Hi, what do you want to do?
Curated Video
I WONDER - How Do Dragons Guard Treasure?
This video is answering the question of how do dragons guard treasure.
Curated Video
What is Plagiarism and How Do I Avoid it?
In this video, I will explain plagiarism and how to avoid it! I will go through every example of plagiarism that I have seen as a teacher. Also, I feel like there are certain ideas NO ONE is talking about when it comes to plagiarism so...
Global Ethics Solutions
Care of Company Assets - Connecting Character (Part 2)
This is the second of a four-part course on respecting company assets. This section discusses the issues, myths, and problems of property rights as well as how our personal attitudes and character affects our ability to respect company...
Curated Video
Contestability and Perfectly Contestable Markets
In this video, the speaker discusses the concept of contestability in economics and its relevance to evaluating market structures. The speaker explains how perfectly contestable markets differ from perfectly competitive markets and how...
The Business Professor
Intentional Interference with Economic Relations
Intentional Interference with Economic Relations
Global Ethics Solutions
Confidentiality and Intellectual Property Tips and Actions for Success (Part 3)
Learn helpful tips for protecting confidential information and guidelines for reporting abuse.
Global Ethics Solutions
Stewardship of Company Assets: Connecting Character
This is the second of a four-part course on respecting company assets. This section discusses the issues, myths, and problems of property rights as well as how our personal attitudes and character affects our ability to respect company...
Schooling Online Kids
The Life Stage Series: Social Development - Tilly The Tooth Fairy
One night, Tilly the tooth fairy flies across the city to collect children’s baby teeth. She starts to feel distracted when she spots toys, teddy bears and pretty ribbons! Tilly’s fingers start to tingle and twitch… Will she take the...
Jabzy
French Campaign Against Korea - 3 Minute History
In this video, Jabzy brings us historical tidbits and unknown facts about the French Campaign Against Korea
Schooling Online
Shakespeare Today: Richard III - Act 3 Summary
Things are tense in the royal household. The Queen’s relatives and sons are in grave danger as Richard ramps up his plot for the English crown. Richard’s talent for deceit is his main weapon in his war against all those who stand in...
KERA
Student Juggles Classes, Work and Softball Team
A high-school senior at Duncanville High School in Texas is juggling classes with a part-time job and her role as manager of her school’s softball team. At home, she helps her mother pay the bills and cares for her younger brother. After...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Social Engineering Attacks
Social engineering attacks can take place over the phone, in person, or through technology. This episode discusses concepts such as spam, phishing and DNS URL redirection.
r/>
This clip is from the chapter "Testing...
r/>
This clip is from the chapter "Testing...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - The (ISC)2 Code of Ethics
This video explains the various ethics.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
Global Ethics Solutions
Confidentiality and Intellectual Property Tips and Actions for Success
Learn helpful tips for protecting confidential information and guidelines for reporting abuse.
Seven Dimensions
Office Security: Lessons Learned from a Theft
In this video, an employee addresses a theft that occurred in their office and emphasizes the importance of security. They propose implementing stricter measures, such as ID checks and security lists, to ensure that only authorized...
Executive Finance
Preventing Occupational Fraud: Key Findings and Reflections
This video summarizes key findings on occupational fraud and emphasizes the importance of recognizing fraud as a universal problem, establishing anti-fraud controls, and paying attention to red flags. The speaker also encourages...
Brainwaves Video Anthology
Dianne Bilyak Nothing Special [mostly true, sometimes funny tales of two sisters]
Dianne Bilyak is a Pushcart-prize nominated writer, graduate of the Institute of Sacred Music and Art, and Connecticut disability rights advocate. Her book of poems Against the Turning was published in 2011, and her work has also been...
Curated Video
Explain web security : Understand-ing Bit Hacker Jar-gon!
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether...
Out of this Word
Steals Your Thunder
Max tries to think of ideas for a school science fair project. He had one until a classmate overheard the idea and took it. Moon tells Max his classmate “stole his thunder.” We use the phrase to describe when a person takes credit for an...
Coach Dan Blewett
How to Hold Runners Better in Baseball - Ask Dan Blewett
Learn how to hold runners better in baseball, and prevent stolen bases and needless runs from scoring. In this video I cover a number of different concepts that all pitchers need to buy in to. Ultimately, the best pitchers allow fewer...
Rachel's English
How to Pronounce Christmas in American English -- Happy Holidays!
How to pronounce Christmas, plus tips from everyday conversation: the term "lucky duck", reducing "okay" to "k", dropping the H in word like "her". And, at the end you get to hear myself and my friends singing a verse of The First Noel!
Coach Dan Blewett
The Inside Move - Your #2 Pickoff to Second Base
The Inside move is a pickoff to second base that won't be used as your primary pick off move, but rather as one to catch runners who leave too soon or to reveal when a hitter is bunting.
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Physical security part 2
CISSP Domain 3: System Architecture and Engineering: Physical security part 2.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
IDG TECHtalk
How to prevent credential theft in Windows networks
Attackers covet credentials, and Windows admins sometimes make it too easy for them. Here’s how to harden Windows networks against credential theft.