An online guide to studying engineering
If you feel you do not have the background to learn computer science, just know that there are plenty of great free resources online.
I am making available all the YT videos I looked at as supplementary resources over the course of my own engineering studies.
A similar overview is the following: The Open Source Computer Science Degree or Harvard CS50 – Full Computer Science University Course
The list below has far more content than what you would see in a standard degree - so please do not get intimidated. This covers how computers work from at the quantum scale up to software itself.
Tags:
- Redundant: YouTube is somewhat unreliable, so some redundancy exists. Redundant videos are marked as such.
- Motivation: Videos to help encourage perserverance, or inspire curiosity
- Meme: Fun videos thrown in as comic relief of sorts
- Motivation - How to Make it Through Calculus (Neil deGrasse Tyson)
- Motivation - Calculus at a Fifth Grade Level
- Calculus - The foundation of modern science
- Calculus 1 - full course for beginners
- Calculus 2 - Calculus Series and Sequences
- Calculus 3 Full Course
- Multivariable functions | Multivariable calculus | Khan Academy
- Representing points in 3d | Multivariable calculus | Khan Academy
- Linear Algebra for Beginners
- Linear Algebra - Matrix Transformations
- What's a Tensor?
- Tensors Explained Intuitively: Covariant, Contravariant, Rank
- Vectors | Chapter 1, Essence of linear algebra
- Linear combinations, span, and basis vectors | Chapter 2, Essence of linear algebra
- Linear transformations and matrices | Chapter 3, Essence of linear algebra
- Matrix multiplication as composition | Chapter 4, Essence of linear algebra
- Three-dimensional linear transformations | Chapter 5, Essence of linear algebra
- The determinant | Chapter 6, Essence of linear algebra
- Inverse matrices, column space and null space | Chapter 7, Essence of linear algebra
- Nonsquare matrices as transformations between dimensions | Chapter 8, Essence of linear algebra
- Dot products and duality | Chapter 9, Essence of linear algebra
- Cross products | Chapter 10, Essence of linear algebra
- Cross products in the light of linear transformations | Chapter 11, Essence of linear algebra
- Cramer's rule, explained geometrically | Chapter 12, Essence of linear algebra
- Change of basis | Chapter 13, Essence of linear algebra
- Eigenvectors and eigenvalues | Chapter 14, Essence of linear algebra
- A quick trick for computing eigenvalues | Chapter 15, Essence of linear algebra
- Abstract vector spaces | Chapter 16, Essence of linear algebra
- Statistics and Probability Full Course || Statistics For Data Science
- Redundant - Statistics - A Full University Course on Data Science Basics
- Probability - Quantum and Classical
- Python's Map Function Explained...
- A monad is a monoid in the category of endofunctors. Whats the problem? #SoMe2
- What is a Monad? - Computerphile
- Python Lambda Functions
- Motivation - 27 Unhelpful Facts About Category Theory
- Motivation - Philosophy of Science
- Motivation - Philosophy of Physics
- Motivation - The Standard Model Lagrangian The Equation That Explains (Nearly) Everything!
- Noether's Theorem and The Symmetries of Reality
- Classical Mechanics Lecture Full Course || Mechanics Physics Course
- Motivation - Einstein's Elevator
- Motivation - The Geometry of a Black Hole
- Motivation - Does Time Cause Gravity?
- Minkowski Space-Time: Spacetime in Special Relativity
- Motivation - The Geometry of Causality
- Motivation - Is The Future Predetermined By Quantum Mechanics?
- Motivation - The Arrow of Time and How to Reverse It
- Motivation - Why Do You Remember The Past But Not The Future?
- Motivation - How Quantum Entanglement Creates Entropy
- Welcome To Matrix Theory: Relativity without Relative Time or Space
- Modern Physics || Modern Physics Full Lecture Course
- Quantum Mechanics: Animation explaining quantum physics
- Motivation - Quantum Physics – list of Philosophical Interpretations
- Quantum Physics Full Course | Quantum Mechanics Course | Part 2
- Meme - Futurama Schrodinger's Cat
- Semiconductors - Physics inside Transistors and Diodes
- What causes the Pauli Exclusion Principle?
- THE BEST Multimeter tutorial (HD)
- Real vs Reactive Power
- AC current impedance - Alternating Voltage for inductors, capacitors
- The Biot-Savart Law and Introduction to Ampere's Law
- ELEC 202 - (Silent Video) Class notes on Filters for my students.
