Curated Video
AWS Tutorial AWS Solutions Architect and SysOps Administrator - Cloud Deployment Models
This video talks about the cloud deployment models. This clip is from the chapter "Cloud Computing Basics - Introducing IaaS, PaaS, and SaaS Service Models" of the series "AWS Tutorial: AWS Solutions Architect and SysOps...
Curated Video
AWS Tutorial AWS Solutions Architect and SysOps Administrator - Secrets Manager Use Cases
This video demonstrates Secrets Manager use cases. This clip is from the chapter "Secrets Manager - Rotate, Manage, and Retrieve Secrets Through Their Lifecycle" of the series "AWS Tutorial: AWS Solutions Architect and SysOps...
Curated Video
AWS Tutorial AWS Solutions Architect and SysOps Administrator - API Gateway Architecture
This video explains about API Gateway architecture. This clip is from the chapter "API Gateway - Build, Deploy, and Manage APIs" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section focuses on API...
Curated Video
AWS Tutorial AWS Solutions Architect and SysOps Administrator - What Is CloudTrail?
This video provides an introduction to CloudTrail. This clip is from the chapter "CloudTrail - Track IAM User Activity and API Usage" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section focuses on...
Curated Video
The Science of Electrical Heating: Understanding How It Works
Why is electric heating used? In this video, we'll explain the benefits of electric heating and where it is used. Basic calculations, thermal imaging, electric v gas boilers, energy efficiency and much much more.
Curated Video
What's On My Laptop? | 13" M1 Macbook Pro for Machine Learning
What's On My Laptop? | 13" M1 Macbook Pro for Machine Learning
Curated Video
How I Read and Organize Academic (Machine Learning) Papers
How I Read and Organize Academic (Machine Learning) Papers
Curated Video
MAC OS: Gestures, Tips & Tricks
Learners will know some key tricks and tips to maximize productivity
Curated Video
MAC OS: Installing & Uninstalling Applications
Participant will learn to install and delete third party application from the "App Store"
Curated Video
MAC OS: Navigating Finder
Learner will familiarize themselves with the "Finder" and understand how to search for key files or applications
Curated Video
MAC OS: Customizing your Dock
Learner will now be able to add/remove applications, files and folders to their doc as well as customize it's placement, magnification & size
Curated Video
MAC OS: Managing Windows & Mission Control
Participant will now be able to better manage web pages using key gestures and Apples "Mission Control" view
Curated Video
MAC OS: Launching & Quitting Applications
Learner will understand how to launch, quit and force quit an application using various shortcuts
Curated Video
MAC OS: A Tour Of Your Mac
Participant will familiarize themselves with their desktop, doc, and top bar menus
Curated Video
6 Tips for Applying To PhD Programs | Harvard + MIT Medical Engineering PhD Student
6 Tips for Applying To PhD Programs | Harvard + MIT Medical Engineering PhD Student
Zach Star
The applications of hyperbolic trig | Why do we even care about these things?
The applications of hyperbolic trig | Why do we even care about these things?
Curated Video
The Real World Part 2: College Exploration Made Easy
In this episode of In Control's series, "The Real World," host Kevin dives into the topic of college exploration. Recognizing that middle school students often feel lost or uninformed about colleges and universities, Kevin provides a...
Curated Video
Child and Family Safety
The video provides you with the techniques you can use and the tools you can buy to protect your children online
Curated Video
Web Applications Security Overview
This video will highlight the security concerns when it comes to web applications
Curated Video
Mobile Attack Surface
In this video, you will get an overview on the different types of threats that affect a mobile application.
Curated Video
Malware Distribution Mechanisms
In this video, we will explain how hackers leverages various channels to publish their malicious Android applications to that users start using them.
Curated Video
Inject Whatsapp Application With a Payload
In this video, we will extract a legit Whatsapp application from our phone, inject it with malware, then repackage it and distribute it. The techniques will be done using Kali tools
Curated Video
Steps to plan a successfull pentest
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through