Curated Video
Introduction to IT and Cybersecurity: Servers Essentials
Part 3/16 of Introduction to IT and Cybersecurity series: This video discusses the concept of client-server and its importance in distributed application structures. Examples of client-server settings are LAN networks where a central...
Curated Video
Wireshark D4 V3 - UDP Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 3: UDP deep-dive
Curated Video
Ethical Hacking with Kali Linux Introduction
This video is an introduction on ethical hacking
Curated Video
The Consequences of a Security Breach
The effects can include database corruption or loss, the disclosure of private information, the theft of intellectual property, and legal obligations to warn and possibly recompense people impacted, depending on the type of data involved.
Curated Video
Blended Attacks
A complex cyberattack described as a "blended attack" makes use of a variety of malicious malware, computer viruses, worms, or Trojan horses in addition to several vulnerabilities in hardware or software that the attacker is aware of.
Curated Video
Types of Malware
Software that has malicious intentions is referred to as malware. There are many different kinds of malware, and each one has a different means of getting onto your computer. These methods can involve stealing your personal information,...
Curated Video
Bring Your Own Device (BYOD) Security
The video highlights the security you need to implement when you bring your personal device to work
Curated Video
I WONDER - How Long Are The Blood Vessels?
This video is answering the question of how long are the blood vessels.
Curated Video
ISO 27001-2022 Technological controls
In this video, we will be discussing the technological controls outlined in the latest version of the ISO 27001 standard, ISO 27001-2022. These controls are designed to help organizations protect their information assets from cyber...
Curated Video
MITRE ATTACK for iPhone
In this video, we will be discussing MITRE ATTACK for Mobile Applications. MITRE ATT&CK is a globally recognized framework that helps organizations understand and categorize various types of cyber threats. In this video, we will be...
Visual Learning Systems
The Amazing Nervous System: Nervous System Overview
From skiing down a steep mountain, to playing the piano, the nervous system enables us to accomplish remarkable tasks. This video focuses on the amazing structures in the nervous system that allows humans to maintain and carry out a wide...
Flipping Physics
Merry-Go-Round - Conservation of Angular Momentum Problem
A 25 kg child is sitting on the edge of a merry-go-round. The merry-go-round has a mass of 255 kg and is rotating at 2.0 radians per second. The child crawls to the middle of the merry-go-round. What is the final angular speed of the...
The Business Professor
Sources of Power in a Negotiation
This Video Explains Sources of Power in a Negotiation
Flipping Physics
Finding the Force on a Ball from a Dent
Using the Work Energy Theorem to solve the following … A 67 N ball is dropped from a height of 79.8 cm above a bag of sand. If the ball makes a 9.0 mm deep dent in the sand, what is the average force the sand applies on the ball during...
Flipping Physics
Deriving the Work-Energy Theorem using Calculus
Use the integral and derivative to derive the Work-Energy Theorem or what I prefer to call the Net Work-Kinetic Energy Theorem.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Third-Party Risk Management
Some business activities cannot be completed entirely within an organization and must be outsourced. Ensuring that proper security safeguards are in place throughout the hardware, software, and personnel supply chain results in a...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Industrial Control System (ICS)
ICSs use computing devices to automate tasks in a fast dependable way using Programmable Logic Controllers (PLCs). This episode also covers Supervisory Control and Data Acquisition (SCADA). This clip is from the chapter "Securing...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Security Controls
Various security standards such as PCI DSS and the Cloud Controls Matrix (CCM) define what types of security controls to put in place to mitigate risk both on-premises and in the cloud. The specific type of attack vector determines...
Brainwaves Video Anthology
Jerry Mintz - Alternative Education
Jerry Mintz has been a leading voice in the alternative school movement for over 30 years. In addition to his seventeen years as a public and independent alternative school principal and teacher, he has also helped found more than fifty...
Curated Video
routing protocols : Types of Routing Protocols -Distance Vector, Link State
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Types of Routing Protocols -Distance...
STAT
Donald Trump, the vitamin pitchman
A STAT investigation found The Trump Network sold customized vitamins and scientific testing kits for about two years, claiming they would yield health benefits. But according to many outside experts, the network was selling bad science.
The Art Assignment
Artline Bling: Tattoos, Shia Labeouf, & Laughing at Art | The Art Assignment | PBS Digital Studios
This week we answer your questions from our art hotline* and talk about the legitimacy of celebrity artists, the embarrassment of being called an "artist", why we laugh at art, and more.
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Categories of ML Tasks and Attacks
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools. The aim of this video is to demonstrate that all approaches to solving...
Curated Video
Describe cyber attacks that could affect a computer system or network : Network Vulnerability Test Scope and Process
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...