Instructional Video5:26
Curated Video

What is Configuration Management?

10th - Higher Ed
When we refer to the configuration of a system, we mean the technical description of a system and how its component parts inter-connect. So, what is Configuration Management? We define Configuration Management in our free PM Glossary:...
Instructional Video4:52
Curated Video

Imposter Syndrome: Do you sometimes feel you're not up to the job?

10th - Higher Ed
It's called 'Imposter Syndrome' and we all get it sometimes. How can you overcome it, when it really matters? It often manifests with the feeling of 'how did I get here? I'm just a little kid.' It can affect anyone from the newest...
Instructional Video5:31
Curated Video

What is Transactional Analysis (TA)? Eric Berne's Parent-Adlult-Child Model

10th - Higher Ed
As a Project Manager, you will be having a lot of conversations - with team members, stakeholders, and your bosses. Some will be hard and some easy. And you'll need to understand the dynamics of those that don't go as smoothly as you'd...
Instructional Video5:39
Curated Video

What is Failure Mode and Effects Analysis - FMEA? PM in Under 5

10th - Higher Ed
Failure Mode and Effects Analysis (or FMEA) is a powerful methodology that comes from the domain of manufacturing and the toolset of Six Sigma. But it is also a valuable addition to any Project Manager's toolset. So, what is Failure Mode...
Instructional Video4:48
Curated Video

Fundamentals of Object-Oriented Programming - C++ - User Registration Program

Higher Ed
In this video, we will write a simple program for user login and registration. This clip is from the chapter "Module 2" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, we will cover statements and flow...
Instructional Video12:52
Instructional Video12:42
Curated Video

Java Multithreading and Parallel Programming Masterclass - Let's Play with Thread Groups

Higher Ed
This video helps you explore and plays around with thread groups.
Instructional Video7:07
Instructional Video4:25
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Patching and Updates

Higher Ed
This video demonstrates how applying Windows safety patches and updates is essential in constantly keeping the system safe and how to use these patches and updates.
Instructional Video6:05
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacks Against Encryption

Higher Ed
In this video, we will look at the different kinds of attacks that hackers can perform to decrypt an already encrypted hard drive.
Instructional Video4:27
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - How to Back Up Your Computer

Higher Ed
In this video, we will look at a backup, the advantages of having a backup system in place, and how to back up your computer.
Instructional Video6:37
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Malwarebytes

Higher Ed
This video elaborates on another antimalware product called Malwarebytes.
Instructional Video2:54
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - BleachBit

Higher Ed
In this lesson, we will look at a trendy yet controversial tool called BleachBit to clear files.
Instructional Video8:02
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - CC Cleaner

Higher Ed
This video illustrates the CC Cleaner software, how to use it, and the benefits of using it to protect the systems.
Instructional Video1:42
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Using GMER - Rootkit Scanner

Higher Ed
This video demonstrates the GMER rootkit scanner and how it helps eliminate the rootkit from infesting a system.
Instructional Video5:31
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Securing the Windows 10 Boot Process

Higher Ed
In this video, we will look at how a rootkit can infect a system with the boot process and how this can be eliminated.
Instructional Video5:09
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Rootkits

Higher Ed
In this video, we will try to understand rootkits, one of the most dangerous forms of malware.
Instructional Video4:55
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to Malware

Higher Ed
This video introduces the malicious software and programs that harm our computer systems and networks.
Instructional Video4:41
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - What are Privacy, Anonymity, and Pseudonymity

Higher Ed
In this video, you will learn more about privacy, anonymity, and pseudonymity concepts.
Instructional Video6:22
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Understanding the DNS System

Higher Ed
In the lesson, you will learn about the domain name system responsible for translating domain names into IP addresses.
Instructional Video5:21
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Hubs, Switches, and Routers

Higher Ed
This video will look at hubs, switches, and routers, how they connect to network devices, and how they establish network connections.
Instructional Video6:52
Curated Video

Fundamentals of Object-Oriented Programming - C++ - Dynamic Memory Management

Higher Ed
In this video, you will learn about dynamic memory management. This clip is from the chapter "Module 2" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, we will cover statements and flow control,...
Instructional Video8:36
Curated Video

Practical Cyber Hacking Skills for Beginners - Basics of NMAP

Higher Ed
After installing and configuring NMAP, we will look at how this NMAP scanning program works.
Instructional Video9:37
Curated Video

Practical Cyber Hacking Skills for Beginners - Installing Kali Linux

Higher Ed
After installing the Kali Linux operating system, we will go through the installation.