Instructional Video18:10
TED Talks

Nicholas Christakis: The hidden influence of social networks

12th - Higher Ed
We're all embedded in vast social networks of friends, family, co-workers and more. Nicholas Christakis tracks how a wide variety of traits -- from happiness to obesity -- can spread from person to person, showing how your location in...
Instructional Video11:29
Crash Course

Neural Networks and Deep Learning

12th - Higher Ed
Today, we're going to combine the artificial neuron we created last week into an artificial neural network. Artificial neural networks are better than other methods for more complicated tasks like image recognition, and the key to their...
Instructional Video4:58
TED-Ed

TED-Ed: How does your brain respond to pain? - Karen D. Davis

Pre-K - Higher Ed
Everyone experiences pain -- but why do some people react to the same painful stimulus in different ways? And what exactly is pain, anyway? Karen D. Davis walks you through your brain on pain, illuminating why the "pain experience"...
Instructional Video11:13
SciShow

How the Internet Was Invented | The History of the Internet, Part 1

12th - Higher Ed
The Internet is older than you might think!
Instructional Video9:51
SciShow

How the Web Became a Thing | The History of the Internet, Part 2

12th - Higher Ed
In part 2 of our History of the Internet series, Hank explains how public access became declared a human right!
Instructional Video5:18
SciShow

How Close Are We to the Perfect Deepfake?

12th - Higher Ed
Thanks to deepfakes, CGI can be more realistic and even amateurs can easily create some fun footage. But there are also sinister uses out there.
Instructional Video11:42
Crash Course

Computer Networks: Crash Course Computer Science

12th - Higher Ed
Today we start a three episode arc on the rise of a global telecommunications network that changed the world forever. We’re going to begin with computer networks, and how they grew from small groups of connected computers on LAN networks...
Instructional Video6:57
Brainwaves Video Anthology

Andy Hargreaves - Leadership from the Middle: The Beating Heart of Educational Transformation

Higher Ed
Andy Hargreaves is Visiting Professor at the University of Ottawa in Canada and Research Professor at Boston College in the US. He is an elected member of the US National Academy of Education, former President of the International...
Instructional Video2:10
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Hardening - Randomizing the MAC Address

Higher Ed
Another step of hardening the Windows 10 OS is randomizing the MAC address, which is usually a unique number for each PC.
Instructional Video5:21
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Hubs, Switches, and Routers

Higher Ed
This video will look at hubs, switches, and routers, how they connect to network devices, and how they establish network connections.
Instructional Video8:36
Curated Video

Practical Cyber Hacking Skills for Beginners - Basics of NMAP

Higher Ed
After installing and configuring NMAP, we will look at how this NMAP scanning program works.
Instructional Video6:37
Curated Video

Practical Cyber Hacking Skills for Beginners - Hardening Networks

Higher Ed
Here, you will learn how to harden networks. What devices and protocols are available to harden a network from being hacked?
Instructional Video2:12
Curated Video

Practical Cyber Hacking Skills for Beginners - Section Preview-5

Higher Ed
This video briefly outlines the section concepts, including a typical home network setup, DHCP and DNS, commands used in them, TCP versus UDP, and firewalls and hardening networks to prevent attacks.
Instructional Video9:35
Curated Video

Golgi apparatus: structure and function

9th - Higher Ed
In this video, we delve into the inner workings of a vital cellular organelle, the golgi apparatus, also know as golgi complex and golgi body. Join us as we unravel the Golgi apparatus's structure, functions, and its pivotal role in...
Instructional Video3:00
Curated Video

Fungi

6th - 12th
Discover the magical world of fungi. Neither plant nor animal, they are a separate classification of living organism. Biology - Ecosystems - Learning Points. Fungi are neither plant nor animal. Most fungi are made up of networks of...
Instructional Video2:48
Curated Video

A Global Village

6th - 12th
An insight into Marshall McLuhan's theory of "the global village", and the impacts of improving global communications networks, both good and bad. Human Geography - A Changing World - Learning Points. The term 'Global Village' was coined...
Instructional Video3:09
Curated Video

Transport Networks - Global Trade Routes

6th - 12th
What are transport networks, and what impact do they have on global trade routes and patterns? Human Geography - A Changing World - Learning Points. Modern transport networks are fundamental to societies and economies. Transport systems...
Instructional Video4:40
Wonderscape

The Forest Ecosystem: Understanding Community and Cooperation Among Trees

K - 5th
Dive into the complex world of forest ecosystems where trees, animals, and fungi form interconnected communities. Learn about the various forest types, from tropical rainforests to boreal forests, and explore how diverse species coexist...
Instructional Video3:37
Science Buddies

Simple Explanation of Neural Networks

K - 5th
Tracy from Science Buddies guides you through the basics of neuron networks used in machine learning. Discover how neurons and layers work together to process information and make predictions, from image recognition to language...
Instructional Video8:01
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Using VPNs

Higher Ed
In this video, you will learn about a security tool called Virtual Private Network or a VPN, which is used to provide a secure connection to another network over the Internet. This clip is from the chapter "Internet and Browsing...
Instructional Video5:37
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Social Engineering

Higher Ed
Social engineering practices enable attackers to gain access to sensitive information through people. This video highlights social engineering tactics, from tailgating to spear phishing. This clip is from the chapter "Securing Computers"...
Instructional Video7:54
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Dealing with Threats

Higher Ed
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This video covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Instructional Video7:46
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Virtual Private Networks (VPNs)

Higher Ed
In this video, Author shows how Virtual Private Networks (VPNs) work and why people use VPN connections. He discusses the types of protocols and clients that make this work today and walks through a generic VPN setup. This clip is from...
Instructional Video8:30
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Connecting to a Wi-Fi Network

Higher Ed
The best 80 2.11 network is useless unless your users can connect to it. Smartphones, desktops, IoT devices, and other networked gizmos need to be individually configured to access your 802.11 networks. This clip is from the chapter...