Hi, what do you want to do?
Bozeman Science
Scientific and Technical Information
In this video Paul Andersen shows you how to INSERTPRACTICE in a mini-lesson on INSERTTITLEHERE. Two examples are included in the video and two additional examples are included in the linked thinking slides.
TED Talks
John Wilbanks: Let's pool our medical data
When you're getting medical treatment, or taking part in medical testing, privacy is important; strict laws limit what researchers can see and know about you. But what if your medical data could be used -- anonymously -- by anyone...
Crash Course
Who Can You Trust? Crash Course Navigating Digital Information #4
In which John Green teaches you how to assess the sources of information you find on the internet. The growing suspicion of expertise is a growing problem on the internet, and it can be very difficult to figure out which sources are...
Curated Video
The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - The WhoIS Query
In this video, we will understand more about the WhoIS query. It discusses ICANN's WhoIS, policies and exceptions, complaints, and a knowledge center.
Curated Video
Cisco CCNA 200-301: The Complete Guide to Getting Certified - SNMP Simple Network Management Protocol
In this video, explore SNMP, a protocol used to monitor and manage network devices and gather performance data.
Curated Video
The Connection Between Entropy, Time, and Information
The common interpretation of entropy is that it is a measure of disorder in the universe. The universe is on path to more and more disorder. And this is the reason time is thought to flow forward.Is entropy a...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Reconnaissance Methods
In this lesson, you will learn about footprinting, or the art of collecting information about a person or object of interest, called reconnaissance.
Curated Video
Practical Cyber Hacking Skills for Beginners - Installing Maltego
In this video, you will learn how to install and configure Maltego. You will learn about the Maltego Community edition in this lesson.
Curated Video
CISSP Crash Course - Conducting Logging and Monitoring Activities
This video explains logging and monitoring activities as well as incident management steps.
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on...
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on...
Curated Video
Delivering a Speech
In this video the student will learn techniques for delivering a speech.
Curated Video
Historical Sources
A video entitled “Historical Sources” identifies the differences between primary and secondary sources and discusses how these sources can be used to study the past.
Visual Learning Systems
Your Science Fair Project: Steps in the Scientific Method
The scientific method is the foundation of work for scientists. In this video the scientific method is explained in detail serving as the basis for your science fair project. The process of creating a science fair project along with...
Curated Video
Bug Bounty Program Certification 3.1: Overview of Preparation Steps
In this video, we will have a look at the preparation steps. • Explore various technologies • Learn about ports and services information • Explore vulnerability scanning and tools
Curated Video
Bug Bounty Program Certification 11.1: About Android App Frontend Penetration
In this video, you will learn about Android app frontend penetration overview. • Explore frontend penetration techniques • Understand the process of frontend penetration • Learn about the goals of frontend penetration
Curated Video
Bug Bounty Program Certification 13.6: Certification Exam Practice Questions – Part 5
Exam questions.<br/>
• Practic<br/>e que<br/>stions
• Solu<br/>tions
• Explanation of answer
• Practic<br/>e que<br/>stions
• Solu<br/>tions
• Explanation of answer
Curated Video
Bug Bounty Program Certification 6.5: Gather Machine User Login Credentials
In this video, you will gather information about Windows and Kali Linux password files. • Learn about Kali Linux shadow file • Use john the Ripper to crack password file • Gather information about Windows SAM file
Curated Video
Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4
Exam questions. • Practice questions • Solutions • Explanation of answer
Curated Video
Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Curated Video
Bug Bounty Program Certification 9.3: Non-persistent Attack on Websites Frontend
In this video, you will perform non - persistent attack on websites.
• Setup Lab using Mutillidae Buggy web application for non-persistent a
ttack
• Explore non-persistent XSS attack using popup box
generation
• Learn about...
• Setup Lab using Mutillidae Buggy web application for non-persistent a
ttack
• Explore non-persistent XSS attack using popup box
generation
• Learn about...
Curated Video
Bug Bounty Program Certification 1.2: How to Get Most Out of This Course?
This video will give you a brief overview about the course. • Explain about course topics • Explore various components • Prepare for next sections
Curated Video
Bug Bounty Program Certification 2.6: Various Components of Network Bug Bounty Program
This video explores components of bug bounty program. • Explore components of bug bounty program • Various components of network bug bounty program • Explain functioning of a network bug bounty program
Curated Video
Using Tally Marks to Gather Information
In this video, students learn how to gather information by using tally marks in a table. The teacher explains the concept of tally marks and how they can be used to keep track of quantities. Through examples of counting stickers and...
Curated Video
Bug Bounty Program Certification 12.3: Find Bugs and Hack Android Machine Databases
In this video, you will look at Drozer commands to hack database.<br/>
• Connect consol<br/>e of Drozer
• Explore v<br/>arious Drozer commands
• Hack database using Drozer and get username and password of database
• Connect consol<br/>e of Drozer
• Explore v<br/>arious Drozer commands
• Hack database using Drozer and get username and password of database