Instructional Video2:52
Great Big Story

Greg Cipes, the voice behind Beast Boy

12th - Higher Ed
Explore the inspiring journey of Greg Cipes, the talented voice actor known for Beast Boy, and his impact on the world of animation.<br/>
Instructional Video2:52
Great Big Story

Greg Cipes, the voice behind beast boy

12th - Higher Ed
Explore the inspiring journey of Greg Cipes, the talented voice actor known for Beast Boy, and his impact on the world of animation.<br/>
Instructional Video4:59
Wonderscape

Hattie McDaniel: The First Black Oscar Winner

K - 5th
This video tells the story of Hattie McDaniel, the first Black person to win an Academy Award for her role in Gone With the Wind. Learn about her groundbreaking achievements, the criticism she faced, and the barriers she helped to...
Instructional Video5:56
Curated Video

The CISO Masterclass - Career Path to vCISO

Higher Ed
In this video, explore the exciting opportunities and challenges of transitioning to a virtual CISO (vCISO) role and the unique career path it offers.
Instructional Video12:15
Curated Video

The CISO Masterclass - Authors' Journey - From Helpdesk to CISO

Higher Ed
In this video, you will discover the inspiring journey of the authors as they share their transformation from a helpdesk role to becoming a successful CISO.
Instructional Video3:35
Curated Video

Professional Scrum Master 2 (PSM II) Certification - A Crash Course - Scrum Master Roles: How to Improve Product Owner Efficiency

Higher Ed
In this video, you will learn to build multi-stage Docker images and create optimized Docker images using multiple stages. We will understand how to leverage the benefits of multi-stage builds, such as reducing image size and enhancing...
Instructional Video3:07
Curated Video

Professional Scrum Master 2 (PSM II) Certification - A Crash Course - Scrum Team Accountabilities

Higher Ed
This video will give us an in-depth overview of ChatGPT, what ChatGPT is, how it works, and its key features and capabilities. We will gain a clear understanding of the underlying technology behind ChatGPT, setting the stage for your...
Instructional Video2:58
Curated Video

A Detailed Guide to the OWASP Top 10 - #1 Broken Access Control Prevention

Higher Ed
This video explains how to prevent broken access control on our website or on our applications.
Instructional Video5:40
Curated Video

A Detailed Guide to the OWASP Top 10 - #1 Broken Access Control

Higher Ed
This video explains A01:2021 - broken access control, which is the most significant security risk-facing application.
Instructional Video6:07
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Authentication

Higher Ed
AWS provides two primary authentication methods (though more can be implemented) and these are covered in this video. Additionally, you will learn the basics of authentication.
Instructional Video10:03
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Principals

Higher Ed
With any identity and access management solution, it is essential to understand the principal that can be managed, such as users and groups. This video introduces you to the principals you will manage in AWS.
Instructional Video7:04
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Identity and Access Management (IAM) Overview

Higher Ed
How do you control who or what has access to your AWS account and the services running in it? The answer is Identity and Access Management (IAM) and this video introduces the fundamental concepts of IAM.
Instructional Video3:33
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Cognito

Higher Ed
What can you do if you want to integrate a local Active Directory or another identity management system with AWS? The answer is found in Cognito, an AWS solution for user identity and data synchronization or single sign-on (SSO).
Instructional Video8:10
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - IAM Roles

Higher Ed
When you want an application or CLI interface to access AWS and its services, you can use IAM roles. This video explores the process used to create and manage roles in AWS.
Instructional Video3:30
Curated Video

CISSP Crash Course - Identity Lifecycle

Higher Ed
This video explains the identity and access lifecycle along with access review.
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on...
Instructional Video4:18
Curated Video

CISSP Crash Course - Data Roles

Higher Ed
This video explains data roles, data owner, and asset owner in domain 2.
<
br/>
This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data,...
Instructional Video13:48
Curated Video

HashiCorp Certified - Vault Associate Course - Lab—Database Secrets Engine

Higher Ed
This is a lab video on Database Secrets Engine.<br<br/>/>

This clip is from the chapter "Compare and Configure Secrets Engines" of the series "HashiCorp Certified - Vault Associate Course".null
Instructional Video9:51
Curated Video

HashiCorp Certified - Vault Associate Course - Lab—AWS Secrets Engine—Assumed_Role

Higher Ed
This is a lab video on AWS Secrets Engine—Assumed_Role. You will learn how to use the AWS Secrets Engine while using the Assumed_Role credential type.
<
br/>
This clip is from the chapter "Compare and Configure Secrets Engines" of...
Instructional Video6:17
Curated Video

HashiCorp Certified - Vault Associate Course - Lab - AppRole Auth Method

Higher Ed
In this lab video, we will walk through how to enable and configure the AppRole auth method.
<
br/>
This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate Course".This...
Instructional Video9:47
Curated Video

HashiCorp Certified - Vault Associate Course - Lab—Configuring Auth Methods Using the CLI

Higher Ed
This is a lab video on configuring Auth methods using the CLI.
<
br/>
This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate Course".This section focuses on comparing...
Instructional Video9:53
Curated Video

Oracle Database Administration from Zero to Hero - Creating PDBs (Part 1 of 2)

Higher Ed
In this video, we will cover the process of creating Pluggable Databases (PDBs). You will understand the prerequisites for PDB creation and explore methods such as using DBCA and SQL Developer to create PDBs.
<
br/>
This clip is...
Instructional Video9:40
Curated Video

Oracle Database Administration from Zero to Hero - Practice - Managing Local and Common Users (Part 2 of 2)

Higher Ed
In this practice video, we will continue our hands-on practice with managing local and common users. You will grant privileges as common or local and enable common users to view information about specific PDBs.
<
br/>
This clip is...
Instructional Video13:33
Curated Video

Oracle Database Administration from Zero to Hero - Managing Local and Common Users

Higher Ed
In this video, we will explore the concepts of local and common users. You will understand the difference between these user types, learn how to create common and local users, grant privileges commonly and locally, and differentiate...