Curated Video
CISSP Crash Course - Architecture and Design
This video explains architecture and design and takes us through what’s inside a system. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Curated Video
CISSP Crash Course - Security Capabilities
This video explains security capabilities of information systems. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and engineering.
Curated Video
CISSP Crash Course - Security Controls from Requirements
This video explains common criteria guidelines for security controls. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and...
Curated Video
CISSP Crash Course - Security Controls and Compliance Requirements
This video explains security controls, security controls baseline, and compliance requirements. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset...
Curated Video
CISSP Crash Course - Asset Retention
This video explains asset retention, end-of-life, end-of-support, and end-of-service-life. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security,...
Curated Video
CISSP Crash Course - Data Roles
This video explains data roles, data owner, and asset owner in domain 2. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Curated Video
CISSP Crash Course - Secure Provisioning
This video explains ownership and secure provisioning in asset security. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Curated Video
CISSP Crash Course - Information Assets
This video explains information assets and data classification. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Curated Video
CISSP Crash Course - Threat Modeling
This video explains threat modeling and identifying threats. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Curated Video
CISSP Crash Course - Personnel Security Policies and Procedures
This video explains personnel security policies and procedures. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Curated Video
CISSP Crash Course - Policy, Standards, Procedures, and Guidelines
This video explains policy, standards, procedures, and guidelines. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Curated Video
CISSP Crash Course - Security Concepts
This video explains some basic security topics. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Curated Video
HashiCorp Certified - Vault Associate Course - Benefits and Use Cases of Vault
This video outlines the benefits and various use cases of HashiCorp Vault. Learn all the cool things that Vault has to offer organizations that decide to use it to protect their secrets and other data. This clip is from the chapter...
Curated Video
HashiCorp Certified - Vault Associate Course - HashiCorp Vault - Course Overview
This clip is from the chapter "Course Introduction" of the series "HashiCorp Certified - Vault Associate Course".This section provides an overview of the HashiCorp Vault course, covering the key features, benefits, and learning outcomes...
Curated Video
Chatbots for Beginners: A Complete Guide to Build Chatbots - Fundamentals of AWS for Chatbots: Salient Features of AWS
Let's understand the salient features of AWS, including pricing, flexibility and scalability, global architecture, PaaS services, reliability, scheduling, customization, and security. This clip is from the chapter "Chatbots Development...
Curated Video
Chatbots for Beginners: A Complete Guide to Build Chatbots - Fundamentals of AWS for Chatbots: Overview of AWS
In this lecture, we will look at Amazon Web Services, which is the most comprehensive and widely adopted web service. We will also discuss its functionality, Amazon Community, security, innovation pace, operational expertise, and so on....
Curated Video
HashiCorp Certified - Vault Associate Course - Lab - Okta Auth Method
This is a lab video on Okta Auth Method. Learn how to enable, configure, and use the Okta auth method in this lab video. This clip is from the chapter "Compare Authentication Methods" of the series "HashiCorp Certified - Vault Associate...
Curated Video
Oracle Database Administration from Zero to Hero - Using Password File Authentication
In this video, you will learn about password file authentication. You will understand the concept, create a password file, set the REMOTE_LOGIN_PASSWORDFILE parameter, explore the relationship between OS authentication and password file...
Curated Video
Oracle Database Administration from Zero to Hero - Applying the Principle of Least Privileges
In this video, we will discuss the importance of applying the Principle of Least Privileges in Oracle databases. You will understand the concept and best practices for granting minimal privileges to users. This clip is from the chapter...
Curated Video
Design Microservices Architecture with Patterns and Principles - What Is Data Partitioning? And Why We Are Using Data Partitioning?
The video introduces the concept of data partitioning and explains its purpose in microservices data management and discusses the benefits of data partitioning and explores the idea of distributing data across multiple partitions or...
Curated Video
Global Partners
Dr. Forrester describes how her community and its neighboring communities work together to solve common problems. She explains that this is how the United States operates with other countries around the world. She then talks about two...
Curated Video
Guarding Our Coastline
Mr. Griot chooses a branch of the military and walks through the steps of planning and researching the topic.
Curated Video
Cutting-Edge Technology in Law Enforcement and Personal Security
The video highlights the use of advanced technology by UK police to detect uninsured and unlicensed drivers, leading to the discovery of additional criminal offenses. It also discusses Jaguar's release of a fully armored car with...
Curated Video
The Evolution of Shopping Technology: From ATMs to Biometric Transactions and Online Innovation
This video explores the evolution of electronic transactions over the past four decades, highlighting key advancements such as biometric authentication, mobile phone scanning for product information, and the rise of online shopping. From...