Instructional Video4:49
Curated Video

Execute a Phishing Attack

Higher Ed
In this video, you will learn how to plan and execute a phishing attack using the SET tool
Instructional Video6:50
Curated Video

Hack an Android Phone

Higher Ed
In this video, you will learn how to hack into an android phone by deploying a malicious application. Gain total control over the mobile phone and manage it through Armitage on KALI.
Instructional Video3:41
Curated Video

Firewalls and Security Appliances

Higher Ed
Any type of server appliance intended to safeguard computer networks from unauthorized traffic is referred to as a security appliance.
Instructional Video5:34
Curated Video

Hashing in a Nutshell

Higher Ed
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Instructional Video2:46
Curated Video

Writing a Narrative: Part 1 Structure & Elements

6th - Higher Ed
An Introduction to narratives. Part 1 in our series 'Planning & Writing a Narrative'. This video explains the basic structure of narratives and identifies the story elements.
Instructional Video4:10
Curated Video

SSL Interception

Higher Ed
In this video, we will intercept SSL traffic by decrypting the SSL tunnel between an APK and a server
Instructional Video6:13
Curated Video

Install a Backdoor

Higher Ed
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor. Use this approach ethically !!!
Instructional Video4:14
Curated Video

Writing a Narrative: Part 2 Language Elements

6th - Higher Ed
An Introduction to narratives. Part 2 in our series 'Planning & Writing a Narrative'. This video explains common language elements such as noun groups, text connectives and use of adverbs.
Instructional Video3:54
Curated Video

Stay Anonymous Online

Higher Ed
This video will show you how to conceal your identity online
Instructional Video5:21
Curated Video

Perform a DNS Spoofing Attack

Higher Ed
This video will teach you how to perform a DNS spoofing attack, and how to take user's URL request to a crafted web application of your own
Instructional Video6:50
Curated Video

Hack an Android Phone with Armitage

Higher Ed
In this video, we will actually hack an Android phone by deploying our payload using Armitage, which is a GUI for metasploit framework.
Instructional Video9:18
Curated Video

How to Write an Information Report

6th - Higher Ed
An introduction to writing information reports. This video details the structure of an information report (introduction, body, conclusion, bibliography) as well as the language features used within an information report (present tense,...
Instructional Video6:59
Curated Video

Organized More Clear Signing in ASL | Listing and Ordering

3rd - Higher Ed
Often when we describe something or give instruction it requires a list. In this video you'll learn how to structure descriptions that involve multiple instances. After this your signing will be clearer and more organized. There are...
Instructional Video11:09
Curated Video

History Hook: Belsen concentration camp 1945

12th - Higher Ed
National Archives: This video explores primary source material relating to the Belsen concentration camp Join Ela as she introduces a document related to the Bergen-Belsen concentration camp and the holocaust in Nazi Germany.
Instructional Video7:10
Curated Video

Bouncing back from challenges - Building resilience

Higher Ed
This video defines resilience and describes common traits of resilient people. The video goes on to offer advice on how to develop a resilient mindset.
Instructional Video3:47
The Learning Depot

Surface Level Features of Expository Text | Improve Your Reading Comprehension

12th - Higher Ed
Effective readers use the characteristics of text to their advantage. Whether consciously or subconsciously, knowing how to use these cues to your advantage will help you to strategically read and engage with text at a more effective...
Instructional Video5:01
The Learning Depot

How To Answer Multiple Choice Questions | Strategies for Finding the Correct Answer Part 2

12th - Higher Ed
Multiple-choice questions can be tricky because they test your ability to think critically. There are strategies, however, to increase your chances of finding the best answer when taking multiple-choice tests. In this lesson, you'll...
Instructional Video4:15
The Learning Depot

Analytical and Expository Thesis Statements

12th - Higher Ed
In this video, we take a look at the analytical and expository thesis statements and compare them to the argumentative thesis statement. The purpose of your paper will determine your thesis statement. Examples are given.
Instructional Video2:46
Curated Video

Update, Upgrade, and Alias Commands

Higher Ed
This video will show you how to keep your pentest box up-to-date
Instructional Video11:26
Curated Video

The Victorian Fireside

12th - Higher Ed
National Archives: The warmth and cosiness of a seat by the hearth in Victorian Britain was provided by more than just a well-laid fire. At the heart of the 19th-century home, the fireplace and its surrounds were a carefully curated...
Instructional Video7:08
Curated Video

Structural Design Patterns in Modern C++ - Smart Proxy

Higher Ed
This video focuses on the smart proxy. This clip is from the chapter "Proxy Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the proxy design pattern.
Instructional Video6:17
Curated Video

Structural Design Patterns in Modern C++ - Pointer to IMPLementation (Plmpl) - Part I

Higher Ed
This is the first part of the two-part video that explains the PImpl idiom. This clip is from the chapter "Bridge Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the bridge design pattern....
Instructional Video8:07
Brave Wilderness

Armored Lizard BITES HARD!

6th - 8th
Mark encounters a feisty shingleback lizard on his first expedition to Western Australia! Unfortunately, the poor lizard is absolutely covered in blood sucking ticks…so Mark risks his fingers to try to remove them one by one. Will he...
Instructional Video5:02
Curated Video

Spark Programming in Python for Beginners with Apache Spark 3 - Execution Methods - How to Run Spark Programs?

Higher Ed
In this video, we will cover execution methods and learn how to run Spark programs. This clip is from the chapter "Spark Execution Model and Architecture" of the series "Spark Programming in Python for Beginners with Apache Spark 3".In...