Instructional Video3:36
Curated Video

CISSP Crash Course - Architecture and Design

Higher Ed
This video explains architecture and design and takes us through what’s inside a system. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Instructional Video1:22
Curated Video

CISSP Crash Course - Security Capabilities

Higher Ed
This video explains security capabilities of information systems. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and engineering.
Instructional Video4:30
Curated Video

CISSP Crash Course - Security Controls from Requirements

Higher Ed
This video explains common criteria guidelines for security controls. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and...
Instructional Video5:45
Curated Video

CISSP Crash Course - Security Controls and Compliance Requirements

Higher Ed
This video explains security controls, security controls baseline, and compliance requirements. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset...
Instructional Video2:34
Curated Video

CISSP Crash Course - Asset Retention

Higher Ed
This video explains asset retention, end-of-life, end-of-support, and end-of-service-life. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security,...
Instructional Video4:18
Curated Video

CISSP Crash Course - Data Roles

Higher Ed
This video explains data roles, data owner, and asset owner in domain 2. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Instructional Video2:48
Curated Video

CISSP Crash Course - Secure Provisioning

Higher Ed
This video explains ownership and secure provisioning in asset security. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Instructional Video8:39
Curated Video

CISSP Crash Course - Information Assets

Higher Ed
This video explains information assets and data classification. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Instructional Video9:19
Curated Video

CISSP Crash Course - Threat Modeling

Higher Ed
This video explains threat modeling and identifying threats. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Instructional Video8:40
Curated Video

CISSP Crash Course - Personnel Security Policies and Procedures

Higher Ed
This video explains personnel security policies and procedures. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Instructional Video4:24
Curated Video

CISSP Crash Course - Policy, Standards, Procedures, and Guidelines

Higher Ed
This video explains policy, standards, procedures, and guidelines. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Instructional Video8:14
Curated Video

CISSP Crash Course - Security Concepts

Higher Ed
This video explains some basic security topics. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Instructional Video15:59
Curated Video

HashiCorp Certified - Vault Associate Course - Benefits and Use Cases of Vault

Higher Ed
This video outlines the benefits and various use cases of HashiCorp Vault. Learn all the cool things that Vault has to offer organizations that decide to use it to protect their secrets and other data. This clip is from the chapter...
Instructional Video17:06
Curated Video

HashiCorp Certified - Vault Associate Course - HashiCorp Vault - Course Overview

Higher Ed
This clip is from the chapter "Course Introduction" of the series "HashiCorp Certified - Vault Associate Course".This section provides an overview of the HashiCorp Vault course, covering the key features, benefits, and learning outcomes...
Instructional Video4:55
Curated Video

Chatbots for Beginners: A Complete Guide to Build Chatbots - Fundamentals of AWS for Chatbots: Salient Features of AWS

Higher Ed
Let's understand the salient features of AWS, including pricing, flexibility and scalability, global architecture, PaaS services, reliability, scheduling, customization, and security. This clip is from the chapter "Chatbots Development...
Instructional Video5:15
Curated Video

Chatbots for Beginners: A Complete Guide to Build Chatbots - Fundamentals of AWS for Chatbots: Overview of AWS

Higher Ed
In this lecture, we will look at Amazon Web Services, which is the most comprehensive and widely adopted web service. We will also discuss its functionality, Amazon Community, security, innovation pace, operational expertise, and so on....
Instructional Video4:42
Curated Video

HashiCorp Certified - Vault Associate Course - Lab - Okta Auth Method

Higher Ed
This is a lab video on Okta Auth Method. Learn how to enable, configure, and use the Okta auth method in this lab video. This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate...
Instructional Video14:07
Curated Video

Oracle Database Administration from Zero to Hero - Using Password File Authentication

Higher Ed
In this video, you will learn about password file authentication. You will understand the concept, create a password file, set the REMOTE_LOGIN_PASSWORDFILE parameter, explore the relationship between OS authentication and password file...
Instructional Video5:59
Curated Video

Oracle Database Administration from Zero to Hero - Applying the Principle of Least Privileges

Higher Ed
In this video, we will discuss the importance of applying the Principle of Least Privileges in Oracle databases. You will understand the concept and best practices for granting minimal privileges to users. This clip is from the chapter...
Instructional Video2:51
Curated Video

Design Microservices Architecture with Patterns and Principles - What Is Data Partitioning? And Why We Are Using Data Partitioning?

Higher Ed
The video introduces the concept of data partitioning and explains its purpose in microservices data management and discusses the benefits of data partitioning and explores the idea of distributing data across multiple partitions or...
Instructional Video5:00
Curated Video

Global Partners

3rd - 8th
Dr. Forrester describes how her community and its neighboring communities work together to solve common problems. She explains that this is how the United States operates with other countries around the world. She then talks about two...
Instructional Video5:19
Curated Video

Guarding Our Coastline

K - 8th
Mr. Griot chooses a branch of the military and walks through the steps of planning and researching the topic.
Instructional Video2:14
Curated Video

Cutting-Edge Technology in Law Enforcement and Personal Security

Pre-K - Higher Ed
The video highlights the use of advanced technology by UK police to detect uninsured and unlicensed drivers, leading to the discovery of additional criminal offenses. It also discusses Jaguar's release of a fully armored car with...
Instructional Video3:18
Curated Video

The Evolution of Shopping Technology: From ATMs to Biometric Transactions and Online Innovation

Pre-K - Higher Ed
This video explores the evolution of electronic transactions over the past four decades, highlighting key advancements such as biometric authentication, mobile phone scanning for product information, and the rise of online shopping. From...