Instructional Video20:38
Step Back History

When White Supremacists Declared War on America

12th - Higher Ed
Born in the fires of Vietnam, the White Power movement decided in 1983 to overthrow the government of the United States. But to do so, you need recruits, weapons, organization, and money. This is how they tried to build it.
Instructional Video2:09
Visual Learning Systems

Exploring Blood Vessels

9th - 12th
This video explains the network of pipes in the human body, known as blood vessels. It describes the different types of vessels, including arteries, veins, and capillaries, and their functions in carrying oxygen-rich blood away from the...
Instructional Video9:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Authentication

Higher Ed
Older network authentication protocols such as Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP) have been deprecated in favor of protocols such as Kerberos and Extensible Authentication...
Instructional Video23:47
Institute for New Economic Thinking

Domenico Delli Gatti: Instability in Financial Markets 1/5

Higher Ed
Domenico Delli Gatti, Professor of Economics, Catholic University Milan speaking at the breakout panel entitled "Instability in Financial Markets: Sources and Remedies" at the Institute for New Economic Thinking's (INET) Paradigm Lost...
Instructional Video4:27
Curated Video

routing protocols : Benefits of link state routing and Drawbacks of link state routing

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Benefits of link state routing and...
Instructional Video9:19
IDG TECHtalk

Election security concerns: Voting machines, malware and misinformation

Higher Ed
Americans are days away from the 2020 Presidential Election and have been casting early ballots at an all-time high. Cybersecurity experts and election officials have probably implemented election security measures by now. But it’s not...
Instructional Video12:22
Institute for New Economic Thinking

Leanne Ussher and Sorin Solomon - Financial Fragility in a Network of Trade Credit

Higher Ed
The physicist Sorin Solomon begins to feel dizzy when the economist Leanne Ussher talks econ lingo. Yet he listens, because the two of them have found a productive area of collaboration: some economic phenomena, they find, can be...
Instructional Video15:55
Institute for New Economic Thinking

How Elite Financial Networks Rule the World

Higher Ed
The identities of the world’s most powerful people, and the corporations and institutions they run, are well known. What’s poorly understood is a key driving force behind elites’ power: their ability to build, and capitalize on,...
Instructional Video4:40
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Backdoor Attacks

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to...
Instructional Video3:33
Curated Video

routing protocols : OSPF Hierarchy - Multiple areas

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: OSPF Hierarchy - Multiple areas
Instructional Video8:57
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Log Files

Higher Ed
Log files can provide valuable insights related to suspicious network, host or application activity, but only if log file integrity can be ensured. Centralized logging in the enterprise on a secured logging host ensures an accurate copy...
Instructional Video3:47
Science360

New cyber-physical system enables drone-carried broadband in disaster zones - Science Nation

12th - Higher Ed
Networked UAVs: Arming drones with Wi-Fi to support emergency response With support from the National Science Foundation, electrical engineer Yan Wan and a team at the University of Texas at Arlington are developing a new generation of...
Instructional Video5:59
Curated Video

Bug Bounty Program Certification 3.1: Overview of Preparation Steps

Higher Ed
In this video, we will have a look at the preparation steps. • Explore various technologies • Learn about ports and services information • Explore vulnerability scanning and tools
Instructional Video7:08
IDG TECHtalk

How to deploy secure Windows computing resources remotely

Higher Ed
As remote work becomes more prevalent and, likely, permanent, you need secure deployment processes in place for devices connecting to Windows networks.
Instructional Video2:38
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 9 Exam Question Review

Higher Ed
Critical infrastructure IT systems can sometimes be vulnerable to attacks. In this episode, a scenario is presented in which the best solution must be implemented to protect Programmable Logic Controllers (PLCs). This clip is from the...
Instructional Video3:24
Curated Video

Describe cyber attacks that could affect a computer system or network : Overview of Network Security

Higher Ed
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Instructional Video2:54
Curated Video

Data Science and Machine Learning with R - Starting a Data Science Career Section Overview

Higher Ed
This video explains section overview of data science and career. This clip is from the chapter "Starting a Career in Data Science" of the series "Data Science and Machine Learning with R from A-Z Course [Updated for 2021]".This section...
Instructional Video7:58
Curated Video

CISSP®- Risk Management - Assessment Part 2

Higher Ed
This is the second part of a two-part video that shows how to assess and manage risks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Podcast17:19
NASA

‎The Invisible Network: 01. Ascension | NASA's The Invisible Network Podcast

Pre-K - Higher Ed
Just south of the equator lies a tiny plot of volcanic soil, a thousand miles from the nearest continent. This bizarre, remote island had mammoth importance to America’s first efforts in space.
Instructional Video8:21
Curated Video

Apache Maven Beginner to Guru - Introduction to Maven Settings

Higher Ed
This video introduces you to Maven settings. This clip is from the chapter "Maven Repositories" of the series "Apache Maven: Beginner to Guru".This section provides an explanation of Maven repositories.
Instructional Video2:20
APMonitor

Introduction to OT Cybersecurity

10th - Higher Ed
Cybersecurity is the protection of networks and computer systems, including hardware and software, against cyberattacks. Of particular interest to engineers is the computer control of physical systems that monitor and control...
Instructional Video28:47
The Wall Street Journal

Activists At The Office

Higher Ed
Employees at some of the world's largest companies are demanding equality and corporate action. The Memo LLC's Minda Harts and former Riot Games writer Indu Reddy discuss who today's CEOs answer to and what employees expect from...
Instructional Video2:32
Curated Video

Bug Bounty Program Certification 1.1: The Course Overview

Higher Ed
This video provides an overview of the entire course.
Instructional Video0:54
Next Animation Studio

LINE partnering with ICON to create blockchain ecosystem

12th - Higher Ed
Japan's largest messaging app LINE announced around mid-May a partnership with the South Korean blockchain project ICON.