Instructional Video4:14
Curated Video

A Detailed Guide to the OWASP Top 10 - #2 Cryptographic Failures

Higher Ed
This video explains A02: 2021 - cryptographic failures, which focuses on failures related to cryptography.
Instructional Video9:16
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Configuring ACLs and NACLs Lab

Higher Ed
Knowing how something is implemented is important to design well for it. In this video, you will see how ACLs and NACLs are implemented within AWS.
Instructional Video9:54
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Working with Security Groups

Higher Ed
You might wonder how you can control who has access to the EC2 instances you implement. One method is with the use of security groups and this video introduces the concept.
Instructional Video4:08
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - VPN Configuration Option

Higher Ed
AWS has added a few helpful configuration options to VPNs, including split tunnels, Direct Connect, and adding certificates for authentication into VPNs.
Instructional Video9:42
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - CloudFront

Higher Ed
Do you have an application that needs to be available on the Web and perform as well as possible for the end users? Of course, you do. CloudFront is the AWS solution that helps you accomplish this, and you will learn about it here.
Instructional Video6:48
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Flow Logs

Higher Ed
If you need to log network traffic through your AWS solution, you should explore flow logs. Flow logs allow you to monitor network traffic and, with CloudWatch, receive alerts related to traffic conditions. This video introduces the...
Instructional Video6:37
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Termination Policies

Higher Ed
How do you decide which instance should be stopped when scaling in or down? The answer in AWS is termination policies and they are covered here.
Instructional Video6:51
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - More Advanced Testing with Sqlmap Demo

Higher Ed
This is a demo video of more advanced testing with Sqlmap. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section...
Instructional Video5:07
Curated Video

Learn Azure Serverless Functions in a Weekend - Introduction to Serverless Computing

Higher Ed
This video provides an introduction to serverless computing. This clip is from the chapter "Introduction to the Course" of the series "Learn Azure Serverless Functions in a Weekend".This section provides an introduction to the course.
Instructional Video6:45
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Modern CPUs

Higher Ed
The modern processor is loaded with features that you need to know in order to excel as a PC technician. Let's examine some of the modern CPU's abilities and get hands-on with a tool that has become a necessity when dealing with central...
Instructional Video10:49
Curated Video

CISSP Crash Course - Operate Detective and Preventative Controls

Higher Ed
This video explains firewalls and how to operate detective and preventative controls. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video14:43
Curated Video

CISSP Crash Course - Secure Network Components

Higher Ed
This video explains secure network components and network hardware. This clip is from the chapter "Communication and Network Security" of the series "CISSP Crash Course".This section covers domain 4, which focuses on communication and...
Instructional Video2:34
Curated Video

Design Microservices Architecture with Patterns and Principles - What Is Load Balancer? Use Load Balancer to Split the Load with Consistent Hashing

Higher Ed
In this video, we will gain an understanding of load balancers and their role in distributing incoming network traffic across multiple servers. You will learn about consistent hashing, a technique used to allocate requests to specific...
Instructional Video7:07
Curated Video

Design Microservices Architecture with Patterns and Principles - API Gateways Microservices Code Review - E-Commerce App

Higher Ed
In this video, a code review of the API gateways microservice in the e-commerce application is conducted and explores the codebase of the API gateways microservice, its role in handling client requests and routing them to the appropriate...
Instructional Video3:58
Curated Video

Design Microservices Architecture with Patterns and Principles - Retry + Circuit Breaker Pattern

Higher Ed
In this video, we will explore the combination of the Retry pattern and the Circuit Breaker pattern and how these two patterns can work together to provide a more robust and resilient solution by automatically retrying failed requests...
Instructional Video2:38
Curated Video

Design Microservices Architecture with Patterns and Principles - What Is Kubernetes and Why Do We Use Them for Microservices Deployments?

Higher Ed
In this video, Kubernetes, one of the most popular container orchestrators, is introduced. It explains the reasons why Kubernetes is widely used for microservices deployments, including its ability to automate application deployment,...
Instructional Video4:01
Curated Video

Design Microservices Architecture with Patterns and Principles - Distributed Caching in Microservices

Higher Ed
This video delves into the specific application of distributed caching in microservices architectures. It explores how distributed caching can be used to improve scalability, reduce database load, and enhance overall system performance....
Instructional Video4:58
Curated Video

The Mayor and City Council

3rd - 8th
Dr. Forrester talks about her experiences as a member of her community’s city council. She then explains the roles of city council and the mayor.
Instructional Video5:00
Curated Video

The Day Henry Met….a School Warden

Pre-K - 3rd
Henry meets a School Warden on the way to school. It's nearly time for school to start but the School Warden has got caught in traffic! If only there was another School Warden around. Henry becomes a crossing guard and helps all the...
Instructional Video1:40
Curated Video

Managing Helicopter Traffic in Sao Paulo: A Technological Solution

Pre-K - Higher Ed
Sao Paulo, Brazil's bustling business capital, has found a solution to its intense traffic congestion with a unique focus on helicopter transportation. Facing challenges with increased helicopter traffic interfering with commercial...
Instructional Video4:19
Curated Video

Future Innovations in Automotive Technology: From Robot-Assisted Cars to Collision Prevention Systems

Pre-K - Higher Ed
This video discusses innovative technologies in vehicles aimed at enhancing safety and convenience for drivers. From cars with rotating cabins and built-in robots to advanced braking systems and lane departure warnings, these features...
Instructional Video9:06
Curated Video

What is SEO? Search Engine Optimization

10th - Higher Ed
In this video, I am not going to tell you how to do Search Engine Optimization. It’s a dark art and there are many websites, courses, and videos which will claim to give good knowledge of how to do it. If that’s what you need, then...
Instructional Video7:05
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - Network Firewalls

Higher Ed
Let's understand network firewalls, security devices used to stop or mitigate unauthorized access to private networks connected to the Internet, especially intranets.
Instructional Video3:15
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - Introduction to Firewalls

Higher Ed
You will now learn the basics of firewalls. Firewalls use stateful filtering to keep track of all incoming and outgoing connections.