Instructional Video1:23
Curated Video

Wi-Fi Security: The Risks of Hacking and Freeloading

Pre-K - Higher Ed
In this video, the speaker highlights the ease with which people can tap into someone's wireless computer network without paying for it, emphasizing the lack of security measures taken by many Wi-Fi users. They explain the risks...
Instructional Video5:15
Curated Video

Struggle to Sustain the Halibut Population in the Bering Sea

3rd - Higher Ed
St. Paul Island, a small fishing community in the Bering Sea, relies heavily on halibut stocks, is struggling as fish trawlers damage the halibut supply. As these industrial boats trawl for various types of fish, they often unintentially...
Instructional Video4:21
Curated Video

Landmarks - House of The Future

12th - Higher Ed
HOUSE OF THE FUTURE THIS IS THE HOUSE OF THE FUTURE OR AT LEAST ONE VERSION OF IT - ON DISPLAY AT THE BELGIUM LIVING TOMORROW CONVENTION. 80 PERCENT OF THE TECHNOLOGY IN THIS HOUSE IS ALREADY ON THE MARKET, THE REST IS NOT FAR AWAY....
Instructional Video2:15
Curated Video

High-Tech Security: Aerial Surveillance with the Helium-Filled Airship

Pre-K - Higher Ed
This video showcases a 60-meter helium-filled airship called Foibos, which was used during the 2004 Olympics in Athens for high-tech security purposes. Equipped with dome-shaped sensors, chemical sniffers, ultra-high-resolution cameras,...
Instructional Video3:30
Curated Video

GMES: Advancing Global Monitoring for Environment and Security

Pre-K - Higher Ed
The Group on Earth Observation is overseeing a 10-year plan to coordinate data gathered on the environment from satellites and terrestrial sources. Europe's Global Monitoring for Environment and Security system (GMES) is at the forefront...
Instructional Video7:52
Curated Video

How to Define Team Ground Rules

10th - Higher Ed
Ground rules… What are they, does your project team need them, and how to set and maintain them if it does? That’s what we’ll look at in this video.



What are Gr
ound Rules
Ground...
Instructional Video8:01
Curated Video

What is the Blockchain?

10th - Higher Ed
Blockchain is a technology for recording transactions. And, since its first use in 2008 for cryptocurrency, it is emerging as one of the must-have technologies in many industry sectors. Project managers will often be called upon to...
Instructional Video3:46
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Peer Updates

Higher Ed
This video illustrates how the privacy of Windows 10 OS can be improved by turning off the peer updates features from other computers, especially where the internet is unreliable.
Instructional Video4:25
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Patching and Updates

Higher Ed
This video demonstrates how applying Windows safety patches and updates is essential in constantly keeping the system safe and how to use these patches and updates.
Instructional Video4:15
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introducing Proton Email

Higher Ed
This video illustrates the Proton email and its features and advantages, safety, and disadvantages.
Instructional Video6:04
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Email Basics, Protocols and Ports

Higher Ed
In this lesson, you will learn about emails, what protocols and ports they use to communicate, the IMAP port 143 and POP port 110, IMAP port 993 and POP port 995, encrypted and unencrypted.
Instructional Video6:45
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - VPN Myths Debunked

Higher Ed
In this video, the author debunks the significant myths about VPN use and several reasons for using a paid VPN.
Instructional Video7:13
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - NordVPN

Higher Ed
In this video, the author illustrates more about NordVPN and the benefits and cons of the VPN.
Instructional Video6:20
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Types of VPNs

Higher Ed
In this video, the author discusses the various kinds of VPNs used and the benefits and disadvantages of the VPNs
Instructional Video7:15
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to Proxy Servers

Higher Ed
Let's discuss the first anonymizer, the proxy server, and how it can provide a proxy IP address to hide your activity.
Instructional Video6:14
Curated Video

Practical Cyber Hacking Skills for Beginners - Introduction to NAT

Higher Ed
This video is a detailed introduction to Network Address Translation, allowing computers to share the same public IP address.
Instructional Video2:12
Curated Video

Practical Cyber Hacking Skills for Beginners - Section Preview-5

Higher Ed
This video briefly outlines the section concepts, including a typical home network setup, DHCP and DNS, commands used in them, TCP versus UDP, and firewalls and hardening networks to prevent attacks.
Instructional Video6:01
Curated Video

Practical Cyber Hacking Skills for Beginners - Key Principles of Cybersecurity

Higher Ed
Let's look at the technological practices and critical principles of cybersecurity.
Instructional Video3:41
Curated Video

Practical Cyber Hacking Skills for Beginners - Incident Response Plan

Higher Ed
We will look at the policies and procedures used to identify, contain, and eliminate cyber-attacks.
Instructional Video9:24
Curated Video

What If Our Clothes Could Disrupt Surveillance Cameras?

9th - Higher Ed
What do you get when you combine mass surveillance with A.I.? It’s a dystopia that’s already a reality in places across the world. Fashion designers are pushing back, crafting clothing and accessories that trick facial recognition...
Instructional Video3:27
Science ABC

How Are Computer Games ‘Cracked’?

Pre-K - Higher Ed
Game cracking involves bypassing security checks implemented by gaming companies. Hackers use tools such as kernel-mode debuggers, disassemblers, and hex-editors, which allow manipulation of the game's code. In this video, we will...
Instructional Video3:14
Curated Video

The Prime Number Code

6th - 12th
Why prime numbers are the building blocks of encryption, used for information security, in cash machines and to hide your identity online. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Instructional Video3:27
Curated Video

How Algorithms Change the World

6th - 12th
What are algorithms, and how do they dictate human behaviour? Helpful and often life-saving functions, algorithms are shaping our lives more and more as they become increasingly complex. Maths - Algebra A Twig Math Film. Reinforce and...
Instructional Video9:13
Weird History

How the Altamont Free Concert Ended the Summer of Love

12th - Higher Ed
Lambasted by Rolling Stone magazine as "rock and roll's all-time worst day — a day when everything went perfectly wrong," the 1969 music festival at Altamont Speedway in Northern California was a concert unlike any other. Immortalized in...