- Resonance Circuits: LC Inductor-Capacitor Resonating Circuits
- ELEC 202 - (Silent video) Class notes on Resonance for my students.
- ELEC 202 - Two Port Networks SILENT
- How Alternators Work - Automotive Electricity Generator
- Meme - Scientists Continue Developing Alternative Energy Sources For Americans To Waste
- INDUC 03 - The Induction Motor, Rotating Magnetic Field
- Worst Electrical Mistake You Can Make - Backfeeding Generators
- The Breadboard, schematics, cables and wiring.
- Design your own Circuit Boards using Kicad Part 1 (using only FREE software)
- Design your own Circuit Boards using Kicad Part 2
- NI Multisim: Display and change net names
- Multisim Ultiboard PCB Designing Tutorial 7 : Power Plane and Routing
- How to change the size of a through-hole pad in Ultibaord Multisim
- Transferring an Ultiboard Design to Sunstone Circuits
- Melt your circuit boards
- From Idea to Schematic to PCB - How to do it easily!
- You can now PRINT PCBs! Creating a homemade PCB with the Voltera V-One PCB Printer!
- Electronic Computing: Crash Course Computer Science #2
- Meme - The Missile Knows Where It Is... & The Missile Knows Where it is (Remix)
- PID Control - A brief introduction
- Simple Examples of PID Control
- Meme - Interstellar Meme
- Meme - When the controls head out
- The Missile Knows Where It Is, But It's Actually A Javascript Tutorial
- Boolean Logic & Logic Gates: Crash Course Computer Science #3
- Representing Numbers and Letters with Binary: Crash Course Computer Science #4
- How Computers Calculate - the ALU: Crash Course Computer Science #5
- Registers and RAM: Crash Course Computer Science #6
- The Central Processing Unit (CPU): Crash Course Computer Science #7
- Verilog Debugging Tips
- How to Write an FSM in SystemVerilog (SystemVerilog Tutorial #1)
- How to Simulate and Test SystemVerilog with ModelSim (SystemVerilog Tutorial #2)
- Memory & Storage: Crash Course Computer Science #19
- Files & File Systems: Crash Course Computer Science #20
- Assembly Language in 100 Seconds
- Instructions & Programs: Crash Course Computer Science #8
- How does a USB keyboard work?
- “Hello, world” from scratch on a 6502 — Part 1
- How do CPUs read machine code? — 6502 part 2
- Assembly language vs. machine code — 6502 part 3
- Connecting an LCD to our computer — 6502 part 4
- What is a stack and how does it work? — 6502 part 5
- RAM and bus timing — 6502 part 6
- Subroutine calls, now with RAM — 6502 part 7
- Why build an entire computer on breadboards?
- How assembly language loops work
- Binary to decimal can’t be that hard, right?
- Hardware interrupts
- Interrupt handling
- Advanced CPU Designs: Crash Course Computer Science #9
- Motivation - How a CPU Works in 100 Seconds // Apple Silicon M1 vs Intel i9
- 1 1 1 Definition And Objectives
- 1 1 2 Performance Measurement
- 1 1 3 Benchmarks
- 1 Practice Quiz Fundamentals
- 1 1 4 Summarizing Performance
- 2 Practice Quiz Understanding Performance
- Operating Systems Overview - CompTIA A+ 220-1002 - 1.1
- 1 1 5 CPU Performance Equation
- 1 1 6 Amdahl's Law
- 1 1 7 Amdahl's Law Example
- 1 Review Quiz
- How do computers read code?
