Instructional Video4:53
TED-Ed

TED-Ed: How close are we to uploading our minds? | Michael S.A. Graziano

Pre-K - Higher Ed
Imagine a future where nobody dies— instead, our minds are uploaded to a digital world. There they could live on in a realistic, simulated environment with avatar bodies, calling in and contributing to the biological world....
Instructional Video8:36
Curated Video

Practical Cyber Hacking Skills for Beginners - Basics of NMAP

Higher Ed
After installing and configuring NMAP, we will look at how this NMAP scanning program works.
Instructional Video4:40
Curated Video

Practical Cyber Hacking Skills for Beginners - NMAP Scripting

Higher Ed
In this video, we will look at the different scripts used in NMAP, programs, or codes used to check the vulnerability of networks and other functional availabilities.
Instructional Video2:38
Curated Video

SETI: Are We Alone?

6th - 12th
The SETI project scans the skies for alien messages, and controversially claim they succeeded in 1977. Physics - Universe - Learning Points. The Search for Extra-Terrestrial Intelligence, or SETI, is a collection of scientists who scan...
Instructional Video2:34
Curated Video

Intuition

6th - 12th
What is intuition and how does it work? A fireman explains how intuition saved his and his crews' lives. Biology - Being Human - Learning Points. The human brain has powers we aren't normally aware of. There is a part of our brain that...
Instructional Video2:37
Curated Video

Digitizing Ghent University's Library

Pre-K - Higher Ed
At the heart of the historic Belgian city of Ghent is the city's university. Ghent University s library has a collection in excess of a million books in French, Flemish, German and English. Since 2007 the library has been working with...
Instructional Video4:27
Curated Video

Master SQL for Data Analysis - Partitions

Higher Ed
In this lesson, we will explore partitions, a popular strategy to handle growing amounts of data, and break tables into smaller parts called partitions. This clip is from the chapter "Databases - Terminology" of the series "Master SQL...
Instructional Video3:18
Curated Video

The Evolution of Shopping Technology: From ATMs to Biometric Transactions and Online Innovation

Pre-K - Higher Ed
This video explores the evolution of electronic transactions over the past four decades, highlighting key advancements such as biometric authentication, mobile phone scanning for product information, and the rise of online shopping. From...
Instructional Video9:12
Brave Wilderness

SPIKED by Sharpest Lizard on Earth! (Thorny Devil)

6th - 8th
On this adventure I’m in Western Australia tracking down the sharpest lizard in the world! Covered from head to tail with spikes as sharp as a rose thorn. I’m going to put it to the test and see if it’s sharp enough to draw blood!
Instructional Video1:19
Curated Video

Cutting-Edge Technologies for the Blind and Visually Impaired

Pre-K - Higher Ed
At Vision in Birmingham, cutting-edge inventions and gadgets were showcased to assist the blind and visually impaired. These included computer keyboards with larger buttons and Braille computer pads, phones with larger buttons and...
Instructional Video3:54
Curated Video

Steps to plan a successfull pentest

Higher Ed
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Instructional Video3:59
Curated Video

How Does Port Scanning Work

Higher Ed
In this video, you will learn the two main techniques used in port scanning. We will be mainly using NMAP tool
Instructional Video2:57
Curated Video

Introducing NMAP

Higher Ed
NMAP is the classic network scanner, in this video we will deep dive into its features
Instructional Video1:50
Curated Video

LAB 11: NMAP Tool

Higher Ed
We will download and install ZENMAP, which is the GUI version of NMAP
Instructional Video7:05
Curated Video

Accessing and Treating the Brain and Nervous System: Scanning, Tumors, and Spinal Injuries

Higher Ed
The video discusses how the brain works, various methods to investigate its function, and the limitations of the treatments used for brain and spinal injuries. The video covers the use of CT scan and PET scan, highlighting their...
Instructional Video6:40
Brainwaves Video Anthology

Barry Joseph - Informal Science Learning in a Digital Age

Higher Ed
Barry Joseph is known as a changemaker who is passionately devoted to envisioning new ways digital media can "address significant personal and social issues." Since 2012 Joseph has worked as the Associate Director For Digital Learning at...
Instructional Video9:47
AllTime 10s

10 Strangest Underwater Discoveries

12th - Higher Ed
With so much of the earth's oceans being unmapped, there are certainly some strange things down there. . .
Instructional Video2:57
Curated Video

Explain web security : The Course Overview

Higher Ed
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Instructional Video6:16
Physics Girl

Are MRIs safe?

9th - 12th
Are there any dangers associated with receiving an MRI and how exactly does an MRI work? Is it safe? Medical imaging, specifically magnetic resonance imaging (MRI), has come so far that we can create high resolution images of the entire...
Instructional Video6:34
Curated Video

Explain web security : What is Reconnaissance?

Higher Ed
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks. The goal of this video is to get an overview of the first step of ethical hacking:...
Instructional Video12:06
Brave Wilderness

Frog Scavenger Hunt! - Can I Catch Them All?

6th - 8th
In this episode, Coyote is in Costa Rica to go on a frog scavenger hunt! Costa Rica is home to many diverse frog species, making it the perfect place for this scavenger hunt. The question is.. how many different species of frogs can...
Instructional Video1:52
Curated Video

Explain web security : Operating Systems and Tools Used

Higher Ed
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Instructional Video8:21
ACDC Leadership

Role of Government- EconMovies #12- The Terminator

12th - Higher Ed
In this episode of Econmovies, I discuss the role of the government and the two extremes of the economic spectrum: State Socialism and Neoliberalism. I also talk about the views of Milton Friedman. By the way, what did you think about...
Instructional Video6:18
Curated Video

Describe cyber attacks that could affect a computer system or network : Advanced-Level Hacking - Scanning Hosts with Python Script

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will consider using Python language in...