Instructional Video5:03
Curated Video

Practical Cyber Hacking Skills for Beginners - Target Reconnaissance

Higher Ed
In this video, you will learn how to perform reconnaissance based on a specific target, usually, a location, understand the groundwork and infrastructure involved, and the possibilities of being able to hack.
Instructional Video14:01
Curated Video

Practical Cyber Hacking Skills for Beginners - Crawling, Auditing, and Generating Reports with Burp Suite

Higher Ed
In this video, we will look at AltoroMutual, a testing website developed by IB, specifically for testing against vulnerabilities on the internet to different types of attacks.
Instructional Video9:09
Curated Video

Practical Cyber Hacking Skills for Beginners - Understanding Databases and SQL

Higher Ed
In this lesson, we will look at databases and structured query language (SQL) and how they can be used to manipulate and retrieve data.
Instructional Video5:00
Curated Video

Practical Cyber Hacking Skills for Beginners - Introduction to Zenmap

Higher Ed
This video demonstrates using Zenmap, the graphical user interface for NMAP, to scan different networks.
Instructional Video12:30
Curated Video

Practical Cyber Hacking Skills for Beginners - Scanning Techniques

Higher Ed
This video elaborates on NMAP's different techniques for scanning networks using the available network probes.
Instructional Video10:43
Curated Video

Practical Cyber Hacking Skills for Beginners - Host Discovery Controls - Part 2

Higher Ed
This video continues where we left off, understanding the host discovery controls and the scanning techniques used briefly.
Instructional Video11:06
Curated Video

Practical Cyber Hacking Skills for Beginners - Host Discovery Controls

Higher Ed
In this lesson, we will look at the different probes used by the NMAP, including ICMP Echo request, TCP Syn packet to port 443, TCP ACK packet to port 80, and ICMP timestamp request.
Instructional Video9:22
Curated Video

Practical Cyber Hacking Skills for Beginners - Working with DHCP Commands

Higher Ed
This video takes us through the different commands to operate the DHCP and protect a system or network from attacks.
Instructional Video6:19
Curated Video

Practical Cyber Hacking Skills for Beginners - The Hacking Methodology

Higher Ed
Here, you will learn more about the different hacking methodologies that hackers employ to cause harm to a system or a network and also understand the possibilities of minimizing the attacks.
Instructional Video8:03
Curated Video

Practical Cyber Hacking Skills for Beginners - Social Engineering

Higher Ed
This video discusses social engineering concepts, understanding the human psyche, and how hackers manipulate the human mind to hack.
Instructional Video3:25
Curated Video

Build and Learn ASP.NET 6.0 Blazor Hands-On - The Program Class and Host Object

Higher Ed
This lecture explains the hosting process of a Blazor application where the Program class main method is the entry point to the application. This clip is from the chapter "Create a CRUD Application in Blazor" of the series "Build and...
Instructional Video2:37
Curated Video

AI for Teachers with ChatGPT - Creating Projects and Rubrics

Higher Ed
In this video, you will unlock the potential of Chat GPT in creating exciting projects and developing rubrics that foster creativity and critical thinking. This clip is from the chapter "Introduction to the Course" of the series "AI for...
Instructional Video5:28
Curated Video

Risk Management for Cyber Security Managers - Ethical Hacking and Pen Testing

Higher Ed
In this video, we will discuss ethical hacking and penetration testing and how we can use these techniques to mitigate cyber risks in an organization.
Instructional Video1:49
Curated Video

Risk Management for Cyber Security Managers - Information Classification

Higher Ed
In this lesson, you will learn how to classify information to understand how to mitigate risks in the most efficient manner.
Instructional Video5:48
Curated Video

Learn Midjourney For Your Future 6 Figure Career - Is Midjourney Ethically Correct?

Higher Ed
In this video, we will understand the problems of ethical dimensions that we could face while using Midjourney. We will understand how using the content generated by Midjourney can pose ethical problems such as stealing art illegally and...
Instructional Video8:21
Curated Video

The Story You Tell Yourself: Understanding Your Narrative Identity

Higher Ed
The story you tell yourself about your life has immense power. This is your narrative identity – it shapes how you think, feel, and act. In this video, psychiatrist Dr. Tracey Marks helps you understand the key elements of your...
Instructional Video4:40
Curated Video

Practical Cyber Hacking Skills for Beginners - NMAP Scripting

Higher Ed
In this video, we will look at the different scripts used in NMAP, programs, or codes used to check the vulnerability of networks and other functional availabilities.
Instructional Video4:33
Curated Video

Landmarks - Temple Mount

12th - Higher Ed
TEMPLE MOUNT THE TEMPLE MOUNT, ALSO KNOWN AS THE NOBLE SANCTUARY , IS A RELIGIOUS SITE IN THE OLD CITY OF JERUSALEM. IT S THE HOLIEST SITE FOR JUDAISM, BUT ALSO HOLDS GREAT SIGNIFICANCE IN THE MUSLIM AND CHRISTIAN WORLD. TODAY BOTH...
Instructional Video9:24
Curated Video

What If Our Clothes Could Disrupt Surveillance Cameras?

9th - Higher Ed
What do you get when you combine mass surveillance with A.I.? It’s a dystopia that’s already a reality in places across the world. Fashion designers are pushing back, crafting clothing and accessories that trick facial recognition...
Instructional Video4:00
Curated Video

Valence Electrons & Lewis Dot Diagrams - what are they and how do I draw them?

9th - Higher Ed
Valence electrons are the electrons in the outermost energy level of an atom. They are important because they are involved in the chemical bonding of our elements which helps determine the reactivity of elements. In order to be stable,...
Instructional Video4:30
Curated Video

Why does chemistry happen?! Element Stability and the Octet Rule!

9th - Higher Ed
Why does chemistry happen?? Why do ions form?? Why do elements bond together?? These are all important questions and the answer comes back to one very important principle in chemistry and that is element stability. Elements are stable...
Instructional Video3:54
Great Big Story

Cherokee trails, Lamar Marshall’s mission to preserve history

12th - Higher Ed
Lamar Marshall, also known as Nanohe Dewatiski, dedicates his life to mapping and preserving Cherokee trails, connecting modern generations with their ancestors' sacred paths.
Instructional Video4:17
Science ABC

AM vs FM Radio: Which Modulation Rocks Your Ears?

Pre-K - Higher Ed
Amplitude Modulation, commonly abbreviated as AM, is a common method of broadcasting radio signals. This method dates back to the 1870s, i.e., the time when we first discovered that information in the form of audio production can be...
Instructional Video0:44
Curated Video

Data

6th - 12th
A collection of pieces of information, organised and categorised for some purpose. A Twig Science Glossary Film. Key scientific terms defined in just 60 seconds using stunning images and concise textual definitions. Twig Science Glossary...