Instructional Video14:20
Bozeman Science

Scientific and Technical Information

12th - Higher Ed
In this video Paul Andersen shows you how to INSERTPRACTICE in a mini-lesson on INSERTTITLEHERE. Two examples are included in the video and two additional examples are included in the linked thinking slides.
Instructional Video16:19
TED Talks

John Wilbanks: Let's pool our medical data

12th - Higher Ed
When you're getting medical treatment, or taking part in medical testing, privacy is important; strict laws limit what researchers can see and know about you. But what if your medical data could be used -- anonymously -- by anyone...
Instructional Video13:46
Crash Course

Who Can You Trust? Crash Course Navigating Digital Information #4

12th - Higher Ed
In which John Green teaches you how to assess the sources of information you find on the internet. The growing suspicion of expertise is a growing problem on the internet, and it can be very difficult to figure out which sources are...
Instructional Video5:40
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - The WhoIS Query

Higher Ed
In this video, we will understand more about the WhoIS query. It discusses ICANN's WhoIS, policies and exceptions, complaints, and a knowledge center.
Instructional Video9:19
Curated Video

Cisco CCNA 200-301: The Complete Guide to Getting Certified - SNMP Simple Network Management Protocol

Higher Ed
In this video, explore SNMP, a protocol used to monitor and manage network devices and gather performance data.
Instructional Video13:43
Curated Video

The Connection Between Entropy, Time, and Information

12th - Higher Ed
The common interpretation of entropy is that it is a measure of disorder in the universe. The universe is on path to more and more disorder. And this is the reason time is thought to flow forward.Is entropy a...
Instructional Video8:18
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Reconnaissance Methods

Higher Ed
In this lesson, you will learn about footprinting, or the art of collecting information about a person or object of interest, called reconnaissance.
Instructional Video9:02
Curated Video

Practical Cyber Hacking Skills for Beginners - Installing Maltego

Higher Ed
In this video, you will learn how to install and configure Maltego. You will learn about the Maltego Community edition in this lesson.
Instructional Video12:49
Curated Video

CISSP Crash Course - Conducting Logging and Monitoring Activities

Higher Ed
This video explains logging and monitoring activities as well as incident management steps.
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on...
Instructional Video4:51
Curated Video

Delivering a Speech

K - 8th
In this video the student will learn techniques for delivering a speech.
Instructional Video4:51
Curated Video

Historical Sources

3rd - 8th
A video entitled “Historical Sources” identifies the differences between primary and secondary sources and discusses how these sources can be used to study the past.
Instructional Video3:27
Curated Video

High Five Facts - Satellites

Pre-K - 5th
This video explores five fun facts about the satellites.
Instructional Video3:42
Visual Learning Systems

Your Science Fair Project: Steps in the Scientific Method

9th - 12th
The scientific method is the foundation of work for scientists. In this video the scientific method is explained in detail serving as the basis for your science fair project. The process of creating a science fair project along with...
Instructional Video5:59
Curated Video

Bug Bounty Program Certification 3.1: Overview of Preparation Steps

Higher Ed
In this video, we will have a look at the preparation steps. • Explore various technologies • Learn about ports and services information • Explore vulnerability scanning and tools
Instructional Video6:27
Curated Video

Bug Bounty Program Certification 11.1: About Android App Frontend Penetration

Higher Ed
In this video, you will learn about Android app frontend penetration overview. • Explore frontend penetration techniques • Understand the process of frontend penetration • Learn about the goals of frontend penetration
Instructional Video7:50
Curated Video

Bug Bounty Program Certification 13.6: Certification Exam Practice Questions – Part 5

Higher Ed
Exam questions.<br/>
• Practic<br/>e que<br/>stions
• Solu<br/>tions
• Explanation of answer
Instructional Video8:33
Curated Video

Bug Bounty Program Certification 6.5: Gather Machine User Login Credentials

Higher Ed
In this video, you will gather information about Windows and Kali Linux password files. • Learn about Kali Linux shadow file • Use john the Ripper to crack password file • Gather information about Windows SAM file
Instructional Video8:06
Curated Video

Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video8:43
Curated Video

Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines

Higher Ed
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Instructional Video7:59
Curated Video

Bug Bounty Program Certification 9.3: Non-persistent Attack on Websites Frontend

Higher Ed
In this video, you will perform non - persistent attack on websites.

• Setup Lab using Mutillidae Buggy web application for non-persistent a
ttack
• Explore non-persistent XSS attack using popup box
generation
• Learn about...
Instructional Video3:12
Curated Video

Bug Bounty Program Certification 1.2: How to Get Most Out of This Course?

Higher Ed
This video will give you a brief overview about the course. • Explain about course topics • Explore various components • Prepare for next sections
Instructional Video4:15
Curated Video

Bug Bounty Program Certification 2.6: Various Components of Network Bug Bounty Program

Higher Ed
This video explores components of bug bounty program. • Explore components of bug bounty program • Various components of network bug bounty program • Explain functioning of a network bug bounty program
Instructional Video5:09
Curated Video

Using Tally Marks to Gather Information

K - 5th
In this video, students learn how to gather information by using tally marks in a table. The teacher explains the concept of tally marks and how they can be used to keep track of quantities. Through examples of counting stickers and...
Instructional Video5:42
Curated Video

Bug Bounty Program Certification 12.3: Find Bugs and Hack Android Machine Databases

Higher Ed
In this video, you will look at Drozer commands to hack database.<br/>
• Connect consol<br/>e of Drozer
• Explore v<br/>arious Drozer commands
• Hack database using Drozer and get username and password of database