Instructional Video13:04
TED Talks

TED: When technology can read minds, how will we protect our privacy? | Nita Farahany

12th - Higher Ed
Tech that can decode your brain activity and reveal what you're thinking and feeling is on the horizon, says legal scholar and ethicist Nita Farahany. What will it mean for our already violated sense of privacy? In a cautionary talk,...
Instructional Video14:59
TED Talks

TED: The world doesn't need more nuclear weapons | erika Gregory

12th - Higher Ed
Today nine nations collectively control more than 15,000 nuclear weapons, each hundreds of times more powerful than those dropped on Hiroshima and Nagasaki. We don't need more nuclear weapons; we need a new generation to face the...
Instructional Video16:27
TED Talks

James Stavridis: A Navy Admiral's thoughts on global security

12th - Higher Ed
Imagine global security driven by collaboration -- among agencies, government, the private sector and the public. That's not just the distant hope of open-source fans, it's the vision of James Stavridis, a US Navy Admiral. Stavridis...
Instructional Video11:20
Crash Course

Hackers & Cyber Attacks: Crash Course Computer Science

12th - Higher Ed
Today we're going to talk about hackers and their strategies for breaking into computer systems. Now, not all hackers are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White...
Instructional Video10:28
SciShow

Attachment Theory: How Your Childhood Shaped You

12th - Higher Ed
Our interpersonal relationships start forming as soon as we’re born, and psychologists have studied how those early connections can set the stage for the other relationships we form later in life.
Instructional Video4:07
SciShow

The Science of Airport Security

12th - Higher Ed
Long lines, being patted down, and having your hands swabbed don't make for a wonderful day, but Michael Aranda explains the machines you encounter in airport security and the science and technology behind them.
Instructional Video4:17
3Blue1Brown

How secure is 256 bit security? Cryptocurrency - Part 2 of 2

12th - Higher Ed
When a piece of cryptography is described as having "256-bit security", what exactly does that mean? Just how big is the number 2^256?
Instructional Video14:16
TED Talks

TED: What it's like to be a parent in a war zone | Aala el-Khani

12th - Higher Ed
How do parents protect their children and help them feel secure again when their homes are ripped apart by war? In this warm-hearted talk, psychologist Aala el-Khani shares her work supporting -- and learning from -- refugee families...
Instructional Video19:22
TED Talks

TED: A vision of crimes in the future | Marc Goodman

12th - Higher Ed
* Viewer discretion advised. This video includes discussion of mature topics and may be inappropriate for some audiences. The world is becoming increasingly open, and that has implications both bright and dangerous. Marc Goodman paints a...
Instructional Video21:02
TED Talks

Bruce Schneier: The security mirage

12th - Higher Ed
The feeling of security and the reality of security don't always match, says computer-security expert Bruce Schneier. In his talk, he explains why we spend billions addressing news story risks, like the "security theater" now playing at...
Instructional Video17:03
TED Talks

David Birch: A new way to stop identity theft

12th - Higher Ed
Bartenders need to know your age, retailers need your PIN, but almost no one actually needs your name -- except for identity thieves. ID expert David Birch proposes a safer approach to personal identification -- a "fractured" approach --...
Instructional Video19:14
TED Talks

Mikko Hypponen: How the NSA betrayed the world's trust -- time to act

12th - Higher Ed
Recent events have highlighted, underlined and bolded the fact that the United States is performing blanket surveillance on any foreigner whose data passes through an American entity -- whether they are suspected of wrongdoing or not....
Instructional Video7:45
TED Talks

TED: Your smartphone is a civil rights issue | Christopher Soghoian

12th - Higher Ed
The smartphone you use reflects more than just personal taste ... it could determine how closely you can be tracked, too. Privacy expert and TED Fellow Christopher Soghoian details a glaring difference between the encryption used on...
Instructional Video5:18
SciShow

How the Massive Equifax Data Breach Happened

12th - Higher Ed
There was a massive data breach in the United States, and chances are you're probably affected by it. While Hank can't undo what was done, he can give you some insight into how it all went down.
Instructional Video11:57
Crash Course

Cybersecurity: Crash Course Computer Science

12th - Higher Ed
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use...
Instructional Video8:51
Crash Course

Contractarianism: Crash Course Philosophy

12th - Higher Ed
Today we explore the penultimate ethical theory in this unit: contractarianism. Hank explains Hobbes’ state of nature, and implicit and explicit contracts, as well as the Prisoner’s Dilemma, and the benefits, and costs, of violating...
Instructional Video11:39
TED Talks

TED: How young people join violent extremist groups -- and how to stop them | erin Marie Saltman

12th - Higher Ed
Terrorists and extremists aren't all naturally violent sociopaths -- they're deliberately recruited and radicalized in a process that doesn't fit into a neat pattern. erin Marie Saltman discusses the push and pull factors that cause...
Instructional Video2:25
SciShow

How Do Chips Make Credit Cards More Secure?

12th - Higher Ed
If you live in the United States, you might have recently gotten a credit card with a microchip on it. But what does this chip do that makes it any different than the magnetic strip on the back of the card?
Instructional Video1:50
Curated Video

Germany Values

12th - Higher Ed
New ReviewThe German view of the world has been shaped by the country’s complex, at times turbulent, history and by its position at the geographical heart of Europe. The very idea of a German nation was not even a real possibility until the...
Instructional Video2:43
Curated Video

South Africa Security

12th - Higher Ed
New ReviewSouth Africa has a serious crime problem, so ensuring your safety, and that of everyone you’re traveling with, will need to be a high priority while you’re in the country. At the same time, there’s no need to be paranoid. As in most...
Instructional Video0:55
Curated Video

Mexico Managing Personal Security

12th - Higher Ed
New ReviewCrime is a serious concern to visitors and residents of Mexico—with good reason. The problem has become worse in recent years because of the alarming rise in unemployment and poverty. Police mismanagement and corruption have only...
Instructional Video1:31
Curated Video

Japan Security

12th - Higher Ed
New ReviewWhile Japan has long been considered extremely safe, no country, of course, is 100 percent safe. Economic problems have led to greater unemployment, and, according to the Japanese, relatively lower moral standards. A few years ago, any...
Instructional Video5:44
Curated Video

Cisco CCNA 200-301: The Complete Guide to Getting Certified - A (Very) Basic Introduction to Networking

Higher Ed
New ReviewIn this video, get an overview of basic networking principles, laying the groundwork for more advanced topics.
Instructional Video3:46
Curated Video

Cisco CCNA 200-301: The Complete Guide to Getting Certified - Why Passing the CCNA is Going to Turbo Charge Your Career

Higher Ed
New ReviewIn this video, learn about the career-boosting benefits of earning the CCNA certification and how it opens up new opportunities in networking.