Curated Video
The Bohr Model
A video entitled “The Bohr Model” which describes the Bohr model of the atom and discusses the model’s importance and meaning.
Zach Star
Could you avoid being hit by a laser if you were in a room of mirrors?
Could you avoid being hit by a laser if you were in a room of mirrors?
Jabzy
Did Ancient People Sail around Africa? | Phoenicians, Carthage, Ancient Egypt, Ancient Africa
Did Ancient People Sail around Africa? | Phoenicians, Carthage, Ancient Egypt, Ancient Africa
Neuro Transmissions
Why I Became A Therapist
I really love being a therapist, but whenever I get asked how I decided to become one, my answer always seems to change. I think that’s because my path was not as clear-cut and straightforward as I would like to believe. Anyway, check...
Curated Video
Division for Kids (Candy Land theme)
Join Mrs. Taylor as she learns about division from Candy Land. Use repeated subtraction, number lines, groups, and fact families to represent division problems. There's a math challenge at the end of the video.
Schooling Online
Mary Shelley's Frankenstein - Vol. 2, Chapters 1-3 Summary
Victor wants to destroy the thing he created, and the chance finally presents itself. But his first meeting with the monster demonstrates that Victor is not the one in control. Instead of a violent showdown, the intelligent monster...
Schooling Online
Virginia Woolf's A Room of One's Own - Theme of Sexism and Female Oppression
It’s easy to forget that the rights and privileges women enjoy today had to be won. It’s been a tough, centuries-long fight against staunch opposition, especially for female writers. Woolf would know! Join us for a detailed analysis of...
Curated Video
Middle School Mindset Part 3: The Power of Neuroplasticity
In this video we delve into the fascinating world of your brain's pathways and the concept of Neuroplasticity. Much like how paths form in a forest, our brain forms and strengthens connections every time we practice a skill, think a...
Curated Video
Taking Control Pt. 3: The Power of the Right Circle
This episode is a revelation on the power of positive influences and friendships on our journey to success. We begin by recapping the lessons from Parts 1 and 2, emphasizing the strength of hard work and self-discipline over inherent...
Curated Video
Execute a Phishing Attack
In this video, you will learn how to plan and execute a phishing attack using the SET tool
Curated Video
Hidden Tear Ransomware Setup
In this tutorial, you will learn how to customize one of the publicly available forks of the Hidden Tear Ransomware, and how to deploy it. Use this only for learning purposes. Use this only in test VM environment. I'm not responsible for...
Curated Video
Bloodhound and Sharphound
Learn how attackers use Bloodhound and Sharphound to Get Active Directory Domain Admin Access.
Curated Video
8 Ways to improve leadership skills
This video provides eight steps to improve leadership skills for personal and professional growth. It highlights the importance of self-awareness, aligning goals with higher calling, being a role model, continuous learning, upskilling...
Curated Video
Hack a Website in a Few Seconds
In this video, you will learn how to install a backdoor on websites in order to deface them.
Curated Video
Deface a Website in Few Seconds
Learn how to plan a backdoor and control a website in a minute
Curated Video
What is servant leadership
This video explores the concept of servant leadership, an alternative leadership model that focuses on empowering others and serving employees as a means to achieve organizational goals. The video discusses the history of servant...
Curated Video
Linux Fundamentals - Environment Variables
This video explores environment variables. This clip is from the chapter "Environment Variables in Linux" of the series "Linux Fundamentals".This section explains the environment variables and explains how to find solutions with the help...
Curated Video
How important is authenticity?
This video is about the importance of being authentic as a leader. The speaker also provides six tips for being authentic at work, including exploring your values, changing your habits, being self-aware, being vulnerable, being...
Curated Video
Linux Fundamentals - Solution – Script with Environment Variables Access
This video explores how to find solutions with the help of Script with environment variables access. This clip is from the chapter "Environment Variables in Linux" of the series "Linux Fundamentals".This section explains the environment...
Curated Video
Linux Fundamentals - Piping Results of the Find Command to the Other Command Using Xargs
This video explains how to pipe results of the find command to the other command using Xargs. This clip is from the chapter "Search Operations in Linux" of the series "Linux Fundamentals".This section explains the find command. You will...
Curated Video
Structural Design Patterns in Modern C++ - Protection Proxy Example
This video presents an example of the protection proxy. This clip is from the chapter "Proxy Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the proxy design pattern.
Curated Video
MongoDB Mastering MongoDB for Beginners (Theory and Projects) - Installing Node on Local Machine
In this video, we will be installing Node on local machine. This clip is from the chapter "Mongo with Node" of the series "MongoDB—Mastering MongoDB for Beginners (Theory and Projects)".In this section, we will cover Mongo with Node.