Instructional Video1:22
Curated Video

Blake Ross and the Firefox Revolution: Challenging Internet Explorer

Pre-K - Higher Ed
Blake Ross, a sophomore at Stanford University, is part of the developmental team behind Firefox, a revolutionary Internet browser aiming to challenge Microsoft's Internet Explorer. With customizable features, protection against pop-up...
Instructional Video6:07
Curated Video

Innovations and Celebrations: Self-Cooling Cans and Wacky Shaped Cars at the FIFA World Cup Park

6th - Higher Ed
This video transcript showcases two unique inventions - a self-cooling can that allows for a refreshing drink without the need for a refrigerator, and a football-shaped car designed to promote the FIFA World Cup. These inventions not...
Instructional Video11:06
Curated Video

Battle of Targoviste (Part 1/2) Vlad the Impaler Rises

6th - Higher Ed
Battle of Targoviste (Part 1/2) Vlad the Impaler Rises
Instructional Video4:32
Curated Video

David Beckham: From Football Legend to Global Brand

6th - Higher Ed
This video highlights the incredible fame and success of David Beckham, the world-renowned footballer, and his influential partnership with his wife, Victoria Beckham. It touches on the challenges they faced in the public eye, including...
Instructional Video5:46
Curated Video

Learning from Your Mistakes

10th - Higher Ed
We make mistakes all the time. Have you learned as much - maybe more - from the mistakes of your career, as from anything else? The only real mistake is getting things wrong, and not learning anything from your mistakes. Mistakes are...
Instructional Video3:30
Curated Video

Discovery Mode: Cheese or Owl?

10th - Higher Ed
If you want your team to solve problems more effectively, you need to get them into Discovery Mode. Put another way, is it to be Cheese or Owl? What I like about projects is the constant flow of problems. It isn't that I like the...
Instructional Video5:16
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Phishing Attacks

Higher Ed
Here, we will understand the concepts of phishing, how the attack is performed, the dangers of opening phishing emails, and how to prevent them.
Instructional Video2:41
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - How to Detect Email Tracking

Higher Ed
In this lesson, we will understand how to detect if someone is tracking your email and how to prevent that from happening.
Instructional Video1:12
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The World of Electronic Mails – Dangers, Attacks, and Protection

Higher Ed
This section focuses on emails, the dangers of not protecting the emails or opening dangerous emails, how hackers attack using emails, and how to protect yourself from being hacked by emails.
Instructional Video3:30
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Darknets

Higher Ed
In this video, we will look at some of the websites classified on the dark web that allows you to browse websites or post questions anonymously.
Instructional Video6:42
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Accessing the Dark Web with Tor

Higher Ed
This video talks about the dark web that conducts illegal activities with Tor. The author illustrates how to use the dark web.
Instructional Video6:06
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to Stylometry

Higher Ed
This video illustrates an application called Stylometry, which can determine if an anonymous document may or may not have been written by us.
Instructional Video5:14
Curated Video

Fundamentals of Object-Oriented Programming - C++ - Exception Handling

Higher Ed
In this video, you will learn about exception handling with try, throw, and catch functions. This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will learn about...
Instructional Video5:40
Curated Video

Fundamentals of Object-Oriented Programming - C++ - Classes and Objects

Higher Ed
In this video, you will learn about classes and objects with abstraction and encapsulation. This clip is from the chapter "Module 2" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, we will cover...
Instructional Video7:00
Curated Video

Practical Cyber Hacking Skills for Beginners - Launching a Combinator Attack

Higher Ed
Here, we will look at how the combinator attack is performed with the two text files required to complete the attack.
Instructional Video8:31
Curated Video

Practical Cyber Hacking Skills for Beginners - Setting Up Hashcat

Higher Ed
This lesson will teach us how to install and set up the Hashcat by changing the folder structures and deleting older hashtag versions.
Instructional Video5:00
Curated Video

Practical Cyber Hacking Skills for Beginners - Introduction to Zenmap

Higher Ed
This video demonstrates using Zenmap, the graphical user interface for NMAP, to scan different networks.
Instructional Video12:30
Curated Video

Practical Cyber Hacking Skills for Beginners - Scanning Techniques

Higher Ed
This video elaborates on NMAP's different techniques for scanning networks using the available network probes.
Instructional Video3:46
Curated Video

Practical Cyber Hacking Skills for Beginners - NMAP Port States

Higher Ed
This video will teach us about the six port states: open, closed, filtered, unfiltered, closed/filtered, and open/filtered.
Instructional Video8:36
Curated Video

Practical Cyber Hacking Skills for Beginners - Basics of NMAP

Higher Ed
After installing and configuring NMAP, we will look at how this NMAP scanning program works.
Instructional Video1:26
Curated Video

Practical Cyber Hacking Skills for Beginners - Section Preview-6

Higher Ed
This video briefly outlines the concepts you will learn in this section regarding NMAP, its installation, and its use.
Instructional Video6:00
Curated Video

Practical Cyber Hacking Skills for Beginners - Creating a Sample Outbound Rule

Higher Ed
In this lesson, we will look at creating a sample outbound rule; we will test it out by trying to block internet access by setting outbound rules for the Google Chrome browser.
Instructional Video7:06
Curated Video

Practical Cyber Hacking Skills for Beginners - Creating a LinkedIn Clone Site

Higher Ed
This video demonstrates how to clone the LinkedIn site.
Instructional Video4:14
Curated Video

Practical Cyber Hacking Skills for Beginners - BlackEye Update

Higher Ed
In this video, you will learn about a tool for phishing called the blackeye.