Instructional Video6:34
Curated Video

Explain web security : What is Reconnaissance?

Higher Ed
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks.



The goal of this video is to get an overview of the first step of ethical...
Instructional Video12:06
Brave Wilderness

Frog Scavenger Hunt! - Can I Catch Them All?

6th - 8th
In this episode, Coyote is in Costa Rica to go on a frog scavenger hunt! Costa Rica is home to many diverse frog species, making it the perfect place for this scavenger hunt. The question is.. how many different species of frogs can...
Instructional Video1:52
Curated Video

Explain web security : Operating Systems and Tools Used

Higher Ed
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Instructional Video8:21
ACDC Leadership

Role of Government- EconMovies #12- The Terminator

12th - Higher Ed
In this episode of Econmovies, I discuss the role of the government and the two extremes of the economic spectrum: State Socialism and Neoliberalism. I also talk about the views of Milton Friedman. By the way, what did you think about...
Instructional Video6:18
Curated Video

Describe cyber attacks that could affect a computer system or network : Advanced-Level Hacking - Scanning Hosts with Python Script

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will consider using Python language in...
Instructional Video2:49
Curated Video

IELTS Reading Tips: 3 Methods of Scanning

9th - Higher Ed
Today you’ll find out the three methods of scanning to use on the IELTS Reading Exam.
Instructional Video5:32
Curated Video

Explain web security : Methodolo-gy of Hack-ers

Higher Ed
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether...
Instructional Video9:00
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Vulnerability Assessments

Higher Ed
This episode discusses how to use tools to identify security flaws on hosts or for a specific application. Topics include credential vs non-credential scans and keeping the vulnerability database up to date.
r/>
This clip is...
Instructional Video3:56
Curated Video

IELTS Reading Tips: Increase Your Scores

9th - Higher Ed
Today you’ll learn IELTS Reading tips to increase your scores on your next exam.
Instructional Video8:53
Curated Video

Describe cyber attacks that could affect a computer system or network : Hidden Scanning Ports with Nmap

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools.



In this video, we will learn how to scan a...
Instructional Video4:06
Curated Video

Vital IELTS Reading Strategy II: Skimming

9th - Higher Ed
Today you’ll learn how to skim on the IELTS Reading Exam.
Instructional Video7:59
Curated Video

Learning Angular 2 Directives (Video 8)

Higher Ed
Get up to speed with the building blocks of Angular 2. New technologies and new patterns are emerging on a daily basis. Coding for the front end is extremely demanding, but at the same time more interesting and challenging than...
Instructional Video2:06
NASA

NASA | Flying Around the Radar

3rd - 11th
The HIWRAP is the High-Altitude Imaging Wind and Rain Airborne Profiler, a "conically scanning" Doppler radar, meaning it scans in a cone-shaped manner. Wind measurements are crucial for understanding and forecasting tropical storms...
Instructional Video4:36
Curated Video

Should I Learn to Speed Read for the IELTS Exam?

9th - Higher Ed
Today I’ll answer a question about learning to speed read for the IELTS Exam.
Instructional Video7:40
Curated Video

Describe cyber attacks that could affect a computer system or network : Scanning the Network with OpenVas

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools.



In this video, we will know how to find...
Instructional Video3:08
Curated Video

IELTS Reading Strategy: Why you Must Skim

9th - Higher Ed
With this simple strategy, you can save time on the IELTS Reading exam.
Instructional Video8:43
Curated Video

Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines

Higher Ed
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Instructional Video3:29
Curated Video

IELTS Listening Tips: You Need to Prepare for Accents

9th - Higher Ed
Today you’ll learn amazing resources you need to prepare for various accents in IELTS Listening.
Instructional Video9:32
Curated Video

Bug Bounty Program Certification 5.2: Find Major Bugs in Server

Higher Ed
In this video, we will learn about advance scanning using vulnerability scanner. • Use Nessus network vulnerability scanner • Use advance scan, find bugs in server • Explanation of bug available in server
Instructional Video1:21
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Smartphones and Mobile Apps Part III

Higher Ed
In Part III, you will learn some great solutions that Google has put in place, to protect you from the bad guys when you are using an Android device. We will also discuss Google Play Protect, and how it is designed to help you detect...
Instructional Video14:56
Curated Video

Explain web security : Other Types of Reconnaissance

Higher Ed
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks.



In this video we’ll understand vulnerabilit
y scanning
- Check out...
Instructional Video2:12
NASA

NASA | HS3 Mission: S-HIS Instrument

3rd - 11th
Interview with Henry "Hank" Revercomb, principal investigator for the NASA HS3 Mission's Scanning High-Resolution Interferometer Sounder Instrument. He is responsible for the infrared remote sensing of temperature, water vapor, and...
Instructional Video13:47
Curated Video

Explain web security : Working with NMap

Higher Ed
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks.



Our aim in this video is to understand what NMap is and how we will be...
Instructional Video7:24
Curated Video

Explain web security : Shodan for scanning

Higher Ed
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks.



In this video we will learn what Shodan is and how
to use it.
- ...