Instructional Video6:30
Curated Video

Offline-First Apps with Angular, Ionic, PouchDB, and CouchDB - Setting Up CouchDB

Higher Ed
In this video, you will learn the step-by-step process of setting up CouchDB, a NoSQL database, for your application. We will understand the configuration, installation, and database creation steps required to establish a seamless...
Instructional Video3:54
Curated Video

Offline-First Apps with Angular, Ionic, PouchDB, and CouchDB - A Fast and Easy Todo App 2

Higher Ed
In this continuation, we will complete our Todo app by adding advanced functionality such as editing and deleting todo items. You will learn to implement these features and refine the user experience of your app. This clip is from the...
Instructional Video4:41
Curated Video

Offline-First Apps with Angular, Ionic, PouchDB, and CouchDB - Introduction

Higher Ed
This video provides an overview of the course, its objectives, and the skills we will acquire. We will understand the importance of offline-first apps and get motivated to dive into the exciting world of Angular, Ionic, PouchDB, and...
Instructional Video4:19
Curated Video

Mega Web Development Bootcamp with React Bootstrap 5, Redux, and REST API - Understanding REST API for Getting Post Data

Higher Ed
In this video, you will gain an understanding of the REST API used for retrieving post data, which will be integrated into your React application. This clip is from the chapter "Working on All Posts and Post Detail with REST API...
Instructional Video13:08
Curated Video

ChatGPT and Prompt Engineering for Software Development - Code Explanation Using ChatGPT

Higher Ed
In this video, we will explore how ChatGPT can be used to explain code and enhance code comprehension and how ChatGPT can assist in explaining complex code sections, providing insights and clarifications. We will leverage ChatGPT to...
Instructional Video4:27
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - AWS Free Tier Limitations

Higher Ed
This video talks about the limitations of AWS free tier account. This clip is from the chapter "AWS Limitations" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section focuses on AWS limitations.
Instructional Video1:59
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - Secrets Manager Use Cases

Higher Ed
This video demonstrates Secrets Manager use cases. This clip is from the chapter "Secrets Manager - Rotate, Manage, and Retrieve Secrets Through Their Lifecycle" of the series "AWS Tutorial: AWS Solutions Architect and SysOps...
Instructional Video2:35
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - Store a new secret in Secrets Manager - Lab

Higher Ed
This is the lab video to store a new secret in Secrets Manager. This clip is from the chapter "Secrets Manager - Rotate, Manage, and Retrieve Secrets Through Their Lifecycle" of the series "AWS Tutorial: AWS Solutions Architect and...
Instructional Video2:38
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - What Is Secrets Manager?

Higher Ed
This video explains the Secrets Manager in detail. This clip is from the chapter "Secrets Manager - Rotate, Manage, and Retrieve Secrets Through Their Lifecycle" of the series "AWS Tutorial: AWS Solutions Architect and SysOps...
Instructional Video10:50
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - Create Stack - Lab

Higher Ed
This is the lab video to create stack. This clip is from the chapter "CloudFormation - Create and Manage Resources with CloudFormation Templates" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section...
Instructional Video5:50
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - What Is CloudFormation?

Higher Ed
This video provides an introduction to CloudFormation. This clip is from the chapter "CloudFormation - Create and Manage Resources with CloudFormation Templates" of the series "AWS Tutorial: AWS Solutions Architect and SysOps...
Instructional Video4:01
Mr. Beat

Can the Police Take Your DNA? | Maryland v. King

6th - 12th
In episode 38 of Supreme Court Briefs, a man is arrested and a sample of his DNA is taken and put into a database. The DNA sample comes back months later to reveal it matched the DNA in a rape case and he is charged with the rape. Wait a...
Instructional Video6:34
Curated Video

Are Bigger Language Models Better? | DeepMind Gopher and RETRO

Higher Ed
Are Bigger Language Models Better? | DeepMind Gopher and RETRO
Instructional Video1:33
Curated Video

The Strengths of Quantum Cryptography

12th - Higher Ed
Quantum physicist Artur Ekert (Oxford and NUS) describes a key strength of the current state of quantum cryptographic systems.
Instructional Video3:36
Curated Video

Risk Identification

Higher Ed
Risk identification is the process of documenting any risks that could keep an organization or program from reaching its objective. It's the first step in the risk management process, which is designed to help companies understand and...
Instructional Video6:43
Curated Video

Introduction to IT and Cybersecurity: Functional Areas of IT Operations

Higher Ed
Part 6/16 of Introduction to IT and Cybersecurity series: The video discusses the various functional areas of an IT department, starting with the basic organizational chart that includes positions such as IT manager, CTO/CIO, application...
Instructional Video3:59
Curated Video

Mobile Attack Surface

Higher Ed
In this video, you will get an overview on the different types of threats that affect a mobile application.
Instructional Video8:26
Curated Video

Control a Database Server with SQLMap-2 new

Higher Ed
This video will show you how to leverage SQL injection vulnerability to take full control over a Database server
Instructional Video8:11
Curated Video

Hack Active Directory Database

Higher Ed
Hack the NTDS.DIT database using shadow copies, registry command, and powershell commands
Instructional Video8:26
Curated Video

Takeover a Database Server

Higher Ed
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully. Use this technique ethically.
Instructional Video5:34
Curated Video

Hashing in a Nutshell

Higher Ed
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Instructional Video4:55
Curated Video

Introduction to Cloud Computing - What is SAAS , PAAS, and IAAS

Higher Ed
This video explains SAAS, PAAS, and IAAS. This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
Instructional Video14:16
Curated Video

Learn JMeter from Scratch on Live Applications - Performance Testin - Using Timers in JMeter

Higher Ed
This video explains how to use timers in JMeter. This clip is from the chapter "Timers in JMeter" of the series "Learn JMeter from Scratch on Live Applications - Performance Testing".This section explains the importance and function of...
Instructional Video6:07
Curated Video

Learn ASP.NET MVC and Entity Framework (Database First) - Setting up a Database

Higher Ed
This video demonstrates how to setup a database. This clip is from the chapter "Setup ASP.NET Model View Controller (MVC) Application" of the series "Learn ASP.NET MVC and Entity Framework (Database First)".In this section, you will...