Curated Video
What is Configuration Management?
When we refer to the configuration of a system, we mean the technical description of a system and how its component parts inter-connect. So, what is Configuration Management? We define Configuration Management in our free PM Glossary:...
Curated Video
Imposter Syndrome: Do you sometimes feel you're not up to the job?
It's called 'Imposter Syndrome' and we all get it sometimes. How can you overcome it, when it really matters? It often manifests with the feeling of 'how did I get here? I'm just a little kid.' It can affect anyone from the newest...
Curated Video
What is Transactional Analysis (TA)? Eric Berne's Parent-Adlult-Child Model
As a Project Manager, you will be having a lot of conversations - with team members, stakeholders, and your bosses. Some will be hard and some easy. And you'll need to understand the dynamics of those that don't go as smoothly as you'd...
Curated Video
What is Failure Mode and Effects Analysis - FMEA? PM in Under 5
Failure Mode and Effects Analysis (or FMEA) is a powerful methodology that comes from the domain of manufacturing and the toolset of Six Sigma. But it is also a valuable addition to any Project Manager's toolset. So, what is Failure Mode...
Curated Video
Fundamentals of Object-Oriented Programming - C++ - User Registration Program
In this video, we will write a simple program for user login and registration. This clip is from the chapter "Module 2" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, we will cover statements and flow...
Curated Video
Java Multithreading and Parallel Programming Masterclass - How to Properly Size a Thread Pool
This video explains how to properly size a thread pool.
Curated Video
Java Multithreading and Parallel Programming Masterclass - Let's Play with Thread Groups
This video helps you explore and plays around with thread groups.
Curated Video
Java Multithreading and Parallel Programming Masterclass - What Is a Process?
This video talks about process in detail.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Patching and Updates
This video demonstrates how applying Windows safety patches and updates is essential in constantly keeping the system safe and how to use these patches and updates.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacks Against Encryption
In this video, we will look at the different kinds of attacks that hackers can perform to decrypt an already encrypted hard drive.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - How to Back Up Your Computer
In this video, we will look at a backup, the advantages of having a backup system in place, and how to back up your computer.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Malwarebytes
This video elaborates on another antimalware product called Malwarebytes.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - BleachBit
In this lesson, we will look at a trendy yet controversial tool called BleachBit to clear files.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - CC Cleaner
This video illustrates the CC Cleaner software, how to use it, and the benefits of using it to protect the systems.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Using GMER - Rootkit Scanner
This video demonstrates the GMER rootkit scanner and how it helps eliminate the rootkit from infesting a system.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Securing the Windows 10 Boot Process
In this video, we will look at how a rootkit can infect a system with the boot process and how this can be eliminated.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Rootkits
In this video, we will try to understand rootkits, one of the most dangerous forms of malware.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to Malware
This video introduces the malicious software and programs that harm our computer systems and networks.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - What are Privacy, Anonymity, and Pseudonymity
In this video, you will learn more about privacy, anonymity, and pseudonymity concepts.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Understanding the DNS System
In the lesson, you will learn about the domain name system responsible for translating domain names into IP addresses.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Hubs, Switches, and Routers
This video will look at hubs, switches, and routers, how they connect to network devices, and how they establish network connections.
Curated Video
Fundamentals of Object-Oriented Programming - C++ - Dynamic Memory Management
In this video, you will learn about dynamic memory management. This clip is from the chapter "Module 2" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, we will cover statements and flow control,...
Curated Video
Practical Cyber Hacking Skills for Beginners - Basics of NMAP
After installing and configuring NMAP, we will look at how this NMAP scanning program works.
Curated Video
Practical Cyber Hacking Skills for Beginners - Installing Kali Linux
After installing the Kali Linux operating system, we will go through the installation.