Instructional Video4:52
SciShow

Lemurs Are Into Networking Too

12th - Higher Ed
New research says that even lemurs benefit from networking skills and some frogs are finally bouncing back from the Chytrid epidemic.
Instructional Video3:28
TED-Ed

TED-Ed: Networking for the networking averse - Lisa Green Chau

Pre-K - Higher Ed
Networking can seem so hard -- but not if you have the right advice. Try taking advantage of weak ties; you never know what friend of a friend of a friend can aid you in your dreams. Lisa Green Chau outlines how being proactive and...
Instructional Video8:53
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Anatomy of a Social Engineering Attack

Higher Ed
This video will examine hackers' process of creating an attack using the social engineering technique.
Instructional Video4:19
Curated Video

Get Hired: Virtual Meeting Etiquette

9th - Higher Ed
Sometimes the lines between work/home balance can blur. Especially if you find yourself teleworking. This video will provide you with what you should NOT do when participating in a virtual meeting.
Instructional Video3:55
Curated Video

Get Hired: Virtual Networking

9th - Higher Ed
The future of communication is upon us with virtual networking that enables us to adapt to social distancing requirements while staying connected. Let's start taking full advantage of this virtual networking smorgasbord by taking action!...
Instructional Video7:02
Curated Video

Influencing Stakeholders: Start at the Bottom

10th - Higher Ed
It may sound contradictory, but sometimes, for influencing stakeholders, you need to start at the bottom! There's a paradoxical truth about stakeholder engagement. You know where the influence lies: at the top. Right? So you target your...
Instructional Video4:17
Curated Video

Networking 101

9th - Higher Ed
No matter the industry, networking is essential to a long, successful career. The most successful networkers know that the real work begins well before the event begins and ends long after you get home. Preparation and follow-up are just...
Instructional Video0:57
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Conclusion

Higher Ed
Here, we will hear from the author about his thoughts on completing this course and a cursory outline of what you have learned.
Instructional Video2:10
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Hardening - Randomizing the MAC Address

Higher Ed
Another step of hardening the Windows 10 OS is randomizing the MAC address, which is usually a unique number for each PC.
Instructional Video2:43
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Hardening - Enabling the Smart Screen Filter

Higher Ed
Here, we will look at the next step in hardening the Windows 10 OS using smart screen filtering to enhance the protection of your OS.
Instructional Video2:25
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Hardening - The Windows 10 Firewall

Higher Ed
Here, we will understand a firewall, how it works, and how it can protect the Windows 10 OS.
Instructional Video3:46
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Peer Updates

Higher Ed
This video illustrates how the privacy of Windows 10 OS can be improved by turning off the peer updates features from other computers, especially where the internet is unreliable.
Instructional Video3:16
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Location Tracking

Higher Ed
Here, we will look at how location tracking works on our systems and networks and how we can prevent systems from knowing our location to prevent being hacked.
Instructional Video3:26
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Restricting Cortana

Higher Ed
In this video, we will understand how Cortana works and how to limit the amount of information it collects, to prevent the data from being shared through trackers.
Instructional Video2:33
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Ad Tracking

Higher Ed
This video illustrates a few tricks and tips to improve the privacy of the Windows 10 operating system. You will learn how to turn off ad tracking and prevent being tracked.
Instructional Video4:25
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Patching and Updates

Higher Ed
This video demonstrates how applying Windows safety patches and updates is essential in constantly keeping the system safe and how to use these patches and updates.
Instructional Video7:28
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Scam Email Live Example

Higher Ed
In this video, we will look at the various examples of scam emails that bombard your inbox from time to time and how they can be dangerous if the information is passed on to unknown people.
Instructional Video5:16
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Phishing Attacks

Higher Ed
Here, we will understand the concepts of phishing, how the attack is performed, the dangers of opening phishing emails, and how to prevent them.
Instructional Video4:15
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introducing Proton Email

Higher Ed
This video illustrates the Proton email and its features and advantages, safety, and disadvantages.
Instructional Video4:42
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Guerrilla Mail

Higher Ed
This video illustrates Guerrilla mail and its features and advantages, safety, and disadvantages.
Instructional Video2:41
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - How to Detect Email Tracking

Higher Ed
In this lesson, we will understand how to detect if someone is tracking your email and how to prevent that from happening.
Instructional Video3:13
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - How to Track Sent Emails

Higher Ed
In this video, we will look at an email tracker software that allows you to track the status of the sent mail or if the emails have been read or not, the email tracker.
Instructional Video6:04
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Email Basics, Protocols and Ports

Higher Ed
In this lesson, you will learn about emails, what protocols and ports they use to communicate, the IMAP port 143 and POP port 110, IMAP port 993 and POP port 995, encrypted and unencrypted.
Instructional Video1:12
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The World of Electronic Mails – Dangers, Attacks, and Protection

Higher Ed
This section focuses on emails, the dangers of not protecting the emails or opening dangerous emails, how hackers attack using emails, and how to protect yourself from being hacked by emails.