Hi, what do you want to do?
Great Big Story
Greg Cipes, the voice behind Beast Boy
Explore the inspiring journey of Greg Cipes, the talented voice actor known for Beast Boy, and his impact on the world of animation.<br/>
Great Big Story
Greg Cipes, the voice behind beast boy
Explore the inspiring journey of Greg Cipes, the talented voice actor known for Beast Boy, and his impact on the world of animation.<br/>
Wonderscape
Hattie McDaniel: The First Black Oscar Winner
This video tells the story of Hattie McDaniel, the first Black person to win an Academy Award for her role in Gone With the Wind. Learn about her groundbreaking achievements, the criticism she faced, and the barriers she helped to...
Curated Video
The CISO Masterclass - Career Path to vCISO
In this video, explore the exciting opportunities and challenges of transitioning to a virtual CISO (vCISO) role and the unique career path it offers.
Curated Video
The CISO Masterclass - Authors' Journey - From Helpdesk to CISO
In this video, you will discover the inspiring journey of the authors as they share their transformation from a helpdesk role to becoming a successful CISO.
Curated Video
Professional Scrum Master 2 (PSM II) Certification - A Crash Course - Tip 14: How to Respect Your Team's Space
Tip 14: How to Respect Your Team's Space
Curated Video
Professional Scrum Master 2 (PSM II) Certification - A Crash Course - Scrum Master Roles: How to Improve Product Owner Efficiency
In this video, you will learn to build multi-stage Docker images and create optimized Docker images using multiple stages. We will understand how to leverage the benefits of multi-stage builds, such as reducing image size and enhancing...
Curated Video
Professional Scrum Master 2 (PSM II) Certification - A Crash Course - Scrum Team Accountabilities
This video will give us an in-depth overview of ChatGPT, what ChatGPT is, how it works, and its key features and capabilities. We will gain a clear understanding of the underlying technology behind ChatGPT, setting the stage for your...
Curated Video
A Detailed Guide to the OWASP Top 10 - #1 Broken Access Control Prevention
This video explains how to prevent broken access control on our website or on our applications.
Curated Video
A Detailed Guide to the OWASP Top 10 - #1 Broken Access Control
This video explains A01:2021 - broken access control, which is the most significant security risk-facing application.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Authentication
AWS provides two primary authentication methods (though more can be implemented) and these are covered in this video. Additionally, you will learn the basics of authentication.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Principals
With any identity and access management solution, it is essential to understand the principal that can be managed, such as users and groups. This video introduces you to the principals you will manage in AWS.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Identity and Access Management (IAM) Overview
How do you control who or what has access to your AWS account and the services running in it? The answer is Identity and Access Management (IAM) and this video introduces the fundamental concepts of IAM.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Cognito
What can you do if you want to integrate a local Active Directory or another identity management system with AWS? The answer is found in Cognito, an AWS solution for user identity and data synchronization or single sign-on (SSO).
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - IAM Roles
When you want an application or CLI interface to access AWS and its services, you can use IAM roles. This video explores the process used to create and manage roles in AWS.
Curated Video
CISSP Crash Course - Identity Lifecycle
This video explains the identity and access lifecycle along with access review.
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on...
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on...
Curated Video
CISSP Crash Course - Data Roles
This video explains data roles, data owner, and asset owner in domain 2.
<
br/>
This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data,...
<
br/>
This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data,...
Curated Video
HashiCorp Certified - Vault Associate Course - Lab—Database Secrets Engine
This is a lab video on Database Secrets Engine.<br<br/>/>
This clip is from the chapter "Compare and Configure Secrets Engines" of the series "HashiCorp Certified - Vault Associate Course".null
This clip is from the chapter "Compare and Configure Secrets Engines" of the series "HashiCorp Certified - Vault Associate Course".null
Curated Video
HashiCorp Certified - Vault Associate Course - Lab—AWS Secrets Engine—Assumed_Role
This is a lab video on AWS Secrets Engine—Assumed_Role. You will learn how to use the AWS Secrets Engine while using the Assumed_Role credential type.
<
br/>
This clip is from the chapter "Compare and Configure Secrets Engines" of...
<
br/>
This clip is from the chapter "Compare and Configure Secrets Engines" of...
Curated Video
HashiCorp Certified - Vault Associate Course - Lab - AppRole Auth Method
In this lab video, we will walk through how to enable and configure the AppRole auth method.
<
br/>
This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate Course".This...
<
br/>
This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate Course".This...
Curated Video
HashiCorp Certified - Vault Associate Course - Lab—Configuring Auth Methods Using the CLI
This is a lab video on configuring Auth methods using the CLI.
<
br/>
This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on comparing...
<
br/>
This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on comparing...
Curated Video
Oracle Database Administration from Zero to Hero - Creating PDBs (Part 1 of 2)
In this video, we will cover the process of creating Pluggable Databases (PDBs). You will understand the prerequisites for PDB creation and explore methods such as using DBCA and SQL Developer to create PDBs.
<
br/>
This clip is...
<
br/>
This clip is...
Curated Video
Oracle Database Administration from Zero to Hero - Practice - Managing Local and Common Users (Part 2 of 2)
In this practice video, we will continue our hands-on practice with managing local and common users. You will grant privileges as common or local and enable common users to view information about specific PDBs.
<
br/>
This clip is...
<
br/>
This clip is...
Curated Video
Oracle Database Administration from Zero to Hero - Managing Local and Common Users
In this video, we will explore the concepts of local and common users. You will understand the difference between these user types, learn how to create common and local users, grant privileges commonly and locally, and differentiate...