- 1 3 1 Pipelining Principles
- Pipelining in a Processor - Georgia Tech - HPCA: Part 1
- Redundant - Conceptual Introduction to Pipelining
- 1 3 2 Canonical 5 Stage Pipeline
- 1 3 3 MIPS Pipeline Features and Pipeline Hazards
- 1 3 4 Structural Hazards&Data Hazards
- 1 3 5 Load use Data Hazard
- 1 3 6 Control Hazards
- 1 3 7 Deal with Brach Hazards
- 1 3 8 Scheduling Instructions for Branch Delay Slot
- 1 3 9 Module Summary
- 1 3 10 Excercise
- 3 Review Quiz
- 1 5 1 Caches and the Principle of Locality
- 1 5 2 Direct mapped Cache Organization
- 1 5 3 Hit or Miss Example
- 1 5 4 Basic Cache Optimizations to Reduce Miss Rate
- 1 5 5 Cache Equations for Set Associative Caches
- 1 5 6 Cache Metrics and Improving AMAT
- 1 5 7 Reduce Miss Penalty by Multilevel Cache
- 1 5 8 Give Priority to Read Misses
- 5 Review Quiz
- 2 1 1 ILP Concepts and Challenges
- 2 1 2 Dependences and Hazards
- Scoreboard Example
- High Performance Computer Architecture - Scoreboarding Example
- 2 1 3 Dynamic Scheduling Using Tomasulo's Algorithm
- 2 1 4 Dynamic Scheduling Using Tomasulo's Algorithm Example
- 2 1 5 Extending Tomasulo with Memory Accesses
- 2 1 6 Loop Based Dynamic Scheduling Example
- 2 1 7 Introduction to Dynamic Branch Prediction
- 2 1 8 Advanced Branch Prediction
- 2 1 9 Tournament Predictors and Branch Prediction Accuracy
- 2 1 10 Hardware Based Speculation
- 2 1 11 Multiple Issue
- 2 1 12 Increasing Instruction Fetch Bandwidth
- 2 1 13 Limitations of ILP
- 2 2 1 Basic VLIW Approach
- 2 2 2 VLIW Challenges Instruction Scheduling & Code Size
- 2 2 3 VLIW Challenges Register File Complexity & Control Hazards
- Cryptography 101 - Security Goals
- Cryptography 101 - The Basics
- Cryptography 101 - Substitution Ciphers
- The Science of Codes: An Intro to Cryptography
- Stream and Block Ciphers - SY0-601 CompTIA Security+ : 2.8
- Chapter 2, part 1, Information Security: Principles and Practice
- Chapter 2, part 2, Information Security: Principles and Practice
- Chapter 2, part 3: Crypto Basics --- double transposition, one-time pad
- Chapter 2, part 4: Crypto Basics --- VENONA, codebook cipher, Zimmerman telegram
- Chapter 2, part 5: Crypto Basics --- crypto history, ciphers of election of 1876
- Chapter 2, part 6: Crypto Basics --- crypto history, Claude Shannon
- Chapter 2, part 7: Crypto Basics --- taxonomy of cryptography, taxonomy of cryptanalysis
- Motivation - Is Your WIFI Secure?
- Cryptography Lesson #1 - Block Ciphers
- Playfair Cipher Explained
- Playfair Cipher
- Cryptanalysis of Vigenere cipher: not just how, but why it works
- Vigenere Cipher - Decryption (Unknown Key)
- Symmetric and Asymmetric Cryptography - SY0-601 CompTIA Security+ : 2.8
- Applied Cryptography: Stream Ciphers (1/3)
- Applied Cryptography: Stream Ciphers (2/3)
- Applied Cryptography: Stream Ciphers (3/3)
- Chapter 3, part 1: Symmetric Key Crypto --- stream ciphers, A5/1, shift registers
- A5/1 STREAM CIPHER in GSM cellular networks - animation of how it works
- Chapter 3, part 2: Symmetric Key Crypto --- stream ciphers, RC4
- Chapter 3, part 4: Symmetric Key Crypto --- block ciphers, DES
- Chapter 3, part 5: Symmetric Key Crypto --- block ciphers, DES, triple DES
- Chapter 3, part 6: Symmetric Key Crypto --- block ciphers, AES
- Motivation - How AES Encryption Works
- Applied Cryptography: AES - Part 1
- Applied Cryptography: AES - Part 2
- Applied Cryptography: AES - Part 3
- Applied Cryptography: AES - Part 4
- Applied Cryptography: AES - Part 5
- Applied Cryptography: AES - Part 6
- Applied Cryptography: AES - Part 7
- Applied Cryptography: AES - Part 8
- Applied Cryptography: AES - Part 9
- Applied Cryptography: AES - Part 10
- Applied Cryptography: AES - Part 11
- Applied Cryptography: AES - Part 12
- Applied Cryptography: AES - Part 13
- Chapter 3, part 8: Symmetric Key Crypto --- block cipher modes, ECB mode
- Chapter 3, part 9: Symmetric Key Crypto --- block cipher modes, CBC mode, CTR mode
- Hashes - Chapter 5, part 5, Information Security: Principles and Practice
- Redundant - MIT OpenCourses - 4. Hashing
- RNG - Chapter 5, part 7, Information Security: Principles and Practice
- Applied Cryptography: Random Numbers (1/2)
- Chapter 4, part 2, Information Security: Principles and Practice
