Instructional Video6:05
IDG TECHtalk

How to protect your Windows network login credentials

Higher Ed
Recent hacks show that attackers will search for network login credentials in many ways. Make them harder to get.
Instructional Video5:15
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Scanners

Higher Ed
How do attackers discover networks and hosts? Network scanners such as Nmap are used by attackers as well as legitimate security technicians to perform network reconnaissance. This clip is from the chapter "Tools of the Trade" of the...
Instructional Video4:38
The Business Professor

Understanding Cost-Volume-Profit Analysis and its Key Metrics

Higher Ed
This video explains the concept of cost volume profit (CVP) analysis and the relationships between various metrics used in this analysis. The video delves into key metrics such as contribution margin, net income, variable expense ratio,...
Instructional Video4:34
Curated Video

Mastering Grunt (Video 16)

Higher Ed
Grunt is everywhere. From JavaScript projects in jQuery to Twitter Bootstrap, everyone's using Grunt to convert code, run tests, and produce distributions for production. Web development activities are marked by repetitive tasks such as...
Instructional Video5:21
Curated Video

Mastering Grunt (Video 15)

Higher Ed
Grunt is everywhere. From JavaScript projects in jQuery to Twitter Bootstrap, everyone's using Grunt to convert code, run tests, and produce distributions for production. Web development activities are marked by repetitive tasks such as...
Instructional Video0:55
Prime Coaching Sport

Underarm throws (grade K-3) | Throwing & catching › Teaching Fundamentals of PE

K - 5th
How to teach underarm throws to your students at elementary school
Instructional Video23:38
The Wall Street Journal

Navigating the Influencer Economy

Higher Ed
Influencers Tinx and Boman Martinez-Reid talk about the promise and peril of social media and the path to building a community online.
Instructional Video7:46
Packt

Deleting Documents

Higher Ed
MongoDB and Promises (Task App): Deleting Documents This clip is from the chapter "MongoDB and Promises (Task App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In this section, you will learn about MongoDb
Instructional Video14:44
Packt

Bonus - Add Local Storage

Higher Ed
OOP Book List Project: Bonus - Add Local Storage This clip is from the chapter "OOP Book List Project" of the series "Modern JavaScript from the Beginning".In this section, you will learn how to build the book list UI, add book to list,...
Instructional Video6:39
NASA

Arriving at Asteroid Bennu

3rd - 11th
Asteroids are the leftover building blocks of the solar system, remnants from the dawn of planet formation that may have delivered organics and water to early Earth, and which could hold clues to the origins of life. Now, a NASA mission...
Instructional Video8:06
Curated Video

Apache Maven Beginner to Guru - Compiling and Packaging with Maven

Higher Ed
This video demonstrates how to compile and package with Maven. This clip is from the chapter "Getting Started with Maven" of the series "Apache Maven: Beginner to Guru".This section highlights the concept of compiling, packaging, along...
Instructional Video4:25
Curated Video

DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK, JIRA - Jenkins Tomcat Deploy Script

Higher Ed
In this video, you will be able to configure the curl requests to deploy to Tomcat. • For Windows users there is slight deviation on CURL script. Do ensure that you download CURL to a C drive (eg..c:\devops\curl) and set in the path. If...
Instructional Video3:56
Curated Video

Advanced Swift 2 Application Development (Video 24)

Higher Ed
The number of smartphone users is increasing every single day, and as more and more of them are looking for new and interesting ways to improve their lives through mobile applications, the need for a language that will deploy on all...
Instructional Video7:38
The Backyard Scientist

Fortnite Boom Bow IRL - BOOM or BUST?

K - 5th
How could you pass up trying a Boom Bow IRL? It was fun, and a noise maker for sure!
Instructional Video1:19
Prime Coaching Sport

Forehand swing | Striking › Teaching Fundamentals of PE

K - 5th
How to teach the tennis forehand swing to your students at elementary school
Instructional Video7:40
Curated Video

Describe cyber attacks that could affect a computer system or network : Scanning the Network with OpenVas

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will know how to find vulnerabilities...
Instructional Video13:44
Curated Video

AZ-104: Microsoft Azure Administrator Full Course - Azure Site Recovery - Replication Lab

Higher Ed
In this video, we will cover Azure site recovery - replication lab. This clip is from the chapter "Data Protection" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains data protection and its agenda...
Instructional Video9:21
Curated Video

The Full Stack Web Development - Create Database & Docs In Fauxton - Project in Couch DB

Higher Ed
Learning CouchDB: Create Database & Docs In Fauxton - Project in Couch DB This clip is from the chapter "Learning CouchDB" of the series "The Full Stack Web Development".For CouchDB which is also no SQL database, we will checkout Fauxton...
Instructional Video4:26
Curated Video

Learning Akka (Video 39)

Higher Ed
Akka helps you to build scalable, resilient, and fault-tolerant distributed systems that can provide outstanding performance on local machines as well as over remote networks. Employing the actor model, it is possible to leverage these...
Instructional Video11:13
Curated Video

Bug Bounty Program Certification 7.5: Install Acunetix Web Vulnerability Scanner

Higher Ed
This video will help you understand web scanning using Acunetix web vulnerability scanner. • Download Acunetix web vulnerability scanner • Installation of web scanner • Reporting of vulnerabilities
Instructional Video8:06
Curated Video

Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video3:36
NASA

NASA | Birth of a Space Laser Instrument

3rd - 11th
A new C02 laser, which will globally measure carbon dioxide from space, is due to be launched in 2023 on the ASCENDS mission. One of the exciting things about this project is that you can actually watch trees eat and breathe. Of course,...
Instructional Video1:00
Next Animation Studio

U.S. sending ‘kamikaze’ Switchblade drones to Ukraine (with VO)

12th - Higher Ed
The U.S. is sending 100 ‘kamikaze drones’ to Ukraine to help fight off the Russian invasion
Instructional Video6:43
Curated Video

Excel VBA Programming The Complete Guide - Methods with Multiple Arguments

Higher Ed
Some object methods can accept multiple arguments. In this lesson, we continue exploring the Workbooks.Open method and two of its parameters -- FileName and ReadOnly. Arguments can be fed in sequentially or with named parameters -- both...