Instructional Video2:10
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Hardening - Randomizing the MAC Address

Higher Ed
Another step of hardening the Windows 10 OS is randomizing the MAC address, which is usually a unique number for each PC.
Instructional Video5:21
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Hubs, Switches, and Routers

Higher Ed
This video will look at hubs, switches, and routers, how they connect to network devices, and how they establish network connections.
Instructional Video8:36
Curated Video

Practical Cyber Hacking Skills for Beginners - Basics of NMAP

Higher Ed
After installing and configuring NMAP, we will look at how this NMAP scanning program works.
Instructional Video6:37
Curated Video

Practical Cyber Hacking Skills for Beginners - Hardening Networks

Higher Ed
Here, you will learn how to harden networks. What devices and protocols are available to harden a network from being hacked?
Instructional Video2:12
Curated Video

Practical Cyber Hacking Skills for Beginners - Section Preview-5

Higher Ed
This video briefly outlines the section concepts, including a typical home network setup, DHCP and DNS, commands used in them, TCP versus UDP, and firewalls and hardening networks to prevent attacks.
Instructional Video3:35
Curated Video

Flaws in the Internet's Border Gateway Protocol

12th - Higher Ed
The White House recently unveiled a plan to deal with networking weaknesses in the Border Gateway Protocol. In the past, the BGP has been exploited or misconfigured to cause massive disruptions on the Internet. Topics Covered: Biggest...
Instructional Video9:35
Curated Video

Golgi apparatus: structure and function

9th - Higher Ed
In this video, we delve into the inner workings of a vital cellular organelle, the golgi apparatus, also know as golgi complex and golgi body. Join us as we unravel the Golgi apparatus's structure, functions, and its pivotal role in...
Instructional Video11:49
Curated Video

Investigating Values

12th - Higher Ed
Eight renowned researchers in different disciplines provide real-world examples of the relevance of Theory of Knowledge (TOK) concepts in their research. This TOK Sampler explores different aspects of how we ground, justify,...
Instructional Video3:00
Curated Video

Fungi

6th - 12th
Discover the magical world of fungi. Neither plant nor animal, they are a separate classification of living organism. Biology - Ecosystems - Learning Points. Fungi are neither plant nor animal. Most fungi are made up of networks of...
Instructional Video2:48
Curated Video

A Global Village

6th - 12th
An insight into Marshall McLuhan's theory of "the global village", and the impacts of improving global communications networks, both good and bad. Human Geography - A Changing World - Learning Points. The term 'Global Village' was coined...
Instructional Video3:09
Curated Video

Transport Networks - Global Trade Routes

6th - 12th
What are transport networks, and what impact do they have on global trade routes and patterns? Human Geography - A Changing World - Learning Points. Modern transport networks are fundamental to societies and economies. Transport systems...
Instructional Video4:40
Wonderscape

The Forest Ecosystem: Understanding Community and Cooperation Among Trees

K - 5th
Dive into the complex world of forest ecosystems where trees, animals, and fungi form interconnected communities. Learn about the various forest types, from tropical rainforests to boreal forests, and explore how diverse species...
Instructional Video3:37
Science Buddies

Simple Explanation of Neural Networks

K - 5th
Tracy from Science Buddies guides you through the basics of neuron networks used in machine learning. Discover how neurons and layers work together to process information and make predictions, from image recognition to language...
Instructional Video8:01
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Using VPNs

Higher Ed
In this video, you will learn about a security tool called Virtual Private Network or a VPN, which is used to provide a secure connection to another network over the Internet.
<
br/>
This clip is from the chapter "Internet and...
Instructional Video5:37
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Social Engineering

Higher Ed
Social engineering practices enable attackers to gain access to sensitive information through people. This video highlights social engineering tactics, from tailgating to spear phishing.
<
br/>
This clip is from the chapter...
Instructional Video7:54
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Dealing with Threats

Higher Ed
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This video covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Instructional Video7:46
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Virtual Private Networks (VPNs)

Higher Ed
In this video, Author shows how Virtual Private Networks (VPNs) work and why people use VPN connections. He discusses the types of protocols and clients that make this work today and walks through a generic VPN setup.
<
br/>
This...
Instructional Video8:30
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Connecting to a Wi-Fi Network

Higher Ed
The best 80 2.11 network is useless unless your users can connect to it. Smartphones, desktops, IoT devices, and other networked gizmos need to be individually configured to access your 802.11 networks.
<
br/>
This clip is from the...
Instructional Video10:56
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Basic WAP Setup

Higher Ed
The standard wireless access point (WAP) doesn't just work out of the box. It's important to understand how to perform a basic setup for a WAP to make sure it operates properly in your network.
<
br/>
This clip is from the chapter...
Instructional Video7:41
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Windows Firewall

Higher Ed
Like all operating systems, Windows comes with a built-in software firewall. Unlike the firewall on your router, this firewall only protects a single system. It's important for techs – and the users they support – to understand how to...
Instructional Video11:36
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Advanced Virtualization Setup

Higher Ed
Mike describes the process of changing one or more VMs, such as modifying the number and size of mass storage available. You can use a VM to explore the many options available in Disk Management with multiple drives. The episode also...
Instructional Video7:45
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Virtual Private Networks (VPNs)

Higher Ed
In this episode, Mike shows how Virtual Private Networks (VPNs) work and why people use VPN connections. He discusses the types of protocols and clients that make this work today and walks through a generic VPN setup.
<
br/>
This...
Instructional Video6:54
Curated Video

CISSP Crash Course - Federated Identities

Higher Ed
This video explains centralized versus decentralized identities.
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and...
Instructional Video8:12
Curated Video

Oracle Database Administration from Zero to Hero - Using Database Links (Part 1 of 2)

Higher Ed
In this video, we will explore the usage of database links. You will learn about database links, their types, and users, as well as understand naming database links.
<
br/>
This clip is from the chapter "Managing Database...