Hi, what do you want to do?
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Organizations
Over time, you may find that you have multiple AWS accounts. The IAM solution will be managed separately for each account by default. However, you can use AWS organizations to bring them all together and this video shows you how.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - AWS Control Tower
This video will explore the features and benefits of using AWS Control Tower to manage multiple AWS accounts.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - User Accounts
As we move forward with a foundational understanding of IAM from chapter 7, we will begin exploring practical application in this chapter. Here in video one, we will discuss best practices and tasks involved in user account creation and...
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Creating Accounts
In this video, we will be covering the process of creating user accounts for our application.
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Delete User
In this video, you will learn how to implement a secure endpoint for deleting a user, including verifying the user's identity, deleting all of the user's tweets, and using proper error handling.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - The Zen of Backup
Back up your data before you lose it! Create local backups, image backups, and file backups. Use Cloud storage for even more security.
<
br/>
This clip is from the chapter "Operational Procedures" of the series "CompTIA A+...
<
br/>
This clip is from the chapter "Operational Procedures" of the series "CompTIA A+...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Touring iOS
iOS devices use a lot of gestures for accessing functions. The App Store offers all apps available for iOS. Settings enable you to change application permissions, account information, location services, and more.
<
br/>
This clip is...
<
br/>
This clip is...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Touring Android
Android devices are very customizable. The Google Play store offers shopping options for new applications (apps). Google accounts are mandatory. This video explores features specific to Android devices.
<
br/>
This clip is from the...
<
br/>
This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Working with Active Directory
More advanced Windows networks use Active Directory Domains instead of Workgroups. These Domains, especially Microsoft's Active Directory-enabled Domains, provide powerful services for larger networks.
<
br/>
This clip is from the...
<
br/>
This clip is from the...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Touring Android
Android devices are very customizable. The Google Play store offers shopping options for new applications (apps). Google accounts are mandatory. This episode explores features specific to Android devices.
<
br/>
This clip is from...
<
br/>
This clip is from...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - E-Mail
Continuing with the Application-layer protocols, this episode explores e-mail. Mike covers the three classic e-mail protocols, SMTP for sending and POP3 and IMAP4 for receiving. The episode covers typical client configuration using the...
Curated Video
CISSP Crash Course - Security Operations Concepts
This video explains security operations concepts and separation of duties.
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
Curated Video
CISSP Crash Course - Collect Security Process Data
This video explains collecting security process data and account management and review.
<
br/>
This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which...
<
br/>
This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which...
Curated Video
CISSP Crash Course - Identity Lifecycle
This video explains the identity and access lifecycle along with access review.
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on...
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on...
Curated Video
HashiCorp Certified - Vault Associate Course - Lab—AWS Secrets Engine—Assumed_Role
This is a lab video on AWS Secrets Engine—Assumed_Role. You will learn how to use the AWS Secrets Engine while using the Assumed_Role credential type.
<
br/>
This clip is from the chapter "Compare and Configure Secrets Engines" of...
<
br/>
This clip is from the chapter "Compare and Configure Secrets Engines" of...
Curated Video
Oracle Database Administration from Zero to Hero - Administrative Accounts and Privileges
In this video, we will explore administrative accounts and privileges. You will learn about the administrative accounts available in Oracle, understand the difference between SYSDBA and SYSOPER privileges, and differentiate between the...
Curated Video
Oracle Database Administration from Zero to Hero - Managing User Profiles (Part 2 of 2)
In this video, we will continue our exploration of managing user profiles. You will learn how to enable password complexity verification functions, obtain information about user passwords and profiles, implement gradual password...
Curated Video
Oracle Database Administration from Zero to Hero - Managing Database Users (Part 1 of 2)
In this video, you will learn about managing database users. You will understand the concepts of database users and schemas and explore predefined accounts in Oracle.
<
br/>
This clip is from the chapter "Managing Database Users and...
<
br/>
This clip is from the chapter "Managing Database Users and...
Curated Video
Hamlet 2.2 The Play Within the Play
This video explores a pivotal moment in Act 2, Scene 2 of Shakespeare's "Hamlet," where Hamlet devises a plan to confirm Claudius's guilt through a theatrical performance. It delves into the historical context of the era, explaining how...
PBS
Bunyip: Australia’s Mysterious Amphibian Monster
Originating in the stories and beliefs of the southeastern Indigenous peoples of Australia, accounts of the bunyip are widely varied. This episode uses Aboriginal stories, historical records, and fossils to explore the bunyip legend, and...
PBS
Slender Man: How The Internet Created a Monster
Dr. Zarka explains the timeline of this Internet folklore sensation, examining how unlike so many other monster origins stories, we know exactly when and why this one was created. From Creepypasta to video games, horror movies to...
Curated Video
Account Management: What is Account-based Selling?
A lot of business-to-business selling is strategic. It is not a one-off or tactical endeavor. It is likely that you will want to maintain and build your relationships over the months and years to come. Managing this ongoing relationship...
Financial Times
Can we solve the peat predicament?
FT Food Revolution - Peatlands make up about 3 per cent of the world’s land but hold a lot of carbon. But peat is also good for growing crops. That means draining the land, which then starts to release its carbon. Better peat management...
Financial Times
Welcome to the era of the activist accountant
Accountants turned activists? In an unexpected modern tale, activist accountants have become vital advocates towards standardising ESG risks.