- Chapter 4, part 3, Information Security: Principles and Practice
- Chapter 4, part 4, Information Security: Principles and Practice
- RSA - Chapter 4, part 5, Information Security: Principles and Practice
- RSA - Chapter 4, part 6, Information Security: Principles and Practice
- Motivation - Public key cryptography - Diffie-Hellman Key Exchange (full version)
- Diffie-Hellman - Chapter 4, part 7, Information Security: Principles and Practice
- 3MinMax - Episode 142: Encryption - Part 18 - Diffie Hellman Key Exchange 1
- Episode 143: Encryption - Part 19 - Diffie Hellman Key Exchange 2
- 3MinMax - Episode 144: Encryption - Part 20 - Diffie Hellman Key Exchange 3
- Episode 145: Encryption - Part 21 - Diffie Hellman Alternate Depiction
- The Mathematics of Cryptography
- Cryptography | The Mathematics of RSA and the Diffie-Hellman Protocol
- Chapter 3, part 10: Symmetric Key Crypto --- integrity, message authentication code, MAC
- MAC - Chapter 4, part 8, Information Security: Principles and Practice
- Lecture 22: MAC (Message Authentication Codes) and HMAC by Christof Paar
- Certificate Authority (CA) - Chapter 4, part 9, Information Security: Principles and Practice
- Chapter 4, part 10, Information Security: Principles and Practice
- Chapter 4, part 11, Information Security: Principles and Practice
- NCM: Introduction to Steganography
- Motivation - Cracking Enigma in 2021 - Computerphile
- NSA - Embracing a Zero Trust Mindset
- Elliptic Curves - Computerphile
- Elliptic Curve Back Door - Computerphile
- How did the NSA hack our emails? - Numberphile
- Motivation - NSA Surveillance (an extra bit) - Numberphile
- Chapter 9, part 1, Information Security: Principles and Practice
- Chapter 9, part 2, Information Security: Principles and Practice
- Chapter 9, part 3, Information Security: Principles and Practice
- Chapter 9, part 4, Information Security: Principles and Practice
- Chapter 9, part 5, Information Security: Principles and Practice
- Chapter 9, part 6, Information Security: Principles and Practice
- Chapter 9, part 7, Information Security: Principles and Practice
- Chapter 9, part 8. Information Security: Principles and Practice
- Chapter 9, part 9, Information Security: Principles and Practice
- Chapter 10, part 1, Information Security: Principles and Practice
- SSL & Socket Layer - Chapter 10, part 2, Information Security: Principles and Practice
- SSL MiM - Chapter 10, part 3, Information Security: Principles and Practice
- IPSec - Chapter 10, part 4, Information Security: Principles and Practice
- Modes - Chapter 10, part 5, Information Security: Principles and Practice
- Cookies - Chapter 10, part 6, Information Security: Principles and Practice
- IPSec Security - Chapter 10, part 7, Information Security: Principles and Practice
- Kerberos - Chapter 10, part 8, Information Security: Principles and Practice
- Kerberos - Chapter 10, part 9, Information Security: Principles and Practice
- Wired Equivalent Privacy (WEP) - Chapter 10, part 10, Information Security: Principles and Practice
- WEP Keys - Chapter 10, part 11, Information Security: Principles and Practice
- GSM and cellphone insecurity - Chapter 10, part 12, Information Security: Principles and Practice
- GSM Security Features - Chapter 10, part 13, Information Security: Principles and Practice
- Chapter 10, part 14, Information Security: Principles and Practice
- WEP vs. WPA - CompTIA Security+ SY0-401: 6.2
- The web - OpenCSF 3 4: Software Security Lecture 3 Full
- Designing and building secure software - OpenCSF 3 4: Software Security Lecture 4 Full
- Redundant - Hashing and Digital Signatures - SY0-601 CompTIA Security+ : 2.8
- Secure Protocols - SY0-601 CompTIA Security+ : 3.1
- How Secure Shell Works (SSH) - Computerphile
- Lecture 1 — Intro to Crypto and Cryptocurrencies
- Lecture 2 — How Bitcoin Achieves Decentralization
- Lecture 3 — Mechanics of Bitcoin
- Lecture 4 — How to Store and Use Bitcoins
- Lecture 5 — Bitcoin Mining
- Lecture 6 — Bitcoin and Anonymity
- Lecture 7 — Community, Politics, and Regulation
- Lecture 8 — Alternative Mining Puzzles
- Lecture 9 — Bitcoin as a Platform
- Lecture 10 — Altcoins and the Cryptocurrency Ecosystem
- Lecture 11 — The future of Bitcoin?
