Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Security Policies
NTFS permissions control files and folders, but there are plenty of other resources that need control. Security policies control factors such as login attempts, printer access, and password length/complexity. This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Documents You Need to Know
Good techs must be comfortable with the common documentation used by IT departments everywhere. From hardware inventory to network diagrams to the many policies used in our industry, tech should know when and how documentation comes into...
Healthcare Triage
The Unequal Impacts of Climate Change
Climate change is driven by humans and will affect us all. But it’s not driven by everyone equally, and it doesn’t affect everyone equally. In the last 250 years, 77% of global emissions were emitted by Europe, North America, Australia,...
Healthcare Triage
Ways We Can Mitigate Climate Change
We’ve spent a bunch of time this year examining the many, many health effects of climate change. And while we are no experts on climate change and what the best solutions are to address it, we are clearly interested in addressing it for...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Troubleshooting Theory
The CompTIA A+ defines a very specific workflow process to troubleshoot any problem on a system. These steps will help you mentally break down the steps to diagnose and repair a computer problem. This clip is from the chapter "Book...
Curated Video
CISSP Crash Course - Security Governance
This video explains security policy and how to apply security governance. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Curated Video
CISSP Crash Course - Personnel Security Policies and Procedures
This video explains personnel security policies and procedures. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Curated Video
CISSP Crash Course - Policy, Standards, Procedures, and Guidelines
This video explains policy, standards, procedures, and guidelines. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Curated Video
HashiCorp Certified - Vault Associate Course - Vault Authentication Using the API
This video helps you with the Vault authentication using the API. This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on comparing...
Curated Video
HashiCorp Certified - Vault Associate Course - Managing Tokens Using the CLI
In this video, we will discuss how to use the Vault CLI to manage Vault tokens. This clip is from the chapter "Assess Vault Tokens" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on the Assess Vault...
Curated Video
HashiCorp Certified - Vault Associate Course - Introduction to Vault Tokens
This video provides an introduction to Vault tokens. This clip is from the chapter "Assess Vault Tokens" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on the Assess Vault tokens.
Curated Video
HashiCorp Certified - Vault Associate Course - Exam Tips for Objective 2
In this video, we will provide some exam tips for Objective 2 of the HashiCorp Certified Vault Associate certification exam. You will see some exam tips for Objective 2 to ensure that you are ready to tackle the questions related to this...
Curated Video
HashiCorp Certified - Vault Associate Course - Working with Policies
In this video, you will learn working with the Vault policies on a day-to-day basis. This clip is from the chapter "Create Vault Policies" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on creating...
Curated Video
HashiCorp Certified - Vault Associate Course - Anatomy of a Vault Policy
In this video, we will explore the anatomy of a HashiCorp Vault policy and how to write effective policies for securing Vault resources. When writing policies, it's important to understand the two parts that make up a policy. This clip...
Curated Video
HashiCorp Certified - Vault Associate Course - Introduction to Vault Policies
This video provides an introduction to Vault policies. You will learn why policies are important in Vault and how they are used to secure your environment. This clip is from the chapter "Create Vault Policies" of the series "HashiCorp...
Curated Video
HashiCorp Certified - Vault Associate Course - Lab—Vault Entities
This is a lab video on Vault entities. This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on comparing authentication methods.
Curated Video
Oracle Database Administration from Zero to Hero - Creating an Oracle Database (Part 3 of 3)
In this video, we will continue the process of creating an Oracle database by exploring topics such as responding to the DBCA window, working with sample schemas, dropping Oracle databases, and following guidelines for creating Oracle...
Curated Video
Oracle Database Administration from Zero to Hero - Configuring RMAN Persistent Settings (Part 1 of 2)
In this video, we will focus on configuring RMAN persistent settings. You will learn how to set the RMAN backup retention policy, which determines how long backup data is retained. This clip is from the chapter "Database Recovery" of the...
Curated Video
Design Microservices Architecture with Patterns and Principles - What Is Clean Architecture?
In this video, we will delve deeper into the principles and components of Clean Architecture. We will explore the Dependency Rule, which governs the direction of dependencies within the system, and understand how it helps achieve...
Curated Video
Design Microservices Architecture with Patterns and Principles - Microservices Resilience, Observability, Monitoring Code Review - E-Commerce App
In this video, a code review is conducted for the microservices' resilience, observability, and monitoring aspects in the e-commerce application. We will explore the codebase related to resilience patterns, logging, distributed tracing,...
MarketWatch
How to lower your home insurance premium
Homeowners insurance costs are on the rise across the country. But there are still things you can do to reduce your monthly bill. Here are some tips to consider.
Curated Video
Power in Organizations: The Power of Governance
In this video, we will look at the power organizations derive from their governance structures and processes.
Financial Times
Al Gore on Big Oil, COP28, and the fight for climate action
The former US vice-president tells Simon Mundy, at the start of the FT's Moral Money Summit Americas, why he thinks this year's COP28 climate change talks in the United Arab Emirates look likely to fail, and what it will take for the...
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - IAM Custom Policies (Guide)
Let's understand how to apply the custom JSON policies explored in the last lecture to a new user created.