Instructional Video2:12
Curated Video

Practical Cyber Hacking Skills for Beginners - Section Preview-5

Higher Ed
This video briefly outlines the section concepts, including a typical home network setup, DHCP and DNS, commands used in them, TCP versus UDP, and firewalls and hardening networks to prevent attacks.
Instructional Video6:01
Curated Video

Practical Cyber Hacking Skills for Beginners - Key Principles of Cybersecurity

Higher Ed
Let's look at the technological practices and critical principles of cybersecurity.
Instructional Video9:24
Curated Video

What If Our Clothes Could Disrupt Surveillance Cameras?

9th - Higher Ed
What do you get when you combine mass surveillance with A.I.? It’s a dystopia that’s already a reality in places across the world. Fashion designers are pushing back, crafting clothing and accessories that trick facial recognition...
Instructional Video3:14
Curated Video

The Prime Number Code

6th - 12th
Why prime numbers are the building blocks of encryption, used for information security, in cash machines and to hide your identity online. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Instructional Video3:27
Curated Video

How Algorithms Change the World

6th - 12th
What are algorithms, and how do they dictate human behaviour? Helpful and often life-saving functions, algorithms are shaping our lives more and more as they become increasingly complex. Maths - Algebra A Twig Math Film. Reinforce and...
Instructional Video9:13
Weird History

How the Altamont Free Concert Ended the Summer of Love

12th - Higher Ed
Lambasted by Rolling Stone magazine as "rock and roll's all-time worst day — a day when everything went perfectly wrong," the 1969 music festival at Altamont Speedway in Northern California was a concert unlike any other. Immortalized in...
Instructional Video5:07
Curated Video

Big Ideas - Episode 7 - Thermal Imaging

Pre-K - Higher Ed
The need to see in the dark; to observe weather patterns from outer space; or to conduct security surveillance at night, lead to the Big Idea of Night Vision, and Thermal Imaging. FLIR, or Forward Looking Infra Red, is a continuation of...
Instructional Video1:27
Curated Video

The Value of a Well-Rounded Learning Experience

9th - Higher Ed
In this video, the president of an IT solutions consulting company reflects on his unconventional path to obtaining a degree in a rapidly evolving field like AI, where many professionals do not necessarily hold formal degrees. He...
Instructional Video0:38
Curated Video

Unique Offerings of an IT Solutions Consulting Company

9th - Higher Ed
Jason is the President of CNWR, an located in Toledo, Ohio. With a background in network engineering, Jason became the president of CNWR after being with the company for almost 10 years. Under Jason's leadership, the company continues to...
Instructional Video1:32
Curated Video

Differentiating Between Good and Great in the IT Consulting Field

9th - Higher Ed
Drive and hunger are important elements of knowledge. The president of an IT solutions consulting company explains how how truly great professionals understand the interconnectedness of various concepts and components, enabling them to...
Instructional Video2:34
Curated Video

Career Advice for Aspiring Tech Professionals

9th - Higher Ed
Jason, President of an IT solutions consulting company, explains why he likes to hire graduates from the college of engineering, particularly those with backgrounds in computer science, engineering technology, or IT. He highlights the...
Instructional Video1:41
Curated Video

Embracing Technical and Hiring Challenges in the IT Industry

9th - Higher Ed
Jason, a passionate and experienced IT professional is dedicated to using technical skills to help businesses overcome unique challenges and enhance their cybersecurity measures. He specializes in helping companies improve their...
Instructional Video2:34
Curated Video

A Day in the Life of a Tech CEO

9th - Higher Ed
Jason is the President of CNWR, an IT solutions consulting company located in Toledo, Ohio. With 25 years of experience, CNWR offers IT services to small and medium businesses in Toledo, along with high-end security and enterprise E...
Instructional Video19:00
Instructional Video5:57
Curated Video

The CISO Masterclass - Ask Questions

Higher Ed
In this video, discover the importance of asking insightful questions during interviews and how it can demonstrate your curiosity and strategic thinking as a CISO.
Instructional Video3:15
Curated Video

The CISO Masterclass - DevSecOps and the Role of CISO

Higher Ed
This video highlights the growing importance of DevSecOps and the pivotal role that CISOs play in integrating security into the development process.
Instructional Video10:32
Curated Video

The CISO Masterclass - Security Metrics

Higher Ed
This video provides an in-depth understanding of security metrics and their role in measuring the effectiveness of cybersecurity initiatives.
Instructional Video8:40
Curated Video

The CISO Masterclass - Know Your Role

Higher Ed
In this video, delve into the key aspects of understanding and defining your role as a CISO within your organization.
Instructional Video10:40
Curated Video

Hands-On Continuous Integration and Automation with Jenkins - Install Jenkins on AWS

Higher Ed
This video shows how to assign an Elastic IP address to an EC2 instance, access an EC2 instance via ssh, and install Jenkins on AWS.
Instructional Video4:56
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Leveling Up in Solidity

Higher Ed
This video helps you with leveling up in Solidity by learning new concepts. This clip is from the chapter "Solidity Patterns I - Cybersecurity" of the series "The Complete Solidity Course - Zero to Advanced for Blockchain and Smart...
Instructional Video2:25
Curated Video

Building Microservices API in Go - Introduction

Higher Ed
In this video, we will provide an overview of the advanced topics covered in this section. We will introduce the concepts and techniques that will be covered in the subsequent videos. This clip is from the chapter "Advanced Topics" of...
Instructional Video2:22
Curated Video

Building Microservices API in Go - Securing Application

Higher Ed
In this video, we will discuss the authentication and authorization strategy we will be implementing in this section. We will explore the importance of securing our application and discuss best practices for implementing effective...
Instructional Video4:17
Instructional Video5:06
Curated Video

Chatbots Development with Amazon Lex - Overview of AWS

Higher Ed
In this lecture, we will look at Amazon Web Services, which is the most comprehensive and widely adopted web service. We will also discuss its functionality, Amazon Community, security, innovation pace, operational expertise, and more.