Curated Video
CISSP Crash Course - Managed Identification
This video explains managed identification and authentication. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access management.
Curated Video
CISSP Crash Course - Control Physical and Logical Access
This video explains control physical and logical access as well as type of assets that are part of a system. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5,...
Curated Video
HashiCorp Certified - Vault Associate Course - Running Vault Server in Production
In this video, we will explore the best practices for running a HashiCorp Vault server in a production environment. Let's learn how we can deploy Vault in a production setting using much of the information learned so far. This clip is...
Curated Video
HashiCorp Certified - Vault Associate Course - Vault Interfaces
This video demonstrates Vault interfaces. Remember our hotel analogy from earlier and all the different ways we can interact with Vault? We will go into a little bit more detail here and show you where you can get even more information...
Curated Video
HashiCorp Certified - Vault Associate Course - Comparing Versions of Vault
In this video, we will compare and contrast the different versions of HashiCorp Vault, including the open-source version and the enterprise version. This will help viewers make an informed decision about which version of Vault is best...
Curated Video
HashiCorp Certified - Vault Associate Course - Why Organizations Choose Vault
This video explains why organizations choose HashiCorp Vault as their go-to solution for managing secrets and sensitive data. This clip is from the chapter "Introduction to Vault" of the series "HashiCorp Certified - Vault Associate...
Curated Video
HashiCorp Certified - Vault Associate Course - What Is Vault?
This video provides a general introduction to HashiCorp Vault. Vault is a powerful open-source tool developed by HashiCorp that provides a secure and centralized way to manage secrets, encryption keys, and other sensitive data used in...
Curated Video
Getting Started with HashiCorp Nomad - Monitoring Application Logs
After learning how to monitor our local Nomad environment, we will examine monitoring our applications that run on the Nomad environment. We will look at the collection logs, allocation logs, and stream logs through the API. This clip is...
Curated Video
Getting Started with HashiCorp Nomad - Working with Nomad Jobs
In this video, you will learn more about working with Nomad jobs now that we have the Nomad infrastructure up and running and secure. You will learn to launch and manage our applications on the Nomad infrastructure. This clip is from the...
Curated Video
Getting Started with HashiCorp Nomad - Managing Cluster Members
After learning how to join multiple servers and clients into our Nomad cluster, we will understand how to remove some of these cluster members from the Nomad cluster, remove server nodes, perform regular maintenance, upgrade the system,...
Curated Video
Getting Started with HashiCorp Nomad - Nomad Clients
After gaining a thorough understanding of the Nomad server, we will now focus on understanding the Nomad client concept, which are members of the Nomad data center responsible for executing tasks and jobs. This clip is from the chapter...
Curated Video
Getting Started with HashiCorp Nomad - Learning Nomad Architecture
In this video, we will explore the Nomad architecture at a high level. We will understand a data center, region, and consensus related to Nomad. We will examine the single region architecture and server-client interaction. This clip is...
Curated Video
Getting Started with HashiCorp Nomad - Introduction to Nomad
This detailed introductory video places into perspective Nomad and its key features and advantages. It talks about Nomad’s general abilities and how it compares with Kubernetes. This clip is from the chapter "Introduction to Nomad" of...
Curated Video
HashiCorp Certified - Vault Associate Course - Differentiate Human Versus System Auth Methods
In this video, we will explore the differences between human and system authentication methods in HashiCorp Vault, and when to use each type of authentication method. Objective 1C is all about knowing what auth methods are used for...
Curated Video
Oracle Database Administration from Zero to Hero - Overview of RDBMS (Part 2 of 2)
In this video, we will understand the different architecture types and application types of RDBMS. This clip is from the chapter "Introduction to RDBMS" of the series "Oracle Database Administration from Zero to Hero".In this section, we...
Curated Video
Oracle Database Administration from Zero to Hero - Database Memory Concepts (Part 2 of 2)
In this video, we will continue exploring database memory concepts. We will cover the shared pool, large pool, and redo log buffer, and understand how different application types impact the allocation of memory in the database. This clip...
Curated Video
ChatGPT and Prompt Engineering With Advanced Data Analysis - Suggest a Title for YouTube Video and Description
Here, we will use ChatGPT to generate titles and descriptions for YouTube videos. We will use ChatGPT's language generation capabilities to create titles and descriptions that are optimized for search engine optimization (SEO) and can...
Curated Video
Design Microservices Architecture with Patterns and Principles - Choosing the Right Architecture for Your Application
This video will explore the factors to consider when selecting an architecture for our application. This video discusses various architectural options, strengths, and suitability for different scenarios, empowering us to make informed...
Curated Video
Design Microservices Architecture with Patterns and Principles - Apache Kafka Use Cases
This video showcases practical applications of Apache Kafka. It discusses how Kafka can be used for real-time data processing, log aggregation, messaging systems, event sourcing, and data integration in diverse industries such as...
Curated Video
Design Microservices Architecture with Patterns and Principles - Adapt: Microservices Architecture with Fan-Out Publish/Subscribe Messaging
This video discusses the adaptation of an existing microservices architecture to incorporate the fan-out publish/subscribe messaging pattern and addresses the steps and considerations involved in introducing this pattern and its impact...
Curated Video
Design Microservices Architecture with Patterns and Principles - How gRPC Works
In this video, we will understand the inner workings of gRPC and how it enables communication between microservices. We will explore concepts such as service definition, code generation, and message exchange using protobuf. This clip is...
Curated Video
Mastering C++ Standard Library Features [Video] - The Course Overview
This video provides an overview of the entire course.
Curated Video
Design Microservices Architecture with Patterns and Principles - Kubernetes Architecture
This video provides an overview of the architecture of Kubernetes, the key components of Kubernetes, such as the control plane and worker nodes, and how they work together to manage and schedule containers. This clip is from the chapter...
Curated Video
Design Microservices Architecture with Patterns and Principles - What Is Kubernetes and Why Do We Use Them for Microservices Deployments?
In this video, Kubernetes, one of the most popular container orchestrators, is introduced. It explains the reasons why Kubernetes is widely used for microservices deployments, including its ability to automate application deployment,...