Instructional Video11:42
Crash Course

Computer Networks: Crash Course Computer Science

12th - Higher Ed
Today we start a three episode arc on the rise of a global telecommunications network that changed the world forever. We’re going to begin with computer networks, and how they grew from small groups of connected computers on LAN networks...
Instructional Video4:01
TED Talks

Rives: If I controlled the Internet

12th - Higher Ed
How many poets could cram eBay, Friendster and Monster.com into 3-minute poem worthy of a standing ovation? Enjoy Rives' unique talent.
Instructional Video4:30
TED-Ed

TED-Ed: 5 tips to improve your critical thinking - Samantha Agoos

Pre-K - Higher Ed
Every day, a sea of decisions stretches before us, and it's impossible to make a perfect choice every time. But there are many ways to improve our chances -- and one particularly effective technique is critical thinking. Samantha Agoos...
Instructional Video2:05
Curated Video

Main revelations from new Epstein files release

9th - Higher Ed
New ReviewMain revelations from new Epstein files release
Instructional Video2:28
Curated Video

¿Cómo escribir un correo laboral?

9th - Higher Ed
New ReviewEn este video aprenderás cómo escribir un correo laboral o un correo formal, cuál es la estructura de un correo laboral y sus características. También, aprenderás qué hacer y qué no hacer a la hora de escribir un correo de este tipo.
Instructional Video5:14
Global Ethics Solutions

Ethical Expectations: Code of Conduct Training | Part 4

Higher Ed
Develop ethical decision-making skills in business technology and communication. Learn responsibilities, proper use, and boundaries in Part 4 of this training.
Instructional Video6:55
Instructional Video6:04
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Phishing - Part 2

Higher Ed
In this video, the author explains the concept of Phishing in more detail with live examples and demonstrations.
Instructional Video4:19
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Man in the Middle Attacks

Higher Ed
In this lesson, we will discuss the man-in-the-middle attack, where the person can impersonate both sides of the communication.
Instructional Video5:40
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - The WhoIS Query

Higher Ed
In this video, we will understand more about the WhoIS query. It discusses ICANN's WhoIS, policies and exceptions, complaints, and a knowledge center.
Instructional Video2:50
Curated Video

Basics of Chatbots with Machine Learning & Python - Rule-Based Chatbots-What are rule-based chatbots

Higher Ed
Let's understand what rule-based chatbots are and their mechanism of functioning in detail. Here, certain rules or criteria are provided as support to the chatbots, and the tasks performed, and the responses are based on those rules.
Instructional Video1:22
Curated Video

Basics of Chatbots with Machine Learning & Python - Chatbot Types

Higher Ed
In this lesson, we will look at classifying chatbots based on how the chatbots can be trained and tested, including the rule-based chatbot—where rules are specified—and self-learning chatbots, where the chatbot learns on its own with the...
Instructional Video5:33
Instructional Video4:40
Curated Video

Git and GitHub Masterclass - Fast track your Journey to Git! - Mimicking the Commits and the Need to Have Verified Commit

Higher Ed
This video explains mimicking the commits and the need to have verified commits.
Instructional Video3:04
Instructional Video4:17
Curated Video

Becoming a Cyber Security Professional - A Beginner's Career Guide - Best Websites to Search for Cyber Security Jobs

Higher Ed
Here, we will look at the best website that will help us find suitable job options based on our qualifications and experience in the cyber security industry.
Instructional Video2:38
Curated Video

Complete Linux Training Course to Get Your Dream IT Job - What is IT?

Higher Ed
Gain a foundational understanding of the IT industry, setting the stage for a deeper dive into specific job roles and markets.
Instructional Video9:18
Curated Video

Complete Linux Training Course to Get Your Dream IT Job - Sendmail

Higher Ed
Configure sendmail for handling email routing, a fundamental service for system notifications and user communication.
Instructional Video11:08
Curated Video

Complete Linux Training Course to Get Your Dream IT Job - System Logs Monitor (/var/log)

Higher Ed
Navigate and interpret system logs stored in /var/log, a vital practice for troubleshooting and understanding system events.
Instructional Video10:23
Curated Video

Complete Linux Training Course to Get Your Dream IT Job - Keyboard Keys Used in Linux

Higher Ed
Familiarize yourself with the essential keyboard keys and shortcuts used in Linux, speeding up your workflow and enhancing your navigation efficiency.
Instructional Video4:36
Curated Video

The Complete Guide to ASP.NET Core MVC (.NET 6) - Dependency Injection

Higher Ed
In this video, we will cover dependency injection.
Instructional Video1:32
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - Targeted Email Phishing Part II

Higher Ed
In Part II of this engaging module, you will continue to see new examples of targeted phishing emails, and to recognize some of the major red flags in them.
Instructional Video4:48
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - Targeted Email Phishing Part I

Higher Ed
In Part I of this engaging module, you will learn how targeted email phishing is executed against you, as well as recognize some of the major red flags to be able to readily detect these emails in the future.
Instructional Video2:38
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - How Hard Is it to Get Hacked?

Higher Ed
You will learn how hard it has become to hack into systems and company networks these days.