Instructional Video5:35
Curated Video

Linux Network Administration - Hostname and IP Lookup

Higher Ed
This video explains how to find the IP address if you have the hostname.
Instructional Video6:28
Curated Video

Linux Network Administration - SSH and Telnet

Higher Ed
This video explains SSH and telnet, which are the two main services that run in Linux to accept connections from outside.
Instructional Video15:56
Curated Video

Linux Network Administration - rsync - Remote Synchronization

Higher Ed
This video explains rsync, which stands for remote synchronization and is used to transfer or copy files from one machine to another.
Instructional Video9:58
Curated Video

Linux Network Administration - curl and ping Commands

Higher Ed
This video explains the curl and ping commands in Linux and why we need them for troubleshooting issues.
Instructional Video7:47
Curated Video

Linux Network Administration - Downloading Files and Apps

Higher Ed
This video explains how to download files and applications in Linux using the wget command.
Instructional Video17:45
Curated Video

Linux Network Administration - NIC Bonding

Higher Ed
This video explains one of the very important and critical aspect of Linux, which is NIC bonding.
Instructional Video7:08
Curated Video

Linux Network Administration - NIC Information

Higher Ed
This video explains the Network Interface Card information, which is installed in the computer.
Instructional Video9:28
Curated Video

Linux Network Administration - Network Files and Commands

Higher Ed
This video explains network files and commands that helps us configure the machine.
Instructional Video3:03
Curated Video

Linux Network Administration - Network Components

Higher Ed
This video explains the network components in Linux, which helps in building or installing Linux machines.
Instructional Video3:03
Curated Video

Linux Network Administration - Enabling Internet in Linux

Higher Ed
This video explains how to enable internet access in the virtual machine.
Instructional Video24:36
Curated Video

Linux Network Administration - Linux CentOS8 Installation

Higher Ed
This video explains the installation of CentOS8 onto your system.
Instructional Video3:43
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Securing Your Home Router

Higher Ed
In this video, you will learn how to enhance the security of your home router by discovering the IP address associated with it. Gain valuable insights on securing your router effectively.
<
br/>
This clip is from the chapter...
Instructional Video9:36
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Browser Security - Brave Browser

Higher Ed
In this video, you will dive into the realm of browser security, focusing on the specific features and tools available for enhancing security while using the Brave Browser.
<
br/>
This clip is from the chapter "Internet and Browsing...
Instructional Video24:38
Curated Video

Linux PAM Security Administration - Linux CentOS Installation

Higher Ed
This video explains the installation process of CentOS 8 onto your system.
Instructional Video8:16
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Configuring an EC2 Linux Instance Lab

Higher Ed
After implementing the Linux instance, you will need to know a bit about configuring. This video takes you through some important instance configuration tasks.
Instructional Video7:56
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Gateways (VPGs and CGWs)

Higher Ed
Do you want to connect your local network to AWS in a seemingly permanent way that is also secure? If so, you need to understand VPGs and CGWs, the topic of this video.
Instructional Video6:30
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Elastic IP Addresses

Higher Ed
With default configurations, AWS instances use private IP addresses that are not routable on the Internet. What do you do if you need a public address that works directly on the Internet without a NAT device? This video answers the...
Instructional Video4:19
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Configuring DHCP Options Lab

Higher Ed
You can configure some DHCP options for the devices that participate in your VPC. This video shows you how to configure these options.
Instructional Video3:23
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - EFS and PrivateLink

Higher Ed
How can you ensure secure connections between your VPCs, services, and applications in AWS? Check out PrivateLink to find out.
Instructional Video14:24
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - DNS

Higher Ed
As you begin to explore DNS in AWS, it is important to first grasp what DNS is and how it works. In this video, you will explore the basic operations and capabilities of DNS, including name resolution and DNS services.
Instructional Video10:29
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Maintaining Mobile Devices

Higher Ed
Mobile devices are surprisingly self-maintaining these days, but there are a few issues that come up occasionally. A big part of this is understanding the names and functions of certain settings unique to smartphones.
<
br/>
This...
Instructional Video7:46
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Virtual Private Networks (VPNs)

Higher Ed
In this video, Author shows how Virtual Private Networks (VPNs) work and why people use VPN connections. He discusses the types of protocols and clients that make this work today and walks through a generic VPN setup.
<
br/>
This...
Instructional Video7:46
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Remote Desktop Connections

Higher Ed
The Remote Desktop Protocol (RDP) enables you to connect to a remote Windows system and control it using the graphical user interface. Virtual Network Computing (VNC) enables you to connect to all sorts of computers, including Windows,...
Instructional Video10:26
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Wireless Encryption

Higher Ed
Everything on an unencrypted (open) wireless network is easily intercepted by anyone with the right capture tools. Over the years, 80 2.11 has developed three different encryption standards, each with its own idiosyncrasies, strengths,...