Instructional Video3:26
Curated Video

Mastering Tableau 2018.1, Second Edition 5.3: Creating a Wildcard Filter

Higher Ed
We’ll see the wildcard filter. • Understand the wildcard filter • Apply a wildcard character to the data
Instructional Video3:40
Curated Video

Serverless JavaScript Projects 5.3: Test Amazon CloudFront

Higher Ed
In this video, we need to make sure the transcoding is working • Upload a video • Wait for email
Instructional Video4:18
Curated Video

Serverless JavaScript Projects 5.2: Configure Amazon CloudFront

Higher Ed
In this video, we need to create a place to transcode and store videos to use in out front end. • Use template to create a workflow • Wait for Lambda to be created
Instructional Video12:08
Curated Video

Serverless JavaScript Projects 2.4: Connect the Two Lambdas

Higher Ed
We need to get all relevant data returned to the front end in a timely fashion so all functions have the right info they need. • Have the front end call the location lambda while passing the IP as a parameter • Take the returned location...
Instructional Video6:57
Curated Video

Serverless JavaScript Projects 2.1: Front-End Design

Higher Ed
This video is walking through building a front end for the Weather App. • First get the boilerplate code for Bootstrap 4 • Utilize jQuery to get the IP address • Write up a simple front-end app using Bootstrap Jumbotron and card
Instructional Video3:22
Curated Video

Learning D3.JS 5.0 3.4: Creating Text Paths

Higher Ed
In this video, we will learn how to create text paths. • Explain what is and the benefits of using it • Code one rectangle using • Code multiple rectangles using the element
Instructional Video5:06
Curated Video

Bug Bounty Program Certification 12.1: About Android App Backend Penetration

Higher Ed
In this video, you will get a brief overview on the Android app backend penetration. • Explore the backend penetration techniques • Learn about the process of backend penetration • Have a look at the goals of backend penetration
Instructional Video3:29
Curated Video

Bug Bounty Program Certification 6.1: About Malware Attacks on Machines

Higher Ed
This video is about malware attacks. • Malware attack overview • Explore listing of malware attacks • Penetrate using malware attacks
Instructional Video4:32
Curated Video

Bug Bounty Program Certification 2.1: Download and Install VMware Workstation

Higher Ed
In this video, learn about the installation process of VMware. • Explore About VMware • Download VMware • Installation of Vmware
Instructional Video8:47
Curated Video

Bug Bounty Program Certification 1.3: Teaser – Finding Bugs in Websites and Gain Bug Bounty

Higher Ed
This video explores example of bug bounty. • Explore injection attack • Learn about manual commands • Exploit database
Instructional Video4:27
NASA

Student Scientists: Building REXIS

3rd - 11th
College students in Boston are getting the chance to help NASA explore an asteroid. These student scientists have built an instrument called REXIS, which will fly on the OSIRIS-REx spacecraft that is scheduled to launch later in 2016....
Instructional Video6:12
Curated Video

Complete Modern C++ - Sharing Pointers

Higher Ed
In this video, we will build an example that will be used to explain why we std::unique_ptr cannot be used in all cases. • Go through the Qt documentation • Understand that signals get emitted when something happens • Learn that slots...
Instructional Video10:21
Curated Video

Hands-On Auto DevOps with GitLab CI - Autoscaling Runners Using Cloud Resources

Higher Ed
To support many projects and builds in our custom CI infrastructure, we need a way to scale runners up or down automatically. • Use Ansible to provision a Docker Machine runner • Configure our Docker Machine runner with AWS credentials •...
Instructional Video2:29
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Risk Monitoring Tools

Higher Ed
This video explains risk monitoring tools. This clip is from the chapter "Risk Monitoring and Control" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains risk monitoring and control.
Instructional Video6:14
Curated Video

Mastering Tableau 2018.1, Second Edition 5.8: Understanding Aggregations

Higher Ed
We’ll start with data aggregation. • Different types of data aggregations • Aggregate data in Tableau
Instructional Video1:41
Curated Video

Serverless JavaScript Projects 3.4: Test That SMS Messages Are Being Sent and Received to and from IBM Watson

Higher Ed
We need to make sure this application works correctly. • Send several greetings to make sure Watson responds • Send several conversation closing words like ‘goodbye’ to test that the responses are appropriate • Send several conversation...
Instructional Video12:03
Curated Video

Serverless JavaScript Projects 3.2: Build a Twilio and IBM Watson AWS Lambda

Higher Ed
We need to create a middleware function API in AWS Lambda that the twilio project will hit as the endpoint for SMS messages. • Build a new Serverless project and deploy it to get the endpoint • Install Twilio as a dependency and create a...
Instructional Video4:28
Curated Video

Serverless JavaScript Projects 1.5: Get Going with AWS Lambda FaaS

Higher Ed
This video walks the user through building the first ‘Hello World’ application in AWS Lambda. • Write our first application • Run it
Instructional Video3:53
Curated Video

Tips, Tricks, and Techniques for Node.js Development 3.5: Async Await Now

Higher Ed
In this video, we will learn about async/await. • Learn how to use async await keywords • Transform our code • Execute our code
Instructional Video6:05
Curated Video

Tips, Tricks, and Techniques for Node.js Development 3.2: What about Callbacks?

Higher Ed
In this video, we will learn to work with callbacks. • Read synchronously • Read a file with callbacks • Check the package
Instructional Video5:48
Curated Video

Tips, Tricks, and Techniques for Node.js Development 1.2: Installing Node.js with NVM

Higher Ed
In this video, we will learn how to install Node.js and take control of the versions on your machine. • Install NVM • Install node with NVM • Switch from one version to another
Instructional Video9:38
Curated Video

Bug Bounty Program Certification 13.2: Bug Bounty Certification Exam Practice Questions – Part 1

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video6:16
Curated Video

Bug Bounty Program Certification 9.5: Denial of Service Attack on Websites

Higher Ed
This video will help you perform DOS attack using Kali Linux. • Explore Slowloris Program • Download Perl script in Kali Linux • Perform DOS attack using Slowloris program
Instructional Video7:51
Curated Video

Cloud Native Development on Azure with Java 4.3: Configure a GitHub Repository and Create a New Pipeline to Set Up CI

Higher Ed
This video will walk you through a few simple steps, and show you how to use Git to clone your source code repository and start implementing the CI pipeline for your application. • Configure a GitHub webhook for the Jenkins server •...