Instructional Video9:25
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Organizations

Higher Ed
Over time, you may find that you have multiple AWS accounts. The IAM solution will be managed separately for each account by default. However, you can use AWS organizations to bring them all together and this video shows you how.
Instructional Video10:30
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - AWS Control Tower

Higher Ed
This video will explore the features and benefits of using AWS Control Tower to manage multiple AWS accounts.
Instructional Video11:17
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - User Accounts

Higher Ed
As we move forward with a foundational understanding of IAM from chapter 7, we will begin exploring practical application in this chapter. Here in video one, we will discuss best practices and tasks involved in user account creation and...
Instructional Video5:52
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Creating Accounts

Higher Ed
In this video, we will be covering the process of creating user accounts for our application.
Instructional Video6:27
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Delete User

Higher Ed
In this video, you will learn how to implement a secure endpoint for deleting a user, including verifying the user's identity, deleting all of the user's tweets, and using proper error handling.
Instructional Video10:54
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - The Zen of Backup

Higher Ed
Back up your data before you lose it! Create local backups, image backups, and file backups. Use Cloud storage for even more security.
<
br/>
This clip is from the chapter "Operational Procedures" of the series "CompTIA A+...
Instructional Video7:25
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Touring iOS

Higher Ed
iOS devices use a lot of gestures for accessing functions. The App Store offers all apps available for iOS. Settings enable you to change application permissions, account information, location services, and more.
<
br/>
This clip is...
Instructional Video9:58
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Touring Android

Higher Ed
Android devices are very customizable. The Google Play store offers shopping options for new applications (apps). Google accounts are mandatory. This video explores features specific to Android devices.
<
br/>
This clip is from the...
Instructional Video13:35
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Working with Active Directory

Higher Ed
More advanced Windows networks use Active Directory Domains instead of Workgroups. These Domains, especially Microsoft's Active Directory-enabled Domains, provide powerful services for larger networks.
<
br/>
This clip is from the...
Instructional Video9:58
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Touring Android

Higher Ed
Android devices are very customizable. The Google Play store offers shopping options for new applications (apps). Google accounts are mandatory. This episode explores features specific to Android devices.
<
br/>
This clip is from...
Instructional Video7:27
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - E-Mail

Higher Ed
Continuing with the Application-layer protocols, this episode explores e-mail. Mike covers the three classic e-mail protocols, SMTP for sending and POP3 and IMAP4 for receiving. The episode covers typical client configuration using the...
Instructional Video5:03
Curated Video

CISSP Crash Course - Security Operations Concepts

Higher Ed
This video explains security operations concepts and separation of duties.
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
Instructional Video3:08
Curated Video

CISSP Crash Course - Collect Security Process Data

Higher Ed
This video explains collecting security process data and account management and review.
<
br/>
This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which...
Instructional Video3:30
Curated Video

CISSP Crash Course - Identity Lifecycle

Higher Ed
This video explains the identity and access lifecycle along with access review.
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on...
Instructional Video9:51
Curated Video

HashiCorp Certified - Vault Associate Course - Lab—AWS Secrets Engine—Assumed_Role

Higher Ed
This is a lab video on AWS Secrets Engine—Assumed_Role. You will learn how to use the AWS Secrets Engine while using the Assumed_Role credential type.
<
br/>
This clip is from the chapter "Compare and Configure Secrets Engines" of...
Instructional Video16:24
Curated Video

Oracle Database Administration from Zero to Hero - Administrative Accounts and Privileges

Higher Ed
In this video, we will explore administrative accounts and privileges. You will learn about the administrative accounts available in Oracle, understand the difference between SYSDBA and SYSOPER privileges, and differentiate between the...
Instructional Video9:32
Curated Video

Oracle Database Administration from Zero to Hero - Managing User Profiles (Part 2 of 2)

Higher Ed
In this video, we will continue our exploration of managing user profiles. You will learn how to enable password complexity verification functions, obtain information about user passwords and profiles, implement gradual password...
Instructional Video11:26
Curated Video

Oracle Database Administration from Zero to Hero - Managing Database Users (Part 1 of 2)

Higher Ed
In this video, you will learn about managing database users. You will understand the concepts of database users and schemas and explore predefined accounts in Oracle.
<
br/>
This clip is from the chapter "Managing Database Users and...
Instructional Video1:24
Curated Video

Hamlet 2.2 The Play Within the Play

6th - Higher Ed
This video explores a pivotal moment in Act 2, Scene 2 of Shakespeare's "Hamlet," where Hamlet devises a plan to confirm Claudius's guilt through a theatrical performance. It delves into the historical context of the era, explaining how...
Instructional Video7:29
PBS

Bunyip: Australia’s Mysterious Amphibian Monster

9th - Higher Ed
Originating in the stories and beliefs of the southeastern Indigenous peoples of Australia, accounts of the bunyip are widely varied. This episode uses Aboriginal stories, historical records, and fossils to explore the bunyip legend, and...
Instructional Video9:59
PBS

Slender Man: How The Internet Created a Monster

9th - Higher Ed
Dr. Zarka explains the timeline of this Internet folklore sensation, examining how unlike so many other monster origins stories, we know exactly when and why this one was created. From Creepypasta to video games, horror movies to...
Instructional Video5:08
Curated Video

Account Management: What is Account-based Selling?

10th - Higher Ed
A lot of business-to-business selling is strategic. It is not a one-off or tactical endeavor. It is likely that you will want to maintain and build your relationships over the months and years to come. Managing this ongoing relationship...
Instructional Video2:44
Financial Times

Can we solve the peat predicament?

Higher Ed
FT Food Revolution - Peatlands make up about 3 per cent of the world’s land but hold a lot of carbon. But peat is also good for growing crops. That means draining the land, which then starts to release its carbon. Better peat management...
Instructional Video3:05
Financial Times

Welcome to the era of the activist accountant

Higher Ed
Accountants turned activists? In an unexpected modern tale, activist accountants have become vital advocates towards standardising ESG risks.