Instructional Video19:07
Religion for Breakfast

What Happened to the Ten Lost Tribes of Israel?

12th - Higher Ed
What Happened to the Ten Lost Tribes of Israel?
Instructional Video9:40
Religion for Breakfast

Why Is Congress So Religious?

12th - Higher Ed
Why Is Congress So Religious?
Instructional Video2:30
Curated Video

Business Email Compromise

Higher Ed
The video explains the phishing attack of BEC, how it originates and what are the tricks used on employees
Instructional Video9:47
Curated Video

Types of Data

Higher Ed
On social networking sites like Facebook, Twitter, and Linked in, as well as online photo sharing sites like Instagram and Picasa and video sharing sites like YouTube, users are producing a lot of data. Blogs, email, text messages on...
Instructional Video1:00
Curated Video

Identity and Data Protection Tools

Higher Ed
This video will introcude you to many technologies that serve to protect your identiy and protect your data online
Instructional Video3:56
Curated Video

Symetric and Assymetric Encryption

Higher Ed
This video will differentiate between the two main types of encryption
Instructional Video13:58
Curated Video

Learn ASP.NET MVC and Entity Framework (Database First) - Adding Lecturer and Enrollment Management Modules

Higher Ed
This video explains how to add lecturer and enrollment management modules. This clip is from the chapter "Using jQuery and Ajax" of the series "Learn ASP.NET MVC and Entity Framework (Database First)".In this section, you will learn how...
Instructional Video12:51
Curated Video

Ultimate ASP.NET 5 Web API Development Guide - Set Up User Identity Core

Higher Ed
This video shows setting up user identity core. This clip is from the chapter "Securing Your Application" of the series "Ultimate ASP.NET Core Web API Development Guide".This section focuses on securing your application.
Instructional Video2:07
Curated Video

Structural Design Patterns in Modern C++ - Pros and Cons - Flyweight Design Pattern

Higher Ed
This video explains the pros and cons of using the flyweight pattern. This clip is from the chapter "Flyweight Design Pattern" of the series "Structural Design Patterns in Modern C++".This section introduces you to the flyweight design...
Instructional Video15:51
Curated Video

Ultimate ASP.NET 5 Web API Development Guide - Set Up Auth Manager for Registration

Higher Ed
This video helps in setting up Auth Manager for registration. This clip is from the chapter "Securing Your Application" of the series "Ultimate ASP.NET Core Web API Development Guide".This section focuses on securing your application.
Instructional Video9:46
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - Identity Federation

Higher Ed
This video focuses on AWS identity federation. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about Amazon Web Services (AWS)...
Instructional Video12:32
Brainwaves Video Anthology

Theresa M. Bouley - Social Justice Education

Higher Ed
Theresa M. Bouley, PhD is a professor of education at Eastern Connecticut State University and the President of the Connecticut chapter of the National Association for Multicultural Education (NAME). In her research and teaching she...
Instructional Video5:45
Curated Video

Finding Dimensions of Figures Formed by Removing Squares

K - 5th
In this video, students learn how to find the dimensions of a figure formed when removing a smaller square from a larger square. The teacher explains the concept of polynomial identities and demonstrates how to use them to find the...
Instructional Video9:20
Math Fortress

Calculus II: Trigonometric Integrals (Level 6 of 7)

12th - Higher Ed
This video continues illustrating methods for solving trigonometric integrals that contain combinations of trigonometric functions. Specifically, those that contain products of sine and cosine with distinct arguments (angles). This video...
Instructional Video5:36
Curated Video

Understanding the Influence of Multiplying Equations by Constants on Graphs

K - 5th
In this video, the teacher explains how multiplying an equation by a constant affects the equation and its graph. They define constants and variables, and show how multiplying every term in an equation by a constant produces an...
Instructional Video11:02
National Institute of Standards and Technology

Key to Security: Biometric Standards

9th - 12th
NIST develops and tests biometrics (e.g., fingerprint, face, iris, & multimodal) standards and technology that promote security, interoperability, and innovation. Four projects (in collaboration with the DHS and the FBI) are highlighted:...
Instructional Video5:23
Curated Video

Relating Changes in Cube Edges to Volume Using Polynomial Equations

K - 5th
In this video, we learn how to relate changes in the edges of a cube to changes in its volume using polynomial equations. We explore the concept of polynomial identities and how they can be used to simplify expressions and find the new...
Instructional Video5:26
Brainwaves Video Anthology

Baptiste Barbot - Creativity and Identity Development in Adolescence

Higher Ed
Baptiste Barbot is an Assistant Professor of Quantitative Methods in the Department of Psychology at Pace University, and Adjunct Assistant Professor at Yale University, Child Study Center. His background is in both Developmental and...
Instructional Video6:21
Mediacorp

Exploring the Formation of Telangana

12th - Higher Ed
This video explores the formation of Telangana, a new state in India, and the reasons behind its separation from Andhra Pradesh. It highlights the complexities of Indian society, with its diverse languages, religions, and castes, and the...
Instructional Video10:08
Brainwaves Video Anthology

Scott Barry Kaufman - Creativity and Intelligence

Higher Ed
Dr. Scott Barry Kaufman, cognitive psychologist, is the author of Ungifted, Intelligence Redefined and adjunct assistant professor of psychology at New York University. In this video he discusses the roles of creativity and intelligence...
Instructional Video4:51
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Authorization

Higher Ed
What role does authorization play in Identity and Access Management (IAM)? Authorization relates to resource permissions granted to a security principal such as a user or device. This clip is from the chapter "Identity and Account...
Instructional Video4:50
Curated Video

Proving the Relationship between Side Length and Area of a Square

K - 5th
In this video, students learn how to prove a pattern in a relationship by squaring the sum of two terms. They are shown how to distribute the terms and simplify the expressions to arrive at an identity. The video also provides an example...
Instructional Video42:13
The Wall Street Journal

Creating an Inclusive Workplace

Higher Ed
Drawing on personal and professional experiences. Drs. Stephanie Pinder-Amaker and Lauren Wadsworth provide a practical guide to creating and sustaining inclusive, diverse workplaces with real-life examples and tips for individuals and...
Instructional Video5:36
Professor Dave Explains

Italian and English: Cognates and False Cognates

9th - Higher Ed
Words that sound similar in English and Italian.