Hi, what do you want to do?
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - What is AWS?
In this lecture, you will learn the basics about Amazon Web Services, what it includes and offers, and how to become a professional AWS user.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Performant Design Scenario
With an understanding of performant design, it's time to apply it to Widget Makers. In this video, see how you can implement a well-performing solution for the intended AWS uses of Widget Makers.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - API Gateway
An Application Programming Interface (API) is a wrapper for code that allows for easy access to and execution of it. The AWS API Gateway is a service that allows you to have APIs in the cloud. Learn more in this video.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Configuring Route 53 Lab
Do you need to manage DNS solutions within your AWS cloud? If so, Route 53 is the tool you will use. This video explores the capabilities and features of Route 53.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - DNS
As you begin to explore DNS in AWS, it is important to first grasp what DNS is and how it works. In this video, you will explore the basic operations and capabilities of DNS, including name resolution and DNS services.
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Summary-2
This video helps you with the summary of the entire section. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - How to Prevent Google Indexing from Happening
This video demonstrates how to prevent Google Indexing from happening. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-Web Application Security Testing with Google Hacking
This video provides an introduction to the section. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on web...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Windows Settings
Windows Settings has several options to change, update, and customize the OS. You can find settings for systems, devices, networks and internet, accounts, gaming, and more. This clip is from the chapter "Working with Operating Systems"...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - The Control Panel
The Control Panel is a large collection of applets that are used for updating system settings, dealing with hardware, and troubleshooting. This video explores the basics of the Control Panel in Windows. This clip is from the chapter...
Curated Video
ChatGPT for Creatives - Neural Text
In this video, the author talks about an AI writing tool called Neural Text. It uses artificial intelligence to help writers generate content by suggesting sentences and phrases based on the input text. The author demonstrates how to use...
Curated Video
ChatGPT for Creatives - Contentbot_ai
In this video, the author introduces Contentbot_ai, an AI-powered writing assistant that helps with generating content ideas, researching topics, and even writing complete articles. The author demonstrates how to use the tool, including...
Curated Video
The Digital Divide: Navigating Modern Technologies
Explore the impact of digital tools like smartphones, credit cards, and the internet through a challenge between Pierre, who uses traditional methods, and Christian, who uses digital solutions, to complete everyday tasks in Paris. This...
Curated Video
The Science of Online Advertising: How Your Preferences Are Tracked
Discover how online advertising is tailored to individual preferences through sophisticated tracking technologies. Learn about the use of cookies, which gather data about your browsing habits to serve targeted ads. Explore the...
Curated Video
Debunking Viral Video Mysteries: The Science Behind the Sensations
Dive into the world of viral videos where breathtaking feats challenge belief. From a wingsuit flyer allegedly landing on water without a parachute to a teenager sending a toy to the stratosphere, we explore the science that supports or...
Curated Video
Connecting Across Continents: The Evolution of Video Calls
Discover how technology has transformed communication, allowing us to stay visually connected with friends and family worldwide, even from remote vacation spots. This video delves into the advancements from traditional satellite...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Malware
Malware comes in many forms; infestations have many symptoms. This video describes malware in all its lovely shades of ugly, from viruses and worms to spontaneous application crashes and invalid certificate errors. This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Troubleshooting Internet Connections
The CompTIA A+ exams have many network troubleshooting scenario questions. The author gives you a few rules to help you get through these questions. In addition, a few basic tools and preparation makes troubleshooting most problems easy...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Internet of Things (IoT)
Author explores some of the latest and greatest networking technologies with the Internet of Things (IoT). He describes the three common wireless technologies used to connect to IoT devices, 802.11, Zigbee, and Z-wave. The author...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Virtual Private Networks (VPNs)
In this video, Author shows how Virtual Private Networks (VPNs) work and why people use VPN connections. He discusses the types of protocols and clients that make this work today and walks through a generic VPN setup. This clip is from...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Proxy Servers
In this video, the author describes how proxy servers work to block certain websites and filter outgoing or incoming content. The video shows how to set up a browser to connect to a proxy server. This clip is from the chapter "The...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - The World Wide Web
The web puts a graphical face on the Internet. You access it via a web browser, connecting with HTTP (insecure) or HTTPS (secure). Certificates give you a resource for whether a website can be trusted. This clip is from the chapter "The...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Telnet and SSH
The Telnet and SSH protocols enable techs to access and control hosts remotely using the command-line interface in Windows. Telnet offers no security. SSH connections are encrypted for better security. This clip is from the chapter "The...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Port Forwarding
NAT is a handy tool but comes with a huge drawback: no servers behind the firewall are accessible to the outside world. Port forwarding allows opening specific ports on your NAT-enabled router to provide access to servers behind it. This...