Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Choosing a Power Supply
Power supplies come in a dizzying array of power ratings, sizes, and efficiencies. A good tech understands these factors to make sure a system has the power it needs. This clip is from the chapter "Book Chapter 7 - Power Supplies" of the...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Form Factors
Motherboards, power supplies, and cases are surprisingly interchangeable due to industry standards called form factors. Techs should know common form factors and the benefits and challenges of each. This clip is from the chapter "Book...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Troubleshooting Firmware
A system's BIOS is robust and rarely causes trouble, but when it does a good tech must be ready to troubleshoot. Understanding a few simple tricks can make troubleshooting easier. This clip is from the chapter "Book Chapter 5 - Firmware"...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Touring a PC
Learn the basic parts of a PC in this episode. This clip is from the chapter "Book Chapter 2 - The Visible Computer" of the series "CompTIA A+ Certification Core 1 (220-1101)".In this section, we will focus on Core 1: 3.0—hardware—and...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Cloud Computing
In this episode, Mike looks at the benefits of cloud computing (or moving virtual machines out onto the Internet). The cloud VMs enable benefits such as rapid elasticity and on-demand scaling, so you can quickly support any Internet...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Wi-Fi Standards
Since the original 80 2.11 standard back in 1999, there have been five major and hundreds of minor revisions. It's impossible to support an 802.11 network without a working understanding of these standards. This clip is from the chapter...
Curated Video
Kafka for Developers - Data Contracts Using Schema Registry - Introduction to AVRO - What Is AVRO and Why AVRO?
In this video, you will learn about AVRO and why AVRO is one of the popular serialization formats. This clip is from the chapter "Introduction to AVRO - A Data Serialization System" of the series "Kafka for Developers - Data Contracts...
Curated Video
Recommender Systems with Machine Learning - Recommender Systems Process and Goals
This video helps you understand the process and goals of recommender systems. This clip is from the chapter "Motivation for Recommender System" of the series "Recommender Systems with Machine Learning".This section focuses on recommender...
Curated Video
Recommender Systems with Machine Learning - Introduction to Recommender Systems
In this video, you will get to know more about recommender systems. This clip is from the chapter "Motivation for Recommender System" of the series "Recommender Systems with Machine Learning".This section focuses on recommender systems...
Curated Video
Recommender Systems with Machine Learning - Recommender Systems Overview
This video provides an overview of recommender systems. This clip is from the chapter "Motivation for Recommender System" of the series "Recommender Systems with Machine Learning".This section focuses on recommender systems and their...
Curated Video
CISSP Crash Course - Physical Security and Safety
This video explains KPIS of physical security and safety. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Patch and Vulnerability Management
This video explains the patch and vulnerability management process. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Security Controls Testing
This video explains security controls testing and network discovery. This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which focuses on security assessment...
Curated Video
CISSP Crash Course - Federated Identities
This video explains centralized versus decentralized identities. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access...
Curated Video
CISSP Crash Course - Security in Systems
This video explains security in systems, client bases systems, and database systems. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Curated Video
CISSP Crash Course - Engineering Processes and Secure Design
This video explains engineering processes and secure design. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and engineering.
Curated Video
CISSP Crash Course - Asset Handling
This video explains information, asset handling, and how to deal with data. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and...
Curated Video
CISSP Crash Course - Design and Validate Assessment, Test, and Audit
This video explains design and validate assessment, tests, internal and external audits. This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which focuses on...
Curated Video
CISSP Crash Course - Control Physical and Logical Access
This video explains control physical and logical access as well as type of assets that are part of a system. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5,...
Curated Video
CISSP Crash Course - Security in Systems Part 2
This video continues talking about security in systems, microservices, and containerization. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Curated Video
Oracle Database Administration from Zero to Hero - Introducing Backup and Recovery
In this video, we will explore the fundamentals of backup and recovery in Oracle databases. You will learn about different categories of data failure, understand the backup and recovery roadmap, and compare the available Oracle database...
Curated Video
Oracle Database Administration from Zero to Hero - Applying the Principle of Least Privileges
In this video, we will discuss the importance of applying the Principle of Least Privileges in Oracle databases. You will understand the concept and best practices for granting minimal privileges to users. This clip is from the chapter...
Curated Video
Automating Image Creation with HashiCorp Packer for DevOps - Hands-On Lab - Integrating Packer with Red Hat Ansible
This video provides a hands-on lab that covers how to use Packer with Red Hat Ansible to automate the configuration of virtual machine images. This clip is from the chapter "Packer Integrations" of the series "Automating Image Creation...
Curated Video
I WONDER - What Is Grey Water?
This video is answering the question of what is grey water.