Instructional Video4:34
Wonderscape

Understanding the Law of Conservation of Matter

K - 5th
Explore the concept of the conservation of matter, which states that during a chemical reaction, matter is neither created nor destroyed. Learn how this fundamental principle applies to various examples, from dissolving sugar in tea to...
Instructional Video4:08
Wonderscape

Understanding Energy Changes in Chemical Reactions

K - 5th
Explore the concept of energy changes in chemical reactions, including exothermic and endothermic reactions. Learn how chemical reactions can either release or absorb energy in the form of heat or light, with examples ranging from baking...
Instructional Video4:32
Wonderscape

Identifying Chemical Reactions: Observable Signs and Indicators

K - 5th
Explore the various changes in properties that occur as a result of chemical reactions. Learn how to recognize signs such as color change, emission of odor, production of gas, and formation of precipitates, with practical examples like...
Instructional Video6:32
Curated Video

Fundamentals of Secure Software - Introduction to Session Management

Higher Ed
This video provides an introduction to session management and best practices.
Instructional Video7:21
Curated Video

Fundamentals of Secure Software - Cryptographic Failures

Higher Ed
This video explains what sensitive data exposure is and talks about cryptographic failures.
Instructional Video7:53
Curated Video

A Detailed Guide to the OWASP Top 10 - #3 Cross-Site Scripting Attacks

Higher Ed
This video explains another important client-side based attack, which is called the cross-site scripting attack.
Instructional Video7:18
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - You Have Been HACKED - Now What?

Higher Ed
In this video, you will look at steps to take after you have been hacked and how exactly you would respond. This clip is from the chapter "Conclusion" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
Instructional Video12:25
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Identify Legit Apps

Higher Ed
In this video, the author shares a few tips on how to successfully navigate Google Play Store and download the right kind of application to help you identify legit apps and spot the fake apps out there. This clip is from the chapter...
Instructional Video17:06
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Personal Cybersecurity - What I Do

Higher Ed
In this video, the author talks about the necessary steps that he takes to keep himself and his data safe from malware and hackers. This clip is from the chapter "Introduction" of the series "The Absolute Beginners Guide to Cybersecurity...
Instructional Video2:02
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - IOS

Higher Ed
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Mobile Security" of the series "The Absolute Beginners Guide to...
Instructional Video5:43
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - Android

Higher Ed
This video talks about the kinds of permissions the applications have on an Android device. We will look at app permissions such as Instagram, Rebtel, and introduce to you an app to manage the permissions quickly and effectively. This...
Instructional Video5:17
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Understanding App Permissions

Higher Ed
This video talks about app permissions and the kind of permissions that an application demands while you install them on your phone. These permissions can be features or tools that the app needs in order to function properly. This clip...
Instructional Video1:49
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Introduction

Higher Ed
This is an introduction to the section in which the author talks about mobile cybersecurity. This clip is from the chapter "Mobile Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".In this section, you...
Instructional Video3:05
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Set Up a Recovery Email

Higher Ed
In this video, the author shows you how to set up a recovery email account the right way. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part...
Instructional Video3:20
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Google Account - Part 2

Higher Ed
In part 2 of the video, which focuses on securing your Google account, you will look at signing into other sites part of the security. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute...
Instructional Video4:51
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Google Account

Higher Ed
In this video, you will learn to secure your Google account. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section focuses on...
Instructional Video4:44
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Email Data Management

Higher Ed
In this video, the author talks about a few tips on how best to protect yourself in case your email gets hacked. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to...
Instructional Video8:54
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Phishing Attacks

Higher Ed
In this video, you will learn about Phishing attacks. It is an attempt by a hacker to obtain sensitive data by sending crafted emails to a potential victim while impersonating a known person or body. This clip is from the chapter "Social...
Instructional Video4:41
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Twitter Account

Higher Ed
In this video, you will discover effective strategies to enhance the security of your Twitter account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...
Instructional Video8:37
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your LinkedIn Account

Higher Ed
In this video, you will discover effective strategies to enhance the security of your LinkedIn account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...
Instructional Video8:22
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your Facebook Account

Higher Ed
In this video, you will discover effective strategies to enhance the security of your Facebook account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...
Instructional Video3:32
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Social Media Ethics - Part 2

Higher Ed
This video further continues to talk about social media ethics when it comes to social media sites like Facebook. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to...
Instructional Video4:55
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Social Media Ethics

Higher Ed
In this video, you will learn about social media ethics. This clip is from the chapter "Social Media Security and Email Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section focuses on social...
Instructional Video3:33
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Have I Been Pwned?

Higher Ed
In this video, the author introduces you to a web tool called “have I been pwnedâ€; this is a website where you can check whether your email address or password has been compromised. This clip is from the chapter "Personal Security" of...