Instructional Video8:42
Curated Video

Web Security: Common Vulnerabilities And Their Mitigation - Anatomy of a SQLi attack - unsanitized input and server errors

Higher Ed
SQL Injection: Anatomy of a SQLi attack - unsanitized input and server errors
r/>
This clip is from the chapter "SQL Injection" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we will...
Instructional Video2:10
IDG TECHtalk

How to use the wget command: 2-Minute Linux Tips

Higher Ed
In this Linux tip, learn the wget command. It makes downloading pages from web sites – even recursively – very easy. Keep in mind that this command downloads whatever html code defines the page.
Instructional Video4:27
Curated Video

Elasticsearch 7 and Elastic Stack - In Depth and Hands On! - [Exercise] Generating Histogram Data

Higher Ed
This video presents an exercise to generate histogram data using aggregation.
r/>
This clip is from the chapter "Using Aggregation" of the series "Elasticsearch 7 and Elastic Stack - In Depth and Hands On".This section explains...
Instructional Video5:06
Curated Video

AZ-204 Developing for Microsoft Azure Exam Prep - Introduction to Redis Caching

Higher Ed
This video provides an introduction to Redis caching.
r/>
This clip is from the chapter "Caching and Content Delivery Networks (CDN)" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section introduces you...
Instructional Video13:53
Curated Video

The Complete React Developer Course (with Hooks and Redux) - Fetching Expenses: Part II

Higher Ed
In this video you'll learn how to use async Redux actions to fetch data from Firebase.
r/>
This clip is from the chapter "Firebase with Redux" of the series "The Complete React Developer Course (with Hooks and Redux)".This...
Instructional Video4:29
Curated Video

HTML CSS and JavaScript for Beginners - A Web Design Course - Try to Build a Page

Higher Ed
In this video, we'll build a page.
r/>
This clip is from the chapter "Learn HTML Course Section" of the series "HTML CSS and JavaScript for Beginners - A Web Design Course".Learn about HTML here. You will learn about Element,...
Instructional Video9:09
Curated Video

Modern HTML and CSS from the Beginning (Including Sass) - Meta Tags & Search Engines

Higher Ed
HTML Basics: Meta Tags & Search Engines<br/<br/>>

This clip is from the chapter "HTML Basics" of the series "Modern HTML and CSS from the Beginning (Including Sass)".This Section contains the HTML Basics.
Instructional Video6:04
Curated Video

Modern HTML and CSS from the Beginning (Including Sass) - Custom Domain Name

Higher Ed
Website Deployment With Netlify (FREE): Custom Domain Name
r/>
This clip is from the chapter "Website Deployment With Netlify (FREE)" of the series "Modern HTML and CSS from the Beginning (Including Sass)".In this Section,...
Instructional Video11:16
Curated Video

Web Security: Common Vulnerabilities And Their Mitigation - XSS mitigation and prevention

Higher Ed
Cross Site Scripting: XSS mitigation and prevention
r/>
This clip is from the chapter "Cross Site Scripting" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we will look into most...
Instructional Video7:42
Curated Video

Web Security: Common Vulnerabilities And Their Mitigation - Wrapping up the OWASP top 10 list

Higher Ed
One last word: Wrapping up the OWASP top 10 list
r/>
This clip is from the chapter "One last word" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, before wrapping up the author gives a...
Instructional Video10:01
Curated Video

Web Security: Common Vulnerabilities And Their Mitigation - What is XSRF?

Higher Ed
Cross Site Request Forgery: What is XSRF?
r/>
This clip is from the chapter "Cross Site Request Forgery" of the series "Web Security: Common Vulnerabilities And Their Mitigation".We will focus on attention another common attack...
Instructional Video14:40
Curated Video

Web Security: Common Vulnerabilities And Their Mitigation - Learn by example - sessions without cookies

Higher Ed
Session Management: Learn by example - sessions without cookies
r/>
This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into...
Instructional Video2:00
Curated Video

SSL Complete Guide 2021: HTTP to HTTPS - Symmetric Key Encryption

Higher Ed
In this video, we'll learn about symmetric key encryption.
r/>
This clip is from the chapter "Encryption and Hashing Overview" of the series "SSL Complete Guide 2021: HTTP to HTTPS".This section will help you learn about...
Instructional Video4:38
Curated Video

SSL Complete Guide 2021: HTTP to HTTPS - Signing Data Using Asymmetric Keys

Higher Ed
In this video, we'll learn about signing data using asymmetric keys.
r/>
This clip is from the chapter "Encryption and Hashing Overview" of the series "SSL Complete Guide 2021: HTTP to HTTPS".This section will help you learn...
Instructional Video14:05
Curated Video

Fetch()ing Data in JavaScript

Pre-K - Higher Ed
Often JavaScript apps interact with other sites and services to obtain data, like maps or transit data. In this video, Mark will show you how to use fetch() to retrieve data from other apps.
Instructional Video10:50
Curated Video

HTML5 Hyperlinks

Pre-K - Higher Ed
HTML5 Hyperlinks are used to move users from one page to another within a site or between sites on the web. In this video, Mark will teach you to make external HTML5 links, internal HTML5 links, and named anchors, which are hyperlinks...
Instructional Video5:42
Curated Video

DevOps Complete Course - Maven Goals

Higher Ed
This video explains about Maven goals.<br<br/>/>

This clip is from the chapter "Maven" of the series "DevOps Complete Course".This section focuses on Maven from scratch.
Instructional Video3:36
Food Farmer Earth

Counting Copper River Sockeye Salmon at Childs Glacier

12th - Higher Ed
As Elliot Johnson of Alaska Department of Fish and Game explains in the video, the Childs Glacier monitoring station is responsible for counting the returning salmon as they complete their ocean migration back to their native spawning...
Instructional Video15:06
The Guardian

YouTube kids: how unboxing, gaming and toy reviews took over

Pre-K - Higher Ed
Being a YouTuber is now the most popular aspiration for children today, according to a survey. In 2018, the site’s highest earner was a seven-year-old American toy reviewer. But the video platform has been mired in controversy over its...
Instructional Video5:16
Curated Video

Italy, Pompeii Odeon

12th - Higher Ed
The Odeon was a smaller roofed theatre, theatrum tectum, that sat 1500 spectators built in 80 BC. The theatre follows the plan of other Roman theatres and odeon structures. Where the Large Theatre was used primarily for staging drama,...
Instructional Video4:28
Curated Video

Italy, Rome, Roman Forum - Basilica Julia

12th - Higher Ed
The Basilica Julia was a structure that once stood in the Roman Forum. It was a large, ornate, public building used for meetings and other official business during the early Roman Empire. Its ruins have been excavated. What is left from...
Instructional Video7:58
Curated Video

CompTIA A+ Certification 220-1001: The Total Course - Cloud Computing

Higher Ed
In this episode, Mike looks at the benefits of cloud computing (or moving virtual machines out onto the Internet). The cloud VMs enable benefits such as rapid elasticity and on-demand scaling, so you can quickly support any Internet...
Instructional Video13:00
Curated Video

Web Security: Common Vulnerabilities And Their Mitigation - What is XSS?

Higher Ed
Cross Site Scripting: What is XSS?
r/>
This clip is from the chapter "Cross Site Scripting" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we will look into most common and prevalent...
Instructional Video8:09
Curated Video

Web Security: Common Vulnerabilities And Their Mitigation - Session hijacking using session fixation

Higher Ed
Session Management: Session hijacking using session fixation
r/>
This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into...