Instructional Video5:58
Curated Video

Learn Java from Scratch - A Beginner's Guide - Step 17 - Java Interface - Example 2 - Complex Algorithm - API Defined by extern

Higher Ed
In this video, you will learn about the Java interface—example 2: complex algorithm and API defined by extern.
Instructional Video9:17
Curated Video

Unraveling Intelligence: From IQ to Brain Boosting Activities

6th - Higher Ed
Explore the complex world of intelligence, starting with IQ tests and diving into how various activities can enhance cognitive function. This video examines the neuroscience behind intelligence, including how our brains process...
Instructional Video2:52
Curated Video

Recommender Systems Complete Course Beginner to Advanced - Motivation for Recommender System: Recommender Systems Overview

Higher Ed
This video presents a brief overview of recommender systems, how they work, the processes and goals of a recommender system, and the pros and cons.
Instructional Video5:10
Curated Video

Recommender Systems Complete Course Beginner to Advanced - Motivation for Recommender System: Recommender Systems Process and Goals

Higher Ed
In this video, we will understand the need for recommender systems and the processes and goals involved.
Instructional Video3:13
Curated Video

Recommender Systems Complete Course Beginner to Advanced - Motivation for Recommender System: Introduction to Recommender Systems

Higher Ed
This video illustrates the recommender system's popularity based on demand. We will also look at the reasons for the recommender system boost.
Instructional Video8:55
Curated Video

Fundamentals of Secure Software - API Security

Higher Ed
This video explains API security.
Instructional Video4:32
Curated Video

Fundamentals of Secure Software - Defense In-Depth

Higher Ed
This video explains defense in-depth and its purpose.
Instructional Video11:09
Curated Video

Fundamentals of Secure Software - Threat Actors and More Definitions

Higher Ed
This video demonstrates the different attackers that threaten software and systems. You will look at more foundational definitions.
Instructional Video5:11
Curated Video

Fundamentals of Secure Software - SANS Top 25

Higher Ed
This video provides an introduction to the SANS Top 25.
Instructional Video9:46
Curated Video

Fundamentals of Secure Software - Application Security Goals

Higher Ed
In this video, we will continue defining terms and start talking about security goals.
Instructional Video8:43
Curated Video

A Detailed Guide to the OWASP Top 10 - Introduction to APIs

Higher Ed
In this session, we will explore the fundamentals of APIs, their importance in modern web applications, and the basics of how they work.
Instructional Video3:28
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Multi-Factor Authentication

Higher Ed
What if you don't trust a single authentication method, such as a username and password pair? Then you can use multi-factor authentication, which is presented in this video.
Instructional Video6:34
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Widget Makers Scenario

Higher Ed
In this video, we present a scenario that will be used throughout this chapter. Widget Makers needs an AWS solution and we're going to help them implement it with some solid design recommendations.
Instructional Video4:33
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - CloudWatch

Higher Ed
In earlier videos of this course, CloudWatch has been referenced. In this video, you will see what CloudWatch has to offer so that you can design for it well.
Instructional Video5:38
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Credential Rotation

Higher Ed
An additional factor is credential rotation. You will learn about this process and how to configure password rotation policies in this video.
Instructional Video6:29
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Windows 10 Editions and Features

Higher Ed
There are important differences between Windows 10 Home, Pro, Pro for Workstations, and Enterprise. This video reviews the versions and feature differences. This clip is from the chapter "Installing and Upgrading Operating Systems" of...
Instructional Video9:13
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Encrypting Mass Storage

Higher Ed
Securing mass storage is a critical aspect of system security. Make sure you know the many ways a system's mass storage can be encrypted. This clip is from the chapter "Implementing Mass Storage" of the series "CompTIA A+ Certification...
Instructional Video2:25
Curated Video

ChatGPT and DALL-E: Sell Your Creative Thinking with AI - Examples of Biased AI

Higher Ed
In this video, we will provide some examples of biased AI systems. We will explore how bias can manifest in different types of AI systems and provide some real-world examples of biased AI. This clip is from the chapter "AI and Bias" of...
Instructional Video5:33
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Environmental Controls

Higher Ed
Controlling environmental factors enables you to create a safe computing space. This video looks at options for disposing of waste such as old printer cartridges and controlling temperature and humidity. The author describes proper...
Instructional Video7:54
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Dealing with Threats

Higher Ed
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This video covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Instructional Video6:52
Healthcare Triage

Climate Change and Safe Drinking Water

Higher Ed
In our last climate episode we took a look at how climate change affects the spread of infectious disease. Unfortunately, that isn’t the end of our discussion of disease on a warming planet. Waterborne diseases are already a serious...
Instructional Video6:49
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Readers and Scanners

Higher Ed
A broad cross-section of peripherals scans and read data. From flatbed scanners to barcode readers and card readers, these devices make our users' lives easier and more convenient. This clip is from the chapter "Book Chapter 10 -...
Instructional Video9:13
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Encrypting Mass Storage

Higher Ed
Securing mass storage is a critical aspect of system security. Make sure you know the many ways a system's mass storage can be encrypted. This clip is from the chapter "Book Chapter 9 - Implementing Mass Storage" of the series "CompTIA...
Instructional Video7:47
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Solid-State Drives (SSDs)

Higher Ed
Solid-state drives (SSDs) are quickly replacing HDDs for mass storage needs on almost all computers. SSDs are faster and more robust than HDDs and come with their own maintenance needs. This clip is from the chapter "Book Chapter 8 -...