Curated Video
These are the types of bones in your body
There is more than one type of bone in the human body. Anatomists usually consider 5 different types, based on structure and function. Histologically, we can even split them into 2, or more. In this video, you'll meet all the types of...
Curated Video
4 Types of Project Risk - Different Forms of Uncertainty
A project risk is simply ‘uncertainty that can affect outcome’. And when we classify risks, we focus on the types of impact that they can have: - Schedule - Budget - Technology - People - Compliance - Political… - Etc We rarely think of...
Curated Video
I WONDER - What Are Stem Cells?
This video is answering the question of what are stem cells.
Curated Video
I WONDER - What Are Metabolic Reactions?
This video is answering the question of what are metabolic reactions.
Curated Video
Java Multithreading and Parallel Programming Masterclass - Readers-Writers Problem
This video demonstrates the Readers-Writers Problem.
Curated Video
Java Multithreading and Parallel Programming Masterclass - Work Queues for ThreadPools
This video talks about work queues for ThreadPools.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Rootkits
In this video, we will try to understand rootkits, one of the most dangerous forms of malware.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to Malware
This video introduces the malicious software and programs that harm our computer systems and networks.
Curated Video
Fundamentals of Object-Oriented Programming - C++ - Module 3 Summary
In this video, we will be summarizing your learning from this module. This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will learn about STL (Standard Template...
Curated Video
Fundamentals of Object-Oriented Programming - C++ - Module 3 Objectives
In this video, we will cover the learning objective of this module. This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will learn about STL (Standard Template...
Curated Video
Practical Cyber Hacking Skills for Beginners - Cookies Revisited
Here, you will learn about cookies, why and how they are used, and how they affect display of online pages.
Curated Video
Practical Cyber Hacking Skills for Beginners - Calculating Hash Values with PowerShell
In this video, you will learn about calculating the hash values of different types of files using Microsoft PowerShell.
Curated Video
Practical Cyber Hacking Skills for Beginners - Hashing
In this video, we will look at hashing, which is the conversion of key/string/variable into a hash using an algorithm used in malware and antimalware products.
Curated Video
Risk Management for Cyber Security Managers - Ethical Hacking and Pen Testing
In this video, we will discuss ethical hacking and penetration testing and how we can use these techniques to mitigate cyber risks in an organization.
Curated Video
Risk Management for Cyber Security Managers - Information Security Controls
After learning to classify information differently, we will discuss the kinds of security controls available to us to avoid/control risks.
Curated Video
Risk Management for Cyber Security Managers - Threats and Adversaries
Here, we will discuss the different kinds of threats that you might face as a cyber risk manager.
Curated Video
Risk Management for Cyber Security Managers - Introduction to the Course
This brief introductory video overviews the course and briefly outlines cyber risk management concepts.
Curated Video
Learn Midjourney For Your Future 6 Figure Career - Show Me Your World Through Midjourney
In this video, the instructor wants us to showcase our Midjourney world through the platform. You will learn to use the /imagine command and write a prompt that we want to display about. We will experiment with different modulations of...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Anonymizer
In this video, we will look at the tools and software used to make activity on the Internet untraceable.
Curated Video
Seismic waves
Sound-like waves that travel through the ground from an earthquake or other source of vibration. A Twig Science Glossary Film. Key scientific terms defined in just 60 seconds using stunning images and concise textual definitions. Twig...
Curated Video
Quark
A fundamental particle, and the components from which protons and neutrons in atomic nuclei are made. A Twig Science Glossary Film. Key scientific terms defined in just 60 seconds using stunning images and concise textual definitions....
Curated Video
Beetles
Different beetles flourish in different climates. British researchers have used this knowledge to dig into climate change history. Earth Science - Human Impacts - Learning Points. Climate proxies, such as tree rings or dead beetles, can...
Curated Video
How We Taste
Taste is a survival instinct: we instinctively dislike bitter or sour tastes in case food is off or poisonous. An introduction to the tongue and how it helps us to taste. Biology - Being Human - Learning Points. Taste is a survival...
Curated Video
Forms of Energy
Energy comes in many forms. What are they, how do they differ and what can they be used for? Physics - Energy And Radioactivity - Learning Points. Energy is converted or transferred, but never lost. Energy is measured in joules (j)....