- Lecture 12 — History of Cryptocurrencies (Bonus lecture)
- Crypto-jacking - Computerphile
- Bitcoin ₿ in 100 Seconds // Build your Own Blockchain
- Solidity, Blockchain, and Smart Contract Course – Beginner to Expert Python Tutorial
- Venezuela’s Cryptocurrency Catastrophe: How It Went So Wrong
- Economics of Cybersecurity: A brief history
- Economics of Cybersecurity: An introduction to economics
- Economics of Cybersecurity: The economics of information of goods
- Economics of Cybersecurity: Security from an economic perspective
- Economics of Cybersecurity: What to measure?
- Economics of Cybersecurity: Measuring security levels
- Economics of Cybersecurity: Metrics in practice
- Economics of Cybersecurity: Metrics from incident data
- Economics of Cybersecurity: Information security strategy
- Economics of Cybersecurity: Information security investment
- Economics of Cybersecurity: Risk management
- Economics of Cybersecurity: Operational security management
- Economics of Cybersecurity: Market failures
- Economics of Cybersecurity: Policy interventions
- Economics of Cybersecurity: Information sharing in incident response
- Economics of Cybersecurity: payment card security
- Economics of Cybersecurity: Prospect Theory
- Economics of Cybersecurity: heuristics and social persuasion
- Economics of Cybersecurity: behavioural economics of privacy
- Economics of Cybersecurity: consumer behaviour and deception
- Economics of Cybersecurity: security economics and policy
- Authentication - Chapter 7, part 1, Information Security: Principles and Practice
- Good & Bad passwords - Chapter 7, part 2, Information Security: Principles and Practice
- Salting & Cracking passwords - Chapter 7, part 3, Information Security: Principles and Practice
- Password Cracking - Computerphile
- User issues with passwords - Chapter 7, part 4, Information Security: Principles and Practice
- Biometrics overview - Chapter 7, part 5, Information Security: Principles and Practice
- Biometrics errors - Chapter 7, part 6, Information Security: Principles and Practice
- Iris Scan biometrics - Chapter 7, part 7, Information Security: Principles and Practice
- Equal Error Rate Comparison - Chapter 7, part 8, Information Security: Principles and Practice
- 2FA, SSO, web cookies - Chapter 7, part 9, Information Security: Principles and Practice
- Motivation - How People Get Hacked
- Cormac Herley: Passwords - A Guide to the Ruins and Lessons for Improvement
- Edward Snowden on Passwords: Last Week Tonight with John Oliver (HBO)
- Authentication Management - SY0-601 CompTIA Security+ : 3.8
- Motivation - What Is The Most Complicated Lock Pattern?
- OpenCSF 3 3: Usable Security Lecture 1 Full
- OpenCSF 3 3: Usable Security Lecture 2 Full
- OpenCSF 3 3: Usable Security Lecture 3 Full
- OpenCSF 3 3: Usable Security Lecture 4 Full
- OpenCSF 3 3: Usable Security Lecture 5 Full
- OpenCSF 3 4: Software Security Lecture 3 Full
- OpenCSF 3 4: Software Security Lecture 4 Full
- Redundant - Cyber Security Full Course for Beginners
- Why Windows Gets Viruses So Often
- Meme - How to Protect Your Computer from Getting Shot by an MBT
- Meme - ring doorbell
- Cross Site Request Forgery Explained
- Cross Site Request Forgery - Computerphile
- Cross Site Scripting Explained
- Meme - Google Shuts Down Gmail For Two Hours To Show Its Immense Power
- OpenCSF 3 4: Software Security Lecture 5 Full
- Principles of Social Engineering - SY0-601 CompTIA Security+ : 1.1
- Phishing - SY0-601 CompTIA Security+ : 1.1
- Redundant - CompTIA Security+ Full Course
- Full Ethical Hacking Course - Network Penetration Testing for Beginners (2019)
- Ethical Hacking 101: Web App Penetration Testing - a full course for beginners
- How To: Conduct Person of Interest Investigations with Maltego - Official Tutorial (2021)
- Introduction to Maltego and Facebook OSINT
- Meme - Facebook CIA Project: The Onion News Network ONN
- 23b Maltego How To Create You Own Local Transform in Python (English)'
- Network - Reconnaissance Tools - Part 1 - SY0-601 CompTIA Security+ : 4.1
- What is Dependency Injection?
