Instructional Video4:09
Curated Video

Take This Job and Do It

3rd - Higher Ed
“On the Job” explores some different job options for grown-ups.
Instructional Video3:01
Teaching Without Frills

Economics for Kids: Goods and Services

3rd - 5th
In this economics video, you will learn the difference between goods and services!
Instructional Video15:05
Schooling Online

Emily Dickinson - I Felt a Funeral, In my Brain

3rd - Higher Ed
Have you ever felt like everything is about to come crashing down? In ‘I felt a Funeral, in my Brain’, Emily Dickinson portrays the anguish of complete mental collapse. It begins with a sense of grief and loss, like at a funeral, then...
Instructional Video9:55
All In One Social Media

How to make Facebook ACTUALLY work for you

Higher Ed
Facebook may have been revolutionary but these days it is for "the old people" and has become SO hard to navigate. So what are you supposed to do? This video is gonna lay it out for you so you can actually use Facebook effectively.
Instructional Video9:58
All In One Social Media

Uncover the Secret to Supercharging Your Business With Influencer Marketing!

Higher Ed
If you're looking to ignite your business growth, then you need to look into influencer marketing! In this video, we'll explore the benefits of influencer marketing and how it can help your business take off. Influencer marketing is a...
Instructional Video18:36
All In One Social Media

Unlocking the Secrets to Using TikTok on Your Desktop in 2023!

Higher Ed
In this video, we're going to show you how to use TikTok on desktop. TikTok is a popular social media app that lets you create and share videos for your business. In this guide, we'll teach you all about how to use TikTok on desktop....
Instructional Video7:02
Curated Video

Wireshark D4 V4 - IPv4 Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 4: IPv4 deep-dive
Instructional Video11:00
Weird History

Life As A G.I. In WWII

12th - Higher Ed
France fell to Germany in June of 1940. The United States hadn’t yet entered World War 2, and while isolationism remained politically popular, the country was growing wary. The prospect of being drawn into the European conflict was...
Instructional Video5:33
Curated Video

Threat Modeling

Higher Ed
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized. In this video, you will learn about...
Instructional Video3:36
Curated Video

Risk Identification

Higher Ed
Risk identification is the process of documenting any risks that could keep an organization or program from reaching its objective. It's the first step in the risk management process, which is designed to help companies understand and...
Instructional Video21:29
Curated Video

AWS Security Boiled Down

Higher Ed
A general overview about AWS security architecture and tools. Learn more about VPC, EC2, S3, AIM, Security Groups, and NACLs. This video will give you a quick jump into cloud security.
Instructional Video2:53
Curated Video

Android Application Anatomy

Higher Ed
This video will shed the light on the components of an Android application
Instructional Video8:07
Curated Video

The Powerful Armitage Tool

Higher Ed
This video will demonstrate the powerful armitage tool, which is a GUI application for the metasploit framework
Instructional Video3:42
Curated Video

Analysis of COVID Spy Max APK

Higher Ed
This video will deep dive into the analysis of a spyware APK
Instructional Video4:09
Curated Video

Why a Regular Domain User Can be a Real Security Threat

Higher Ed
In this video you will learn about the reasons why a regular domain user can be a real danger to your environment, and why those generic and shared Active Directory accounts should not exist.
Instructional Video3:23
Curated Video

Run an Online Password Attack on Linux

Higher Ed
Learn how to plan an execute an online password attack on Linux machine
Instructional Video5:26
Curated Video

Injecting a Legit APK and Analyze it using MobSF

Higher Ed
MobSF is a powerful setup for analyzing mobile malware. In this video we will learn how to install this framework and analyze malicious applications on it.
Instructional Video3:41
Curated Video

Firewalls and Security Appliances

Higher Ed
Any type of server appliance intended to safeguard computer networks from unauthorized traffic is referred to as a security appliance.
Instructional Video8:11
Curated Video

Create Your First Trojan

Higher Ed
In this video, you will learn how to create your first Trojan file, and how to use this file once it is invoked by the victim. The Trojan file is moved to the victim's machine by using various social engineering techniques.
Instructional Video2:15
Curated Video

DOS and DDOS Attacks

Higher Ed
By temporarily or permanently interrupting the services of a host connected to a network, a denial-of-service attack attempts to render a machine or network resource unavailable to its intended users.
Instructional Video4:48
Curated Video

Wireshark D4 V5 - IPv6 Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 5: IPv6 deep-dive
Instructional Video5:11
Curated Video

Explore Main Services and Install Necessary Programs

Higher Ed
This video will help you get started in setting up your lab
Instructional Video8:11
Curated Video

Create Your First Trojan and Infiltrate a Target

Higher Ed
This video wil show you the baby steps on how to create your first trojan file in Kali Linux. We will put his file into action and start infiltrating data from the victim's machine
Instructional Video9:25
Curated Video

What is servant leadership

Higher Ed
This video explores the concept of servant leadership, an alternative leadership model that focuses on empowering others and serving employees as a means to achieve organizational goals. The video discusses the history of servant...