • Continue the short example • Understand the example using the console in the developer tools
Instructional Video11:35
Curated Video

Bug Bounty Program Certification 13.3: Certification Exam Practice Questions – Part 2

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video7:13
Curated Video

Bug Bounty Program Certification 9.2: Persistent Attack on Website Frontend

Higher Ed
In this video, learn how to perform persistent attack on websites. • Learn how to setup Lab using Mutillidae Buggy web application for persistent attack • Insert a phish website inside another website • Divert a web application to...
Instructional Video10:08
Curated Video

Cloud Native Development on Azure with Java 4.4: Configure a Working, Automated Pipeline in Jenkins

Higher Ed
In this video, you will learn how to deploy your sample. • Create a new directory to store the SSH keys • Allow remote users to connect to the Jenkins server via SSH • Use the virtual machine for continuous deployment and make the...
Instructional Video2:52
Mediacorp

The Problem with Online Vigilantes

12th - Higher Ed
This video highlights the limitations of online vigilantes and shows that their speedy response can often lead to incorrect results. Digital Detectives part 4/7
Instructional Video14:56
Curated Video

Explain web security : Other Types of Reconnaissance

Higher Ed
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks. In this video we’ll understand vulnerability scanning - Check out vulnerability scanning...
Instructional Video2:49
Curated Video

Modify a data structure : Add To Tail

Higher Ed
From the section: Linked Lists. This section introduces Linked Lists and "Node" constructor functions along with Big O Notation and calculating the runtime of a function Linked Lists: Add To Tail
Instructional Video2:05
Curated Video

C++ Developer - Section Overview - Getting Started

Higher Ed
This video provides an overview of the course. This clip is from the chapter "Getting Started" of the series "The Complete C++ Developer Course".This section introduces the learning objectives of this course.