- Redundant - Ghidra — Beyond the Code
- Redundant - Ghidra - Journey from Classified NSA Tool to Open Source
- KOVTER Malware Analysis - Fileless Persistence in Registry
- DDoS Attack Explained
- I Knew You Were Trouble – Detecting Threat Actors Before They Deploy Ransomware
- Survival Heuristics: My Favorite Techniques for Avoiding Intelligence Traps - SANS CTI Summit 2018
- Solving Quantum Cryptography
- Motivation - Why Quantum Computing Requires Quantum Cryptography
- Motivation - Don't fall for quantum hype
- Physical Security Controls - SY0-601 CompTIA Security+ : 2.7
- Secure Areas - SY0-601 CompTIA Security+ : 2.7
- I Broke Into The International Security Convention
- I Broke Into The U.S. Security Convention
- Motivation - NYC’s nonprofit DIY internet is taking on Verizon & more | Just Might Work by Freethink
- Computer Networking Course - Network Engineering (CompTIA Network+ Exam Prep)
- IP Address - IPv4 vs IPv6 Tutorial
- Why Don't We Run Out of IP Addresses
- Motivation - Block Ads (on all devices) and Unwanted Sites Without a Browser Addon
- Subnet Mask - Explained
- TCP vs UDP Comparison
- PING Command - Troubleshooting Networks
- CompTIA Network+ Certification Video Course
- Secure Networking - SY0-601 CompTIA Security+ : 3.3
- Firewalls - SY0-601 CompTIA Security+ : 3.3
- Motivation - Cat 6 amazing dressing and termination
- How to Terminate on a Patch Panel
- Data Structures: Crash Course Computer Science #14
- Motivation - How I Got Good at Coding Interviews
- Data Structures - Computer Science Course for Beginners
- Redundant - Data Structures - Full Course Using C and C++
- Binary Tree Algorithms for Technical Interviews - Full Course
- Graph Algorithms for Technical Interviews - Full Course
- Redundant - Algorithms Course - Graph Theory Tutorial from a Google Engineer
- Intro to Algorithms: Crash Course Computer Science #13
- Motivation - What's the fastest way to alphabetize your bookshelf? - Chand John
- Visualization - epilepsy warning 16 Sorts - Color Circle
- Visualization when sorting algorithms sound like a sick beat
- Algorithms and Data Structures Tutorial - Full Course for Beginners
- Redundant - Java - Data Structures and Algorithms for Beginners
- Playlist - Design Patterns Video Tutorial
- why can’t computers have thousands of cores?
- CPU Cores VS Threads Explained
- Threading Tutorial #1 - Concurrency, Threading and Parallelism Explained
- Threading Tutorial #2 - Implementing Threading in Python 3 (Examples)
- Node.js Ultimate Beginner’s Guide in 7 Easy Steps
- Node.js Tutorial for Beginners: Learn Node in 1 Hour
- C in 100 Seconds
- C Programming Tutorial for Beginners
- Meme - Program in C
- How to return and pass a struct to a function
- The address of an array in C (short)
- The address of an array in C (in-depth)
- Difference between arrays and pointers in C
- How to pass arrays to functions in C
- What is a mutex in C? (pthread_mutex)
- Break macro in multiple lines using continuation operator () in c programming | by Sanjay Gupta
- C++ in 100 Seconds
- C++ Tutorial From Basic to Advanced
- what even is a "reference"?
- E01: Stupid C++ Tricks with Dave
- Reduce Boilerplate Code With The C++ Spaceship Operator (<=>)
- C++ Accumulate: More Powerful Than You Think
- Rust in 100 Seconds
- Rust makes you feel like a GENIUS
- Meme - What your favourite programming language says about you!
