Hi, what do you want to do?
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Phishing Attacks
In this video, you will learn about Phishing attacks. It is an attempt by a hacker to obtain sensitive data by sending crafted emails to a potential victim while impersonating a known person or body.
<
br/>
This clip is from the...
<
br/>
This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Social Engineering
Social engineering practices enable attackers to gain access to sensitive information through people. This video highlights social engineering tactics, from tailgating to spear phishing.
<
br/>
This clip is from the chapter...
<
br/>
This clip is from the chapter...
Curated Video
CISSP Crash Course - Security Training
This video explains security awareness, training, and education.
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and...
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and...
Curated Video
DIY Craft: Magnet Fishing Game
This is, perhaps, the simplest and the funniest magnet fishing game with paperclips! I taped a magnet to a pipe cleaner and attached it to the front of a cap with a clothespin. After that, boys were ready to catch colourful paperclips...
Curated Video
Augusta Rain: Totally Awesome Superhero
Mr. Griot reviews the elements of a memoir as he reviews the memoir "Augusta Rain: Secret Superhero." He also discusses making connections and author's purpose.
Curated Video
The Memoir of Augusta Rain: Secret Superhero
Mr. Griot reviews the elements of nonfiction and memoirs. Then he summarizes the memoir "Augusta Rain: Secret Superhero."
Brave Wilderness
I Caught a 300lb River Monster!
Coyote's got a big one on the line... a REALLY big one! Brave Wilderness ventures to British Columbia to team up with Kevin and Mariko of Sturgeon Slayers. Coyote's in for the battle of a lifetime as he attempts to wrangle an enormous...
Great Big Story
Fishing and Eating Like Ancient Hawaiians
Join Chef Mark Noguchi in exploring one of Hawaii's last fishing villages on the south Kona coast. Discover the rich Hawaiian tradition of sustainable fishing, where communities practice ancient techniques to preserve the ecosystem....
Great Big Story
After Hurricane Maria_ Building a Community Under the Sea
Learn how a community effort is removing ghost traps from Puerto Rico's ocean post-hurricane
Great Big Story
Lost and Found: The Unbelievable Stories Behind Unclaimed Baggage
Discover the fascinating world of Unclaimed Baggage, the nation's only retailer of lost luggage. From live rattlesnakes to priceless artifacts, explore the incredible stories hidden within the lost items and the impact this unique store...
Great Big Story
Living on the Most Crowded Island on Earth
Explore the fascinating story of Santa Cruz del Islote, a unique island off the coast of Colombia that houses over 1200 residents on land equivalent to two soccer fields. Discover the challenges and simplicity of life in this close-knit...
Great Big Story
Grab a Cold One on Minnesotas Bar on a Lake
Explore the unique experience of Lake Lida's ice bar in the cold north of Minnesota, where locals and visitors gather for warmth and relaxation after a day on the ice. Discover how Josie's dream of owning a neighborhood bar became a...
Great Big Story
Living on the Most Crowded Island on Earth
Explore the fascinating story of Santa Cruz del Islote, a unique island off the coast of Colombia that houses over 1200 residents on land equivalent to two soccer fields. Discover the challenges and simplicity of life in this close-knit...
Curated Video
Remote Sensing: Managing Fish Populations and Canine Blood Banks
This video explores the use of remote sensing technology, specifically image processing software developed by NASA, to manage and conserve fish populations in the Gulf of Mexico. The software helps researchers predict fish locations...
Curated Video
River Systems
Dr. Forrester will define parts of a river system: valley, canyon, tributaries, stream, channel, delta, floodplain, mouth, drainage basin. She will show locations of major drainage basins in North America, including the Mississippi,...
Curated Video
Introduction to OD Family words
Learn to blend the letter sounds and make OD Family words
The Business Professor
Phishing
Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
The Guardian
Daisy Chain
When the remote town of St Just, Cornwall, was locked down in March 2020, the small community worried that its economy wouldn't survive. But one town councillor, Daisy Gibbs, rallied an army of volunteers to form 'the Daisy chain', an...
Brainwaves Video Anthology
Claudio Zavala Jr. - Teachers Make a Difference - Mr. Hamilton
Claudio is an edtech and creative media consultant based in the Dallas-Fort Worth area. He is passionate about fostering creativity in the classroom and using digital tools to engage learners. In addition, he enjoys helping individuals,...
Curated Video
Context Clues: Reading Strategy From the Ocean
Context Clues Strategies: definition, synonyms, and antonyms
Parents and
Teachers:
1. Use this video as an introduction to
context clues.
2. Use this video during remediation to r
eview context clues.
3. Send a...
Parents and
Teachers:
1. Use this video as an introduction to
context clues.
2. Use this video during remediation to r
eview context clues.
3. Send a...
Curated Video
Fishing for Probability of a Set
Join Fisherman Taylor as she shares examples of probability events that are certain, impossible, likely, equally likely and unlikely to happen. I use fish to demonstrate each example.
Curated Video
SE Attack Vectors
This video will explain the various attack vectors used in social engineering
Curated Video
Malware Distribution Mechanisms
In this video, we will explain how hackers leverages various channels to publish their malicious Android applications to that users start using them.