Curated Video
CISSP Crash Course - Secure Communication
This video explains how to implement secure communication. This clip is from the chapter "Communication and Network Security" of the series "CISSP Crash Course".This section covers domain 4, which focuses on communication and network...
Curated Video
CISSP Crash Course - Secure Design in Networks
This video explains the OSI model and the TCP/IP Or DOD model. This clip is from the chapter "Communication and Network Security" of the series "CISSP Crash Course".This section covers domain 4, which focuses on communication and network...
Curated Video
CISSP Crash Course - Security in Facility Design
This video explains how to apply security principles and controls to facility design. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Curated Video
CISSP Crash Course - Security Models
This video explains security models definition and trusted computing. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and...
Curated Video
CISSP Crash Course - Engineering Processes and Secure Design
This video explains engineering processes and secure design. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and engineering.
Curated Video
CISSP Crash Course - Understand and Comply with Investigations
This video explains evidence collection, forensics, and handling investigations. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Collect Security Process Data
This video explains collecting security process data and account management and review. This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which focuses on...
Curated Video
CISSP Crash Course - Implement and Manage Authorization
This video explains how to implement and manage authorization. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access management.
Curated Video
CISSP Crash Course - Control Physical and Logical Access
This video explains control physical and logical access as well as type of assets that are part of a system. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5,...
Curated Video
CISSP Crash Course - Asset Retention
This video explains asset retention, end-of-life, end-of-support, and end-of-service-life. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security,...
Curated Video
CISSP Crash Course - Data Roles
This video explains data roles, data owner, and asset owner in domain 2. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Curated Video
CISSP Crash Course - Threat Modeling
This video explains threat modeling and identifying threats. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Curated Video
CISSP Crash Course - Personnel Security Policies and Procedures
This video explains personnel security policies and procedures. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Curated Video
Master SQL for Data Analysis - Virtual Tables (Views)
In this lesson, we will look at creating virtual tables to look at tables in a different way than their existing database structures. This clip is from the chapter "SQL – Simplify Queries (Views, CTEs)" of the series "Master SQL for Data...
Curated Video
HashiCorp Certified - Vault Associate Course - Unsealing with Transit Auto Unseal
There are so many options for unsealing Vault, including this option that allows you to unseal using another Vault cluster. It's a pretty cool option. This video provides an overview of the transit auto-unseal feature in HashiCorp Vault,...
Curated Video
HashiCorp Certified - Vault Associate Course - Lab—Configuring Auth Methods Using the UI
This is a lab video on configuring Auth methods using the UI. This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on comparing authentication...
Curated Video
HashiCorp Certified - Vault Associate Course - Auth Methods—Section Overview
This video provides a section overview of the Auth methods. This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on comparing authentication...
Curated Video
HashiCorp Certified - Vault Associate Course - Audit Devices
In this video, we will explore the concept of audit devices in HashiCorp Vault, which are responsible for recording and storing audit logs of Vault operations. This video will help you better understand what audit devices are and how to...
Curated Video
HashiCorp Certified - Vault Associate Course - Pros and Cons of Unseal Options
In this video, we will compare and contrast the different methods of unsealing HashiCorp Vault. We have learned a lot about seal and unseal options, but which do we use? This short video will walk you through the pros and cons of each...
Curated Video
HashiCorp Certified - Vault Associate Course - Unsealing with Key Shards
In this video, we will explore the process of unsealing HashiCorp Vault using key shards, which is a method of distributing the unsealing keys across multiple individuals or systems for added security. This clip is from the chapter...
Curated Video
HashiCorp Certified - Vault Associate Course - Why Organizations Choose Vault
This video explains why organizations choose HashiCorp Vault as their go-to solution for managing secrets and sensitive data. This clip is from the chapter "Introduction to Vault" of the series "HashiCorp Certified - Vault Associate...
Curated Video
HashiCorp Certified - Vault Associate Course - How Vault Works
In this video, we will dive deep into how HashiCorp Vault works. This video shows you how it works using a familiar analogy to help us easily understand the basic concepts. This clip is from the chapter "Introduction to Vault" of the...
Curated Video
HashiCorp Certified - Vault Associate Course - What Is Vault?
This video provides a general introduction to HashiCorp Vault. Vault is a powerful open-source tool developed by HashiCorp that provides a secure and centralized way to manage secrets, encryption keys, and other sensitive data used in...
Curated Video
Chatbots for Beginners: A Complete Guide to Build Chatbots - Chatbot Development with AWS Lex and AWS Lambda: Chatbot Deployment on WhatsApp with Twilio
In this video, we will look at making sure that the chatbot is being communicated with correctly and that we do not need to avail the Lex interface to use the chatbot. This clip is from the chapter "Chatbots Development with Amazon Lex"...