Instructional Video11:26
Crash Course

The Internet: Crash Course Computer Science

12th - Higher Ed
Today, we're going to talk about how the Internet works. Specifically, how that stream of characters you punch into your browser's address bar, like "youtube.com", return this very website. Just to clarify we're talking in a broader...
Instructional Video11:42
Crash Course

Computer Networks: Crash Course Computer Science

12th - Higher Ed
Today we start a three episode arc on the rise of a global telecommunications network that changed the world forever. We’re going to begin with computer networks, and how they grew from small groups of connected computers on LAN networks...
Instructional Video4:01
TED Talks

Rives: If I controlled the Internet

12th - Higher Ed
How many poets could cram eBay, Friendster and Monster.com into 3-minute poem worthy of a standing ovation? Enjoy Rives' unique talent.
Instructional Video4:30
TED-Ed

TED-Ed: 5 tips to improve your critical thinking - Samantha Agoos

Pre-K - Higher Ed
Every day, a sea of decisions stretches before us, and it's impossible to make a perfect choice every time. But there are many ways to improve our chances -- and one particularly effective technique is critical thinking. Samantha Agoos...
Instructional Video6:55
Curated Video

Git and GitHub Masterclass - Fast track your Journey to Git! - Configuring Git Credentials and Exploring Local Global System Configs

Higher Ed
New ReviewThis video explains how to configure Git credentials and learn its actual purpose.
Instructional Video6:04
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Phishing - Part 2

Higher Ed
New ReviewIn this video, the author explains the concept of Phishing in more detail with live examples and demonstrations.
Instructional Video4:19
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Man in the Middle Attacks

Higher Ed
New ReviewIn this lesson, we will discuss the man-in-the-middle attack, where the person can impersonate both sides of the communication.
Instructional Video5:40
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - The WhoIS Query

Higher Ed
New ReviewIn this video, we will understand more about the WhoIS query. It discusses ICANN's WhoIS, policies and exceptions, complaints, and a knowledge center.
Instructional Video2:50
Curated Video

Basics of Chatbots with Machine Learning & Python - Rule-Based Chatbots-What are rule-based chatbots

Higher Ed
New ReviewLet's understand what rule-based chatbots are and their mechanism of functioning in detail. Here, certain rules or criteria are provided as support to the chatbots, and the tasks performed, and the responses are based on those rules.
Instructional Video1:22
Curated Video

Basics of Chatbots with Machine Learning & Python - Chatbot Types

Higher Ed
New ReviewIn this lesson, we will look at classifying chatbots based on how the chatbots can be trained and tested, including the rule-based chatbot—where rules are specified—and self-learning chatbots, where the chatbot learns on its own with the...
Instructional Video5:33
Instructional Video4:40
Curated Video

Git and GitHub Masterclass - Fast track your Journey to Git! - Mimicking the Commits and the Need to Have Verified Commit

Higher Ed
New ReviewThis video explains mimicking the commits and the need to have verified commits.
Instructional Video3:04
Curated Video

Git and GitHub Masterclass - Fast track your Journey to Git! - Creating GitHub Account

Higher Ed
New ReviewThis video explains how to create a GitHub account.
Instructional Video4:17
Curated Video

Becoming a Cyber Security Professional - A Beginner's Career Guide - Best Websites to Search for Cyber Security Jobs

Higher Ed
New ReviewHere, we will look at the best website that will help us find suitable job options based on our qualifications and experience in the cyber security industry.
Instructional Video2:38
Curated Video

Complete Linux Training Course to Get Your Dream IT Job - What is IT?

Higher Ed
New ReviewGain a foundational understanding of the IT industry, setting the stage for a deeper dive into specific job roles and markets.
Instructional Video9:18
Curated Video

Complete Linux Training Course to Get Your Dream IT Job - Sendmail

Higher Ed
New ReviewConfigure sendmail for handling email routing, a fundamental service for system notifications and user communication.
Instructional Video11:08
Curated Video

Complete Linux Training Course to Get Your Dream IT Job - System Logs Monitor (/var/log)

Higher Ed
New ReviewNavigate and interpret system logs stored in /var/log, a vital practice for troubleshooting and understanding system events.
Instructional Video10:23
Curated Video

Complete Linux Training Course to Get Your Dream IT Job - Keyboard Keys Used in Linux

Higher Ed
New ReviewFamiliarize yourself with the essential keyboard keys and shortcuts used in Linux, speeding up your workflow and enhancing your navigation efficiency.
Instructional Video4:36
Curated Video

The Complete Guide to ASP.NET Core MVC (.NET 6) - Dependency Injection

Higher Ed
New ReviewIn this video, we will cover dependency injection.
Instructional Video1:32
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - Targeted Email Phishing Part II

Higher Ed
New ReviewIn Part II of this engaging module, you will continue to see new examples of targeted phishing emails, and to recognize some of the major red flags in them.
Instructional Video4:48
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - Targeted Email Phishing Part I

Higher Ed
New ReviewIn Part I of this engaging module, you will learn how targeted email phishing is executed against you, as well as recognize some of the major red flags to be able to readily detect these emails in the future.
Instructional Video2:38
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - How Hard Is it to Get Hacked?

Higher Ed
New ReviewYou will learn how hard it has become to hack into systems and company networks these days.
Instructional Video12:03
Curated Video

AWS Certified Cloud Practitioner (CLF-C02) - Ultimate Exam Training - IP Addresses and Port Numbers – Part 2

Higher Ed
New ReviewIn this video, we will continue exploring IP addresses and port numbers. We will discuss the concept of private IP addresses versus public IP addresses, understanding how the scarcity issue of IPV4 addresses was partially resolved by...
Instructional Video8:47
Curated Video

AWS Certified Cloud Practitioner (CLF-C02) - Ultimate Exam Training - Create a Billing Alarm

Higher Ed
New ReviewIn this video, you will learn how to create a billing alarm.