Hi, what do you want to do?
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Hardening - Randomizing the MAC Address
Another step of hardening the Windows 10 OS is randomizing the MAC address, which is usually a unique number for each PC.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Hubs, Switches, and Routers
This video will look at hubs, switches, and routers, how they connect to network devices, and how they establish network connections.
Curated Video
Practical Cyber Hacking Skills for Beginners - Basics of NMAP
After installing and configuring NMAP, we will look at how this NMAP scanning program works.
Curated Video
Practical Cyber Hacking Skills for Beginners - Hardening Networks
Here, you will learn how to harden networks. What devices and protocols are available to harden a network from being hacked?
Curated Video
Practical Cyber Hacking Skills for Beginners - Section Preview-5
This video briefly outlines the section concepts, including a typical home network setup, DHCP and DNS, commands used in them, TCP versus UDP, and firewalls and hardening networks to prevent attacks.
Curated Video
Flaws in the Internet's Border Gateway Protocol
The White House recently unveiled a plan to deal with networking weaknesses in the Border Gateway Protocol. In the past, the BGP has been exploited or misconfigured to cause massive disruptions on the Internet. Topics Covered: Biggest...
Curated Video
Golgi apparatus: structure and function
In this video, we delve into the inner workings of a vital cellular organelle, the golgi apparatus, also know as golgi complex and golgi body. Join us as we unravel the Golgi apparatus's structure, functions, and its pivotal role in...
Curated Video
Investigating Values
Eight renowned researchers in different disciplines provide real-world examples of the relevance of Theory of Knowledge (TOK) concepts in their research. This TOK Sampler explores different aspects of how we ground, justify,...
Curated Video
Fungi
Discover the magical world of fungi. Neither plant nor animal, they are a separate classification of living organism. Biology - Ecosystems - Learning Points. Fungi are neither plant nor animal. Most fungi are made up of networks of...
Curated Video
A Global Village
An insight into Marshall McLuhan's theory of "the global village", and the impacts of improving global communications networks, both good and bad. Human Geography - A Changing World - Learning Points. The term 'Global Village' was coined...
Curated Video
Transport Networks - Global Trade Routes
What are transport networks, and what impact do they have on global trade routes and patterns? Human Geography - A Changing World - Learning Points. Modern transport networks are fundamental to societies and economies. Transport systems...
Wonderscape
The Forest Ecosystem: Understanding Community and Cooperation Among Trees
Dive into the complex world of forest ecosystems where trees, animals, and fungi form interconnected communities. Learn about the various forest types, from tropical rainforests to boreal forests, and explore how diverse species...
Science Buddies
Simple Explanation of Neural Networks
Tracy from Science Buddies guides you through the basics of neuron networks used in machine learning. Discover how neurons and layers work together to process information and make predictions, from image recognition to language...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Using VPNs
In this video, you will learn about a security tool called Virtual Private Network or a VPN, which is used to provide a secure connection to another network over the Internet.
<
br/>
This clip is from the chapter "Internet and...
<
br/>
This clip is from the chapter "Internet and...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Social Engineering
Social engineering practices enable attackers to gain access to sensitive information through people. This video highlights social engineering tactics, from tailgating to spear phishing.
<
br/>
This clip is from the chapter...
<
br/>
This clip is from the chapter...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Dealing with Threats
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This video covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Virtual Private Networks (VPNs)
In this video, Author shows how Virtual Private Networks (VPNs) work and why people use VPN connections. He discusses the types of protocols and clients that make this work today and walks through a generic VPN setup.
<
br/>
This...
<
br/>
This...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Connecting to a Wi-Fi Network
The best 80 2.11 network is useless unless your users can connect to it. Smartphones, desktops, IoT devices, and other networked gizmos need to be individually configured to access your 802.11 networks.
<
br/>
This clip is from the...
<
br/>
This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Basic WAP Setup
The standard wireless access point (WAP) doesn't just work out of the box. It's important to understand how to perform a basic setup for a WAP to make sure it operates properly in your network.
<
br/>
This clip is from the chapter...
<
br/>
This clip is from the chapter...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Windows Firewall
Like all operating systems, Windows comes with a built-in software firewall. Unlike the firewall on your router, this firewall only protects a single system. It's important for techs – and the users they support – to understand how to...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Advanced Virtualization Setup
Mike describes the process of changing one or more VMs, such as modifying the number and size of mass storage available. You can use a VM to explore the many options available in Disk Management with multiple drives. The episode also...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Virtual Private Networks (VPNs)
In this episode, Mike shows how Virtual Private Networks (VPNs) work and why people use VPN connections. He discusses the types of protocols and clients that make this work today and walks through a generic VPN setup.
<
br/>
This...
<
br/>
This...
Curated Video
CISSP Crash Course - Federated Identities
This video explains centralized versus decentralized identities.
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and...
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and...
Curated Video
Oracle Database Administration from Zero to Hero - Using Database Links (Part 1 of 2)
In this video, we will explore the usage of database links. You will learn about database links, their types, and users, as well as understand naming database links.
<
br/>
This clip is from the chapter "Managing Database...
<
br/>
This clip is from the chapter "Managing Database...