Curated Video
Learn Java from Scratch - A Beginner's Guide - Step 17 - Java Interface - Example 2 - Complex Algorithm - API Defined by extern
In this video, you will learn about the Java interface—example 2: complex algorithm and API defined by extern.
Curated Video
Unraveling Intelligence: From IQ to Brain Boosting Activities
Explore the complex world of intelligence, starting with IQ tests and diving into how various activities can enhance cognitive function. This video examines the neuroscience behind intelligence, including how our brains process...
Curated Video
Recommender Systems Complete Course Beginner to Advanced - Motivation for Recommender System: Recommender Systems Overview
This video presents a brief overview of recommender systems, how they work, the processes and goals of a recommender system, and the pros and cons.
Curated Video
Recommender Systems Complete Course Beginner to Advanced - Motivation for Recommender System: Recommender Systems Process and Goals
In this video, we will understand the need for recommender systems and the processes and goals involved.
Curated Video
Recommender Systems Complete Course Beginner to Advanced - Motivation for Recommender System: Introduction to Recommender Systems
This video illustrates the recommender system's popularity based on demand. We will also look at the reasons for the recommender system boost.
Curated Video
Fundamentals of Secure Software - Defense In-Depth
This video explains defense in-depth and its purpose.
Curated Video
Fundamentals of Secure Software - Threat Actors and More Definitions
This video demonstrates the different attackers that threaten software and systems. You will look at more foundational definitions.
Curated Video
Fundamentals of Secure Software - SANS Top 25
This video provides an introduction to the SANS Top 25.
Curated Video
Fundamentals of Secure Software - Application Security Goals
In this video, we will continue defining terms and start talking about security goals.
Curated Video
A Detailed Guide to the OWASP Top 10 - Introduction to APIs
In this session, we will explore the fundamentals of APIs, their importance in modern web applications, and the basics of how they work.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Multi-Factor Authentication
What if you don't trust a single authentication method, such as a username and password pair? Then you can use multi-factor authentication, which is presented in this video.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Widget Makers Scenario
In this video, we present a scenario that will be used throughout this chapter. Widget Makers needs an AWS solution and we're going to help them implement it with some solid design recommendations.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - CloudWatch
In earlier videos of this course, CloudWatch has been referenced. In this video, you will see what CloudWatch has to offer so that you can design for it well.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Credential Rotation
An additional factor is credential rotation. You will learn about this process and how to configure password rotation policies in this video.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Windows 10 Editions and Features
There are important differences between Windows 10 Home, Pro, Pro for Workstations, and Enterprise. This video reviews the versions and feature differences. This clip is from the chapter "Installing and Upgrading Operating Systems" of...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Encrypting Mass Storage
Securing mass storage is a critical aspect of system security. Make sure you know the many ways a system's mass storage can be encrypted. This clip is from the chapter "Implementing Mass Storage" of the series "CompTIA A+ Certification...
Curated Video
ChatGPT and DALL-E: Sell Your Creative Thinking with AI - Examples of Biased AI
In this video, we will provide some examples of biased AI systems. We will explore how bias can manifest in different types of AI systems and provide some real-world examples of biased AI. This clip is from the chapter "AI and Bias" of...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Environmental Controls
Controlling environmental factors enables you to create a safe computing space. This video looks at options for disposing of waste such as old printer cartridges and controlling temperature and humidity. The author describes proper...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Dealing with Threats
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This video covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Healthcare Triage
Climate Change and Safe Drinking Water
In our last climate episode we took a look at how climate change affects the spread of infectious disease. Unfortunately, that isn’t the end of our discussion of disease on a warming planet. Waterborne diseases are already a serious...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Readers and Scanners
A broad cross-section of peripherals scans and read data. From flatbed scanners to barcode readers and card readers, these devices make our users' lives easier and more convenient. This clip is from the chapter "Book Chapter 10 -...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Encrypting Mass Storage
Securing mass storage is a critical aspect of system security. Make sure you know the many ways a system's mass storage can be encrypted. This clip is from the chapter "Book Chapter 9 - Implementing Mass Storage" of the series "CompTIA...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Solid-State Drives (SSDs)
Solid-state drives (SSDs) are quickly replacing HDDs for mass storage needs on almost all computers. SSDs are faster and more robust than HDDs and come with their own maintenance needs. This clip is from the chapter "Book Chapter 8 -...