Instructional Video1:28
Curated Video

Introduction to IT and Cybersecurity: Servers Essentials

Higher Ed
Part 3/16 of Introduction to IT and Cybersecurity series: This video discusses the concept of client-server and its importance in distributed application structures. Examples of client-server settings are LAN networks where a central...
Instructional Video3:15
Curated Video

Wireshark D4 V3 - UDP Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 3: UDP deep-dive
Instructional Video1:55
Curated Video

Ethical Hacking with Kali Linux Introduction

Higher Ed
This video is an introduction on ethical hacking
Instructional Video1:44
Curated Video

The Consequences of a Security Breach

Higher Ed
The effects can include database corruption or loss, the disclosure of private information, the theft of intellectual property, and legal obligations to warn and possibly recompense people impacted, depending on the type of data involved.
Instructional Video4:13
Curated Video

Blended Attacks

Higher Ed
A complex cyberattack described as a "blended attack" makes use of a variety of malicious malware, computer viruses, worms, or Trojan horses in addition to several vulnerabilities in hardware or software that the attacker is aware of.
Instructional Video7:22
Curated Video

Types of Malware

Higher Ed
Software that has malicious intentions is referred to as malware. There are many different kinds of malware, and each one has a different means of getting onto your computer. These methods can involve stealing your personal information,...
Instructional Video2:52
Curated Video

Bring Your Own Device (BYOD) Security

Higher Ed
The video highlights the security you need to implement when you bring your personal device to work
Instructional Video0:58
Curated Video

I WONDER - How Long Are The Blood Vessels?

Pre-K - 5th
This video is answering the question of how long are the blood vessels.
Instructional Video14:55
Curated Video

ISO 27001-2022 Technological controls

Higher Ed
In this video, we will be discussing the technological controls outlined in the latest version of the ISO 27001 standard, ISO 27001-2022. These controls are designed to help organizations protect their information assets from cyber...
Instructional Video4:33
Curated Video

MITRE ATTACK for iPhone

Higher Ed
In this video, we will be discussing MITRE ATTACK for Mobile Applications. MITRE ATT&CK is a globally recognized framework that helps organizations understand and categorize various types of cyber threats. In this video, we will be...
Instructional Video2:02
Visual Learning Systems

The Amazing Nervous System: Nervous System Overview

9th - 12th
From skiing down a steep mountain, to playing the piano, the nervous system enables us to accomplish remarkable tasks. This video focuses on the amazing structures in the nervous system that allows humans to maintain and carry out a wide...
Instructional Video10:30
Flipping Physics

Merry-Go-Round - Conservation of Angular Momentum Problem

12th - Higher Ed
A 25 kg child is sitting on the edge of a merry-go-round. The merry-go-round has a mass of 255 kg and is rotating at 2.0 radians per second. The child crawls to the middle of the merry-go-round. What is the final angular speed of the...
Instructional Video5:20
The Business Professor

Sources of Power in a Negotiation

Higher Ed
This Video Explains Sources of Power in a Negotiation
Instructional Video10:24
Flipping Physics

Finding the Force on a Ball from a Dent

12th - Higher Ed
Using the Work Energy Theorem to solve the following … A 67 N ball is dropped from a height of 79.8 cm above a bag of sand. If the ball makes a 9.0 mm deep dent in the sand, what is the average force the sand applies on the ball during...
Instructional Video7:53
Flipping Physics

Deriving the Work-Energy Theorem using Calculus

12th - Higher Ed
Use the integral and derivative to derive the Work-Energy Theorem or what I prefer to call the Net Work-Kinetic Energy Theorem.
Instructional Video8:30
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Third-Party Risk Management

Higher Ed
Some business activities cannot be completed entirely within an organization and must be outsourced. Ensuring that proper security safeguards are in place throughout the hardware, software, and personnel supply chain results in a...
Instructional Video6:44
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Industrial Control System (ICS)

Higher Ed
ICSs use computing devices to automate tasks in a fast dependable way using Programmable Logic Controllers (PLCs). This episode also covers Supervisory Control and Data Acquisition (SCADA). This clip is from the chapter "Securing...
Instructional Video9:23
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Security Controls

Higher Ed
Various security standards such as PCI DSS and the Cloud Controls Matrix (CCM) define what types of security controls to put in place to mitigate risk both on-premises and in the cloud. The specific type of attack vector determines...
Instructional Video3:13
Brainwaves Video Anthology

Jerry Mintz - Alternative Education

Higher Ed
Jerry Mintz has been a leading voice in the alternative school movement for over 30 years. In addition to his seventeen years as a public and independent alternative school principal and teacher, he has also helped found more than fifty...
Instructional Video8:24
Curated Video

routing protocols : Types of Routing Protocols -Distance Vector, Link State

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Types of Routing Protocols -Distance...
Instructional Video2:59
STAT

Donald Trump, the vitamin pitchman

6th - 11th
A STAT investigation found The Trump Network sold customized vitamins and scientific testing kits for about two years, claiming they would yield health benefits. But according to many outside experts, the network was selling bad science.
Instructional Video8:45
The Art Assignment

Artline Bling: Tattoos, Shia Labeouf, & Laughing at Art | The Art Assignment | PBS Digital Studios

9th - 12th
This week we answer your questions from our art hotline* and talk about the legitimacy of celebrity artists, the embarrassment of being called an "artist", why we laugh at art, and more.
Instructional Video4:06
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Categories of ML Tasks and Attacks

Higher Ed
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools. The aim of this video is to demonstrate that all approaches to solving...
Instructional Video4:56
Curated Video

Describe cyber attacks that could affect a computer system or network : Network Vulnerability Test Scope and Process

Higher Ed
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...