- ~/.dotfiles in 100 Seconds
- Connecting to a server via SSH
- Redundant - CompTIA A+ Full Video Course for Beginners
- Redundant - Full Video Course certification CompTIA A + 220-901
- Certifictation - Linux Tools for Software Dev - LFD108x
- Git Explained in 100 Seconds
- What is Git? Explained in 2 Minutes!
- Redundant - Git It? How to use Git and Github
- Redundant - Git stash tutorial. How to save changes for later in git.
- Git Tutorial for Beginners: Learn Git in 1 Hour
- Redundant - Git and GitHub for Beginners - Crash Course
- How to resolve merge conflicts in Git
- Git for Professionals Tutorial - Tools & Concepts for Mastering Version Control with Git
- 13 Advanced (but useful) Git Techniques and Shortcuts
- Certification - Linux Cert - LFD109x
- Git Tutorial - 2 - Config Our Username and Email
- Linux Directories Explained in 100 Seconds
- Linux Tutorial For Beginners || Linux Command Line Tutorial
- Bash in 100 Seconds
- Linux Server Course - System Configuration and Operation
- Meme - When Linux users met Windows 10
- Redundant - Linux for Ethical Hackers (Kali Linux Tutorial)
- Redundant - Linux Essentials for Ethical Hackers - Full InfoSec Course
- Certification - Linux Cert - LFS101x
- Why so many distros? The Weird History of Linux
- Docker in 100 Seconds
- Learn Docker in 7 Easy Steps - Full Beginner's Tutorial
- Docker Tutorial for Beginners
- Redundant - Docker Tutorial for Beginners - A Full DevOps Course on How to Run Applications in Containers
- Automate EVERYTHING with Ansible! (Ansible for Beginners)
- Redundant - Do NOT Learn Kubernetes Without Knowing These Concepts...
- Kubernetes 101 - Episode 1 - Hello, Kubernetes!
- Kubernetes 101 - Episode 2 - Containers
- Kubernetes 101 - Episode 3 - Deploying Apps
- Kubernetes 101 - Episode 4 - Real-world Apps
- Kubernetes 101 - Episode 5 - Scaling Drupal in K8s
- Kubernetes 101 - Episode 8 - Kube, meet Raspberry Pi
- Vim in 100 Seconds
- Vim As Your Editor - Introduction
- Vim As Your Editor - Horizontal
- Vim As Your Editor - Vertical Movements
- Vim As You Editor - Advanced Motions P1
- Vim as your editor - Advanced Motions P2
- Best Vim Motion in 20 Seconds
- Redundant - How to Become a VIM /G/od
- Redundant - Vim Tips You Probably Never Heard of
- NVChad - Turn Neovim Into An Awesome IDE
- Meme - Technical Jargon Overload
- Meme - Droop Snoot
- How to achieve more while studying less - Obsidian & Conceptual Notes
- Getting Started with Obsidian (plugins, templates, folders, and more)
- How To Organize Your Notes in Obsidian | Folders, Tags and Links
- Dataview Plugin: How To Use This Powerful Obsidian Plugin (With Examples)
- 100 OBSIDIAN TIPS: Beginner to Advanced in 23 Minutes | Obsidian Tutorial
- How to download and use my Obsidian MD notes and templates
- Obsidian Advanced Techniques | Templates, Tagging, Folding, Embedding, and more
- An Introduction to Dataview - Part 1
- An Introduction to Dataview - Part 2
- Tricking Ethical Hackers Into Doing Evil
- Jaron Lanier - The Surveillance Economy and Extreme Income Inequality: You Can't Have One Without the Other
- Meme - New Facebook Feature Scans Profile To Pinpoint Exactly When Things Went Wrong
- Jaron Lanier - 10 Reasons to Get Off Social Media
- Meme - Google Opt Out Feature Lets Users Protect Privacy By Moving To Remote Village
- Jaron Lanier – Who is Civilization for? (+ Q&A with Ulrich Kelber) Willy Brandt Lecture 2018
- Why Google Maps Doesn't Show You Unsafe Areas
- Is Automation Ethical?
- Legal Implications of Threat Intelligence Sharing - SANS CTI Summit 2018
- SLAPP Suits: Last Week Tonight with John Oliver (HBO)
- how a simple programming mistake ended 6 lives