Instructional Video9:12
PBS

Our “Junk DNA” Is More Important Than We Once Thought

12th - Higher Ed
In the search for the genes that make us human, some of the most important answers were hiding not in the genes themselves, but in what was once considered genomic junk.
News Clip6:41
PBS

Thinking about math in terms of literacy - not levels

12th - Higher Ed
Algebra is a core subject for U.S. high school students. But should it be? Author Andrew Hacker believes we should reconsider how math is taught: only 5 percent of the American workforce actually uses math beyond arithmetic, though...
News Clip2:44
Curated Video

Apple Boosts iPhone Security After Spyware Find

Higher Ed
FOR CLEAN VERSION SEE STORY NUMBER: apus061994APPLE ISSUED AN IPHONE SECURITY UPDATE AFTER RESEARCHERS UNCOVERED POWERFUL ESPIONAGE SOFTWARE ON AN ACTIVIST'S PHONE IN THE MIDDLE EAST. APPLE IN A STATEMENT SAYS IT FIXED THE VULNERABILITY...
Instructional Video5:39
SciShow

Why Was the WannaCry Attack Such a Big Deal?

12th - Higher Ed
On Friday, May 12th, 2017, the ransomware program WannaCry started spreading to computers all over the world at an alarming rate. A couple days later, it was basically completely contained with very little damage done. So what happened?
Instructional Video18:32
TED Talks

Misha Glenny: Hire the hackers!

12th - Higher Ed
Despite multibillion-dollar investments in cybersecurity, one of its root problems has been largely ignored: who are the people who write malicious code? Underworld investigator Misha Glenny profiles several convicted coders from around...
Instructional Video9:50
TED Talks

TED: Why good hackers make good citizens | Catherine Bracy

12th - Higher Ed
Hacking is about more than mischief-making or political subversion. As Catherine Bracy describes in this spirited talk, it can be just as much a force for good as it is for evil. She spins through some inspiring civically-minded projects...
Instructional Video10:15
SciShow

5 Devastating Security Flaws You've Never Heard Of

12th - Higher Ed
Devastating vulnerabilities are hiding in the technology in programs, protocols, and hardware all around us. Most of the time, you can find ways to protect yourself.
Instructional Video6:27
TED Talks

Tim Leberecht: 3 ways to (usefully) lose control of your brand

12th - Higher Ed
The days are past (if they ever existed) when a person, company or brand could tightly control their reputation -- online chatter and spin mean that if you're relevant, there's a constant, free-form conversation happening about you that...
Instructional Video9:32
Crash Course

The Biggest Problems We're Facing Today & The Future of Engineering: Crash Course Engineering #46

12th - Higher Ed
In our final episode of Crash Course Engineering we are going to take all the tools and ideas we’ve discussed throughout this series and try to imagine where we’re headed. We’re going to explore some of the biggest problems that today’s...
Instructional Video8:22
SciShow

How Hackers Hack, and How To Stop Them

12th - Higher Ed
Hacking is tough, but stopping hackers can be even tougher.
Instructional Video11:20
Crash Course

Hackers & Cyber Attacks: Crash Course Computer Science

12th - Higher Ed
Today we're going to talk about hackers and their strategies for breaking into computer systems. Now, not all hackers are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White...
Instructional Video6:25
SciShow

How the Krack Hack Breaks Wi-Fi Security

12th - Higher Ed
After 14 years of going unnoticed, a vulnerability in Wi-Fi security was published last week. It's a serious problem, but it's already in the process of being fixed.
Instructional Video2:30
SciShow

Is Public WiFi Safe

12th - Higher Ed
You might want to think twice before signing into that too-good-to-be-true "Free Airport Wi-Fi." It might not be what you think it is.
Instructional Video5:18
SciShow

How the Massive Equifax Data Breach Happened

12th - Higher Ed
There was a massive data breach in the United States, and chances are you're probably affected by it. While Hank can't undo what was done, he can give you some insight into how it all went down.
Instructional Video11:57
Crash Course

Cybersecurity: Crash Course Computer Science

12th - Higher Ed
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use...
Instructional Video16:39
TED Talks

Keren Elazari: Hackers: the Internet's immune system

12th - Higher Ed
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and advocate for our rights. By exposing...
Instructional Video2:14
Curated Video

Web Shoppers Beware: The SCOB Virus and the Threat to Online Security

Pre-K - Higher Ed
This video discusses the SCOB virus, a recent web virus that has infected numerous computers and servers. The virus spreads through banner ads, pictures, and logos on trusted websites like eBay and Yahoo. Unlike traditional viruses, SCOB...
Instructional Video4:25
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Patching and Updates

Higher Ed
This video demonstrates how applying Windows safety patches and updates is essential in constantly keeping the system safe and how to use these patches and updates.
Instructional Video1:12
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The World of Electronic Mails – Dangers, Attacks, and Protection

Higher Ed
This section focuses on emails, the dangers of not protecting the emails or opening dangerous emails, how hackers attack using emails, and how to protect yourself from being hacked by emails.
Instructional Video8:18
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Reconnaissance Methods

Higher Ed
In this lesson, you will learn about footprinting, or the art of collecting information about a person or object of interest, called reconnaissance.
Instructional Video4:41
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - What are Privacy, Anonymity, and Pseudonymity

Higher Ed
In this video, you will learn more about privacy, anonymity, and pseudonymity concepts.
Instructional Video5:03
Curated Video

Practical Cyber Hacking Skills for Beginners - Target Reconnaissance

Higher Ed
In this video, you will learn how to perform reconnaissance based on a specific target, usually, a location, understand the groundwork and infrastructure involved, and the possibilities of being able to hack.
Instructional Video12:43
Curated Video

Practical Cyber Hacking Skills for Beginners - Firewall and IDS Evasion Techniques

Higher Ed
In this video, we will understand a firewall and the intrusion detecting system in NMAP for a packet or probe coming specifically from NMAP.
Instructional Video4:11
Curated Video

Practical Cyber Hacking Skills for Beginners - Phishing Notes

Higher Ed
This continuation of the previous video explains phishing emails in detail and how to avoid phishing attacks.