Instructional Video8:00
Curated Video

Robots at Home: The Future of Domestic Automation

6th - Higher Ed
Explore the rapid evolution of robots from mere concepts to essential household companions that handle chores, assist with homework, and even cook meals. Discover how advancements in robotics are integrating intelligent, humanoid...
Instructional Video7:08
Curated Video

Linux Network Administration - NIC Information

Higher Ed
This video explains the Network Interface Card information, which is installed in the computer.
Instructional Video1:52
Curated Video

Fundamentals of Secure Software - IAST (Interactive Application Security Testing)

Higher Ed
This video demonstrates IAST (Interactive Application Security Testing).
Instructional Video5:33
Curated Video

Fundamentals of Secure Software - SAST (Static Application Security Testing)

Higher Ed
This video provides an introduction to SAST (Static Application Security Testing).
Instructional Video5:04
Curated Video

Fundamentals of Secure Software - Type of Threat Modeling

Higher Ed
This video demonstrates different types of threat modeling.
Instructional Video3:17
Curated Video

Fundamentals of Secure Software - SKF (Security Knowledge Framework)

Higher Ed
This video explains how to use the SKF (Security Knowledge Framework).
Instructional Video4:31
Curated Video

Fundamentals of Secure Software - Security Misconfiguration

Higher Ed
This video talks about security misconfiguration.
Instructional Video2:00
Curated Video

A Detailed Guide to the OWASP Top 10 - #5 Security Misconfiguration Prevention

Higher Ed
This video explains the steps to be taken to prevent the OWASP 05 security misconfiguration.
Instructional Video3:33
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Have I Been Pwned?

Higher Ed
In this video, the author introduces you to a web tool called “have I been pwnedâ€; this is a website where you can check whether your email address or password has been compromised. This clip is from the chapter "Personal Security" of...
Instructional Video3:18
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Creating a Personal Disaster Recovery Plan

Higher Ed
In this video, you will learn to create your very own disaster recovery plan. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section talks about malware...
Instructional Video5:08
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Trusted Advisor

Higher Ed
Wouldn't it be amazing if you have someone you could turn to and ask them to evaluate your AWS implementation for problems in security, performance, and cost management? The good news is that you do. It's the Trusted Advisor within AWS...
Instructional Video8:23
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Elastic Container Service (ECS)

Higher Ed
At times, you might want to run some code in AWS without having to launch, configure, upgrade, and manage entire EC2 instances. You may be able to do this with the Elastic Container Service and this video explains how.
Instructional Video16:13
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Services, Part 3

Higher Ed
This video continues the AWS offerings tour and looks at the most recent additions to the AWS system.
Instructional Video11:02
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Analytics Engines

Higher Ed
AWS provides several services for analytics, including CloudSearch, ElasticSearch Service, Data Pipeline, AWS Glue, QuickSight and Athena. This video provides a quick tour of these services for the solutions architect.
Instructional Video7:33
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - OpsWorks

Higher Ed
For years, we have had operations management software solutions in internal enterprise networks. AWS offers the same using OpsWorks and this video explores the features and capabilities of this solution.
Instructional Video5:31
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Kinesis

Higher Ed
What can you use to analyze data on-the-fly in AWS? The answer is Kinesis and its several implementation methods. In this video, you are introduced to the Kinesis solution in AWS and what it has to offer.
Instructional Video6:04
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Fuzzing with Burp Suite Intruder Overview

Higher Ed
This video provides you with an overview of Fuzzing with the help of Burp Suite Intruder. This clip is from the chapter "Fuzzing with Burp Suite Intruder" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Instructional Video4:20
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - The Basics of Fuzzing

Higher Ed
This video provides basic knowledge on Fuzzing. This clip is from the chapter "Fuzzing with Burp Suite Intruder" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on Fuzzing with Burp Suite...
Instructional Video5:07
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Summary-1

Higher Ed
This video helps you with the summary of this section. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on...
Instructional Video3:39
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Dumping Database Table Entries Demo

Higher Ed
This is a demo video on how to dump database table entries. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section...
Instructional Video6:59
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - The Basics of Sqlmap Overview

Higher Ed
This video provides an overview of the basics of Sqlmap. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses...
Instructional Video10:11
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-How Hackers Find SQL Injections in Minutes with Sqlmap

Higher Ed
This video provides an overview of the section. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on how...
Instructional Video8:39
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Presenting User Profile Images

Higher Ed
In this video, the presenter shows how to present the user profile images in the app UI by creating a route to serve the static files.
Instructional Video10:25
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - What Is the Registry?

Higher Ed
The Registry is the primary repository for everything about your Windows system. The Registry is rarely accessed directly, but, when necessary, we use the Registry Editor utility to do so. This clip is from the chapter "Working with...