Curated Video
The Modern JavaScript Bootcamp (2019) - Handling User Interaction
In this video, you’ll learn how to handle user interaction. This will allow us to respond to things the user does like clicking a button or entering some text in a field. This clip is from the chapter "Javascript in the Browser" of the...
National Parks Service
Everglades National Park - Catch and Release Techniques
Video about catch and release techniques in Florida Bay.
Curated Video
PySpark and AWS: Master Big Data with PySpark and AWS - Applications of PySpark
Let's explore the in-demand applications of Spark in this session. This clip is from the chapter "Introduction" of the series "PySpark and AWS: Master Big Data with PySpark and AWS".Welcome to the course. This section introduces you to...
Curated Video
Modern HTML and CSS from the Beginning (Including Sass) - Smartphone View
EdgeLedger Website (Flexbox): Smartphone View This clip is from the chapter "EdgeLedger Website (Flexbox)" of the series "Modern HTML and CSS from the Beginning (Including Sass)".In this Section, we’ll learn about EdgeLedger Website.
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Post Exploitation Modules
This video introduces you to exploitation modules. This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn how to hack and...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Crafting Windows Payloads with Msfvenom
This video teaches you about Msfvenom and how to craft Windows payloads using it. This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Changing Directory
In this video, you'll learn to change directories. This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn what an advanced...
The Wall Street Journal
What is the Real Cost of a Breach?
WSJ's David Breg and Rob Sloan discuss how understanding the costs of a breach can help companies organize defenses and prioritize investments.
NASA
NASA | Making Hubble More Powerful
The Hubble Space Telescope would not be able to produce its breathtaking science without the upgraded infrastructure targeted during the HST SM4 mission: Fine Guidance Sensor, Scientific Instrument Command and Data Handling, Soft Capture...
Curated Video
Dive Into Ansible - From Beginner to Expert in Ansible - Ansible Playbooks- Breakdown of Sections
This video explains the sections that make up a playbook. This clip is from the chapter "Ansible Playbooks Introduction" of the series "Dive Into Ansible - From Beginner to Expert in Ansible".This section provides an introduction to...
Curated Video
KS2 Primary Maths Age 13-17 - Calculations: Word Problems - Explained
SchoolOnline's Primary Maths videos are brilliant, bite-size tutorial videos delivered by examiners. Ideal for ages 9-13, they cover every key topic and sub topic covered in Maths in clear and easy to follow steps. This video looks at...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Scanning with Zenmap
In this video, you'll learn how to perform scanning using zenmap. This clip is from the chapter "Active Information Gathering and Port Scanning" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - The Theory Behind Reverse Shell
This video discusses the theory behind the reverse shell session. This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn...
Curated Video
Linux Administration Bootcamp: Go from Beginner to Advanced - The Linux Boot Process
This video explains the Linux boot process. This clip is from the chapter "The Linux Boot Process and System Logging" of the series "Linux Administration Bootcamp: Go from Beginner to Advanced".This section introduces you to the Linux...
Curated Video
Machine Learning Random Forest with Python from Scratch - Labels and Features
In this lesson, we will look at a target or label as output data and feature, a measurable property or characteristic of an element. This clip is from the chapter "Introduction to Machine Learning" of the series "Machine Learning: Random...
Curated Video
Data Science and Machine Learning (Theory and Projects) A to Z - Introduction to Machine Learning: Supervised Learning
In this video, we will cover supervised learning. This clip is from the chapter "Deep learning: Artificial Neural Networks with Python" of the series "Data Science and Machine Learning (Theory and Projects) A to Z".In this section, we...
The March of Time
British anti-air demo
MOT 1942: BRITISH ANTI-AIR DEMO: WS Sky w/ bomber airplane & bomb path drawn anti-aircraft cannon's missile path drawn animated bomber airplane on path animated anti-air missile on path airplane thrown off course bomb missing factory. WWII
Curated Video
Excel VBA Programming The Complete Guide - The Worksheet_SelectionChange Event
The Worksheet_SelectionChange event is triggered when the user navigates to a different cell with a spreadsheet. In this lesson, we react our first Excel event and also explore the ByVal keyword in the automatically generated procedure....
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Bypassing Firewalls with Nmap
In this video, you'll learn another use of Nmap—to bypass firewalls. This clip is from the chapter "Active Information Gathering and Port Scanning" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Embedding Backdoor in Image Part 1
In this video, you'll learn how to embed backdoor techniques in an image. This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Capturing Screenshot on Target PC
In this video, you'll learn how to capture screenshots on the target PC. This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Windows 10 Privilege Escalation
In this video, you'll learn about privilege escalation with Windows 10. This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Connection with Reverse Shell
In this video, you'll learn how to connect with reverse shell. This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn what...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Creating Persistence Part 1
This video introduces you to persistence and how to create it. This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn what...