Hi, what do you want to do?
Crash Course
Computer Networks: Crash Course Computer Science
Today we start a three episode arc on the rise of a global telecommunications network that changed the world forever. We’re going to begin with computer networks, and how they grew from small groups of connected computers on LAN networks...
TED Talks
Rives: If I controlled the Internet
How many poets could cram eBay, Friendster and Monster.com into 3-minute poem worthy of a standing ovation? Enjoy Rives' unique talent.
TED-Ed
TED-Ed: 5 tips to improve your critical thinking - Samantha Agoos
Every day, a sea of decisions stretches before us, and it's impossible to make a perfect choice every time. But there are many ways to improve our chances -- and one particularly effective technique is critical thinking. Samantha Agoos...
Curated Video
Main revelations from new Epstein files release
New ReviewMain revelations from new Epstein files release
Curated Video
¿Cómo escribir un correo laboral?
New ReviewEn este video aprenderás cómo escribir un correo laboral o un correo formal, cuál es la estructura de un correo laboral y sus características. También, aprenderás qué hacer y qué no hacer a la hora de escribir un correo de este tipo.
Global Ethics Solutions
Ethical Expectations: Code of Conduct Training | Part 4
Develop ethical decision-making skills in business technology and communication. Learn responsibilities, proper use, and boundaries in Part 4 of this training.
Curated Video
Git and GitHub Masterclass - Fast track your Journey to Git! - Configuring Git Credentials and Exploring Local Global System Configs
This video explains how to configure Git credentials and learn its actual purpose.
Curated Video
The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Phishing - Part 2
In this video, the author explains the concept of Phishing in more detail with live examples and demonstrations.
Curated Video
The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Man in the Middle Attacks
In this lesson, we will discuss the man-in-the-middle attack, where the person can impersonate both sides of the communication.
Curated Video
The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - The WhoIS Query
In this video, we will understand more about the WhoIS query. It discusses ICANN's WhoIS, policies and exceptions, complaints, and a knowledge center.
Curated Video
Basics of Chatbots with Machine Learning & Python - Rule-Based Chatbots-What are rule-based chatbots
Let's understand what rule-based chatbots are and their mechanism of functioning in detail. Here, certain rules or criteria are provided as support to the chatbots, and the tasks performed, and the responses are based on those rules.
Curated Video
Basics of Chatbots with Machine Learning & Python - Chatbot Types
In this lesson, we will look at classifying chatbots based on how the chatbots can be trained and tested, including the rule-based chatbot—where rules are specified—and self-learning chatbots, where the chatbot learns on its own with the...
Curated Video
Git and GitHub Masterclass - Fast track your Journey to Git! - Making Signed Commit - Setting Global Config - Verifying Signed Commits on GitHub
This video explains setting global config - verifying signed commits on GitHub.
Curated Video
Git and GitHub Masterclass - Fast track your Journey to Git! - Mimicking the Commits and the Need to Have Verified Commit
This video explains mimicking the commits and the need to have verified commits.
Curated Video
Git and GitHub Masterclass - Fast track your Journey to Git! - Creating GitHub Account
This video explains how to create a GitHub account.
Curated Video
Becoming a Cyber Security Professional - A Beginner's Career Guide - Best Websites to Search for Cyber Security Jobs
Here, we will look at the best website that will help us find suitable job options based on our qualifications and experience in the cyber security industry.
Curated Video
Complete Linux Training Course to Get Your Dream IT Job - What is IT?
Gain a foundational understanding of the IT industry, setting the stage for a deeper dive into specific job roles and markets.
Curated Video
Complete Linux Training Course to Get Your Dream IT Job - Sendmail
Configure sendmail for handling email routing, a fundamental service for system notifications and user communication.
Curated Video
Complete Linux Training Course to Get Your Dream IT Job - System Logs Monitor (/var/log)
Navigate and interpret system logs stored in /var/log, a vital practice for troubleshooting and understanding system events.
Curated Video
Complete Linux Training Course to Get Your Dream IT Job - Keyboard Keys Used in Linux
Familiarize yourself with the essential keyboard keys and shortcuts used in Linux, speeding up your workflow and enhancing your navigation efficiency.
Curated Video
The Complete Guide to ASP.NET Core MVC (.NET 6) - Dependency Injection
In this video, we will cover dependency injection.
Curated Video
The Beginners 2025 Cyber Security Awareness Training Course - Targeted Email Phishing Part II
In Part II of this engaging module, you will continue to see new examples of targeted phishing emails, and to recognize some of the major red flags in them.
Curated Video
The Beginners 2025 Cyber Security Awareness Training Course - Targeted Email Phishing Part I
In Part I of this engaging module, you will learn how targeted email phishing is executed against you, as well as recognize some of the major red flags to be able to readily detect these emails in the future.
Curated Video
The Beginners 2025 Cyber Security Awareness Training Course - How Hard Is it to Get Hacked?
You will learn how hard it has become to hack into systems and company networks these days.