Instructional Video12:34
Curated Video

The Modern JavaScript Bootcamp (2019) - Handling User Interaction

Higher Ed
In this video, you’ll learn how to handle user interaction. This will allow us to respond to things the user does like clicking a button or entering some text in a field. This clip is from the chapter "Javascript in the Browser" of the...
Instructional Video12:01
National Parks Service

Everglades National Park - Catch and Release Techniques

Pre-K - Higher Ed
Video about catch and release techniques in Florida Bay.
Instructional Video3:13
Curated Video

PySpark and AWS: Master Big Data with PySpark and AWS - Applications of PySpark

Higher Ed
Let's explore the in-demand applications of Spark in this session. This clip is from the chapter "Introduction" of the series "PySpark and AWS: Master Big Data with PySpark and AWS".Welcome to the course. This section introduces you to...
Instructional Video14:09
Curated Video

Modern HTML and CSS from the Beginning (Including Sass) - Smartphone View

Higher Ed
EdgeLedger Website (Flexbox): Smartphone View This clip is from the chapter "EdgeLedger Website (Flexbox)" of the series "Modern HTML and CSS from the Beginning (Including Sass)".In this Section, we’ll learn about EdgeLedger Website.
Instructional Video14:14
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Post Exploitation Modules

Higher Ed
This video introduces you to exploitation modules. This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn how to hack and...
Instructional Video10:05
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Crafting Windows Payloads with Msfvenom

Higher Ed
This video teaches you about Msfvenom and how to craft Windows payloads using it. This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Instructional Video11:55
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Changing Directory

Higher Ed
In this video, you'll learn to change directories. This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn what an advanced...
Instructional Video14:10
The Wall Street Journal

What is the Real Cost of a Breach?

Higher Ed
WSJ's David Breg and Rob Sloan discuss how understanding the costs of a breach can help companies organize defenses and prioritize investments.
Instructional Video5:59
NASA

NASA | Making Hubble More Powerful

3rd - 11th
The Hubble Space Telescope would not be able to produce its breathtaking science without the upgraded infrastructure targeted during the HST SM4 mission: Fine Guidance Sensor, Scientific Instrument Command and Data Handling, Soft Capture...
Instructional Video23:57
Curated Video

Dive Into Ansible - From Beginner to Expert in Ansible - Ansible Playbooks- Breakdown of Sections

Higher Ed
This video explains the sections that make up a playbook. This clip is from the chapter "Ansible Playbooks Introduction" of the series "Dive Into Ansible - From Beginner to Expert in Ansible".This section provides an introduction to...
Instructional Video2:34
Curated Video

KS2 Primary Maths Age 13-17 - Calculations: Word Problems - Explained

3rd - 5th
SchoolOnline's Primary Maths videos are brilliant, bite-size tutorial videos delivered by examiners. Ideal for ages 9-13, they cover every key topic and sub topic covered in Maths in clear and easy to follow steps. This video looks at...
Instructional Video7:56
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Scanning with Zenmap

Higher Ed
In this video, you'll learn how to perform scanning using zenmap. This clip is from the chapter "Active Information Gathering and Port Scanning" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
Instructional Video6:50
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - The Theory Behind Reverse Shell

Higher Ed
This video discusses the theory behind the reverse shell session. This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn...
Instructional Video8:36
Curated Video

Linux Administration Bootcamp: Go from Beginner to Advanced - The Linux Boot Process

Higher Ed
This video explains the Linux boot process. This clip is from the chapter "The Linux Boot Process and System Logging" of the series "Linux Administration Bootcamp: Go from Beginner to Advanced".This section introduces you to the Linux...
Instructional Video13:08
Curated Video

Machine Learning Random Forest with Python from Scratch - Labels and Features

Higher Ed
In this lesson, we will look at a target or label as output data and feature, a measurable property or characteristic of an element. This clip is from the chapter "Introduction to Machine Learning" of the series "Machine Learning: Random...
Instructional Video2:43
Curated Video

Data Science and Machine Learning (Theory and Projects) A to Z - Introduction to Machine Learning: Supervised Learning

Higher Ed
In this video, we will cover supervised learning. This clip is from the chapter "Deep learning: Artificial Neural Networks with Python" of the series "Data Science and Machine Learning (Theory and Projects) A to Z".In this section, we...
Instructional Video0:40
The March of Time

British anti-air demo

12th - Higher Ed
MOT 1942: BRITISH ANTI-AIR DEMO: WS Sky w/ bomber airplane & bomb path drawn anti-aircraft cannon's missile path drawn animated bomber airplane on path animated anti-air missile on path airplane thrown off course bomb missing factory. WWII
Instructional Video6:21
Curated Video

Excel VBA Programming The Complete Guide - The Worksheet_SelectionChange Event

Higher Ed
The Worksheet_SelectionChange event is triggered when the user navigates to a different cell with a spreadsheet. In this lesson, we react our first Excel event and also explore the ByVal keyword in the automatically generated procedure....
Instructional Video17:25
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Bypassing Firewalls with Nmap

Higher Ed
In this video, you'll learn another use of Nmap—to bypass firewalls. This clip is from the chapter "Active Information Gathering and Port Scanning" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Instructional Video13:30
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Embedding Backdoor in Image Part 1

Higher Ed
In this video, you'll learn how to embed backdoor techniques in an image. This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll...
Instructional Video18:46
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Capturing Screenshot on Target PC

Higher Ed
In this video, you'll learn how to capture screenshots on the target PC. This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll...
Instructional Video11:31
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Windows 10 Privilege Escalation

Higher Ed
In this video, you'll learn about privilege escalation with Windows 10. This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll...
Instructional Video7:11
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Connection with Reverse Shell

Higher Ed
In this video, you'll learn how to connect with reverse shell. This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn what...
Instructional Video6:12
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Creating Persistence Part 1

Higher Ed
This video introduces you to persistence and how to create it. This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn what...