Instructional Video3:40
Curated Video

Practical Cyber Hacking Skills for Beginners - The CIA and DAD Triads

Higher Ed
This video will teach us more about confidentiality, integrity, availability, disclosure, alteration, and deniability.
Instructional Video6:13
Curated Video

Learning the Importance of Moderation

K - 5th
In this video, the Oryx teaches children about the importance of moderation in various aspects of life. Through the story of Basil, a boy addicted to video games, they learn about balancing leisure activities with responsibilities,...
Instructional Video7:31
Curated Video

Building Confidence: A Horse's Lesson on Overcoming Challenges and Believing in Yourself

K - 5th
In this video, Harry the Kiwi teaches children about the importance of confidence and trust. Through a heartwarming story about Andy and his horse friend, Harry, the audience learns that confidence is believing in oneself and finding...
Instructional Video7:21
Curated Video

The Message of Peace

K - 5th
In this video, a pigeon named Delicate shares stories about her travels and promotes the importance of peace. Through a heartwarming story about children resolving conflicts and lifting blockades in their neighborhood, Delicate teaches...
Instructional Video8:29
Curated Video

Self-discipline

K - 5th
In this video, Jade the Giraffe interviews Haley the Bee about the concept of self-discipline. Haley explains how bees are highly organized and work together in a structured manner to achieve their goals, such as producing honey. The...
Instructional Video7:38
Curated Video

The Power of Optimism

K - 5th
In this heartwarming video, Rolla the Rooster shares his perspective on optimism and how it has helped him navigate challenges on the farm. Through his story of selling green tea with his friend Hassan, Rolla teaches us the importance of...
Instructional Video5:43
Curated Video

The Importance of Honesty

K - 5th
In this video, Helen the hippo shares a story about the importance of honesty. When she accidentally eats fruits from a basket that belonged to her new friend Lisa, Helen must decide whether to tell the truth or not. Through her honesty,...
Instructional Video5:11
Curated Video

Fundamentals of Secure Software - SANS Top 25

Higher Ed
This video provides an introduction to the SANS Top 25.
Instructional Video9:46
Curated Video

Fundamentals of Secure Software - Application Security Goals

Higher Ed
In this video, we will continue defining terms and start talking about security goals.
Instructional Video5:25
Curated Video

Recommender Systems Complete Course Beginner to Advanced - Project 2: Movie Recommendation System Using Collaborative Filtering: Logarithm of Count

Higher Ed
In this video, we will explore how to calculate the count of elements using the logarithm function.
Instructional Video10:11
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-How Hackers Find SQL Injections in Minutes with Sqlmap

Higher Ed
This video provides an overview of the section. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on how...
Instructional Video5:23
Curated Video

Recommender Systems with Machine Learning - Logarithm of Count

Higher Ed
This video helps you explain the logarithm of count. This clip is from the chapter "Project 2: Movie Recommendation System Using Collaborative Filtering" of the series "Recommender Systems with Machine Learning".null
Instructional Video9:26
Curated Video

CISSP Crash Course - Secure Coding Guidelines

Higher Ed
This video explains the weaknesses in software and API security. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Instructional Video3:25
Curated Video

CISSP Crash Course - Assess Software Security

Higher Ed
This video explains assessing software security and how to audit and log the changes. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Instructional Video12:24
Curated Video

CISSP Crash Course - Security Controls in the SDLC

Higher Ed
This video explains SDLC practices and security controls in the SDLC. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Instructional Video7:06
Curated Video

CISSP Crash Course - Security in the SDLC

Higher Ed
This video explains security in the SDLC, methodologies, and maturity models. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Instructional Video6:13
Curated Video

CISSP Crash Course - Physical Security and Safety

Higher Ed
This video explains KPIS of physical security and safety. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video9:42
Curated Video

CISSP Crash Course - Recovery and Response Strategies

Higher Ed
This video explains recovery and response strategies with respect to disasters. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video3:03
Curated Video

CISSP Crash Course - Patch and Vulnerability Management

Higher Ed
This video explains the patch and vulnerability management process. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video10:49
Curated Video

CISSP Crash Course - Operate Detective and Preventative Controls

Higher Ed
This video explains firewalls and how to operate detective and preventative controls. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video3:06
Curated Video

CISSP Crash Course - Resource Protection

Higher Ed
This video explains media management and protection. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video5:03
Curated Video

CISSP Crash Course - Security Operations Concepts

Higher Ed
This video explains security operations concepts and separation of duties. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video1:41
Curated Video

CISSP Crash Course - Configuration Management

Higher Ed
This video explains configuration management. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video12:49
Curated Video

CISSP Crash Course - Conducting Logging and Monitoring Activities

Higher Ed
This video explains logging and monitoring activities as well as incident management steps. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...