Instructional Video7:23
Curated Video

How can AI Transform Project Management?

10th - Higher Ed
Any video about Artificial Intelligence is likely to be – at best – provisional. The technology is improving fast and what seems possible now is likely to be little more than the leading edge of a massive transformation. With that said,...
Instructional Video3:51
Curated Video

Risk Management for Cyber Security Managers - Risk Management Scope and Roles

Higher Ed
In this lesson, we will look at the scope of cyber risk management and the different kinds of roles under cyber risk management.
Instructional Video2:35
Curated Video

Exploring the Benefits of VoIP and Skype: Revolutionizing Communication

Pre-K - Higher Ed
Skype is a VoIP application that allows users to make untimed and long-distance phone calls for free using an internet connection. With its peer-to-peer technology, Skype enables direct communication between users' computers, eliminating...
Instructional Video1:17
Curated Video

Revolutionizing Salmonella Analysis: Bluefuse Software Enhances Speed and Accuracy

Pre-K - Higher Ed
The Bluefuse software developed by a company in Cambridge, England, has revolutionized the analysis of salmonella samples, improving both speed and accuracy. By using statistical models to differentiate between data and noise, the...
Instructional Video11:39
Brainwaves Video Anthology

Gene Kim - Wiring the Winning Organization

Higher Ed
Gene Kim is a Wall Street Journal bestselling author, researcher, and multiple award-winning CTO. He has been studying high-performing technology organizations since 1999 and was the founder and CTO of Tripwire for 13 years. He is the...
Instructional Video3:27
Curated Video

What is Release Management? Project Management in Under 5

10th - Higher Ed
Projects - especially IT projects - need to release new software into a live environment. So, what is Release Management?
Instructional Video3:25
Curated Video

What is a Business Blueprint? Project Management in Under 5

10th - Higher Ed
In the world of business transformation, what is the master plan that guides the definition and planning of your project? It's a Business Blueprint. So, what is a Business Blueprint?
Instructional Video4:07
Curated Video

What is a Functional Specification? Project Management in Under 5

10th - Higher Ed
On software and technical projects, there is a chain of project definition deliverables, and one of them is the Functional Specification. So, what is a Functional Specification?
Instructional Video7:39
Curated Video

Practical Cyber Hacking Skills for Beginners - Cyber Security Auditing

Higher Ed
This audit provides a way for the management to assess how effective the cyber security policy is for a business organization or a federal networking structure.
Instructional Video3:01
Curated Video

Easy File Conversion

Pre-K - Higher Ed
Learn how to convert files between different formats quickly and easily. This video covers online tools and software for converting documents, images, and media files. Save time by knowing the best methods for file conversion.
Instructional Video1:55
Curated Video

Revolutionizing Animation: The Science Behind Realistic Visual Effects

Pre-K - Higher Ed
This video discusses the use of advanced CGI rendering techniques, specifically ray tracing, in creating realistic environments and materials for animated films. Developed by a former NASA engineer, this software accurately simulates how...
Instructional Video2:02
Curated Video

New Software Gives Stephen Hawking a Voice: Project Hawking

Pre-K - Higher Ed
This video discusses the development of new software, called Elocutor, designed to help the world-renowned scientist Stephen Hawking communicate more efficiently. As his previous software became outdated and unmodifiable, Elocutor was...
Instructional Video15:06
Curated Video

How to Implement Change... in the Face of Resistance to Change

10th - Higher Ed
Let’s face it, whenever we implement change, we face resistance. So, let’s look at how to handle the five commonest forms of resistance, to make your change implementation a success. People will resist change. That’s a given. People will...
Instructional Video5:07
Curated Video

What is a PERT Chart? Project Management in Under 5

10th - Higher Ed
When it comes to project planning and estimation, there are a few 'go-to' tools that every project manager should know, and one of them is the PERT Method. So, what is a PERT Chart?
Instructional Video6:14
Curated Video

Just Sayin' - Simple Truths about Project Management

10th - Higher Ed
Just Sayin' - wit and wisdom that yields a few simple truths about project management. This short video aims to give you amusement and insight in equal measure. It contains a few simple truth about project management, expressed as pithy...
Instructional Video9:26
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting with Veracrypt

Higher Ed
After learning about encryption, we will look at encrypting a computer using Veracrypt software.
Instructional Video2:54
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - BleachBit

Higher Ed
In this lesson, we will look at a trendy yet controversial tool called BleachBit to clear files.
Instructional Video8:02
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - CC Cleaner

Higher Ed
This video illustrates the CC Cleaner software, how to use it, and the benefits of using it to protect the systems.
Instructional Video1:42
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Using GMER - Rootkit Scanner

Higher Ed
This video demonstrates the GMER rootkit scanner and how it helps eliminate the rootkit from infesting a system.
Instructional Video5:09
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Rootkits

Higher Ed
In this video, we will try to understand rootkits, one of the most dangerous forms of malware.
Instructional Video3:30
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Darknets

Higher Ed
In this video, we will look at some of the websites classified on the dark web that allows you to browse websites or post questions anonymously.
Instructional Video5:07
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Tor Weaknesses

Higher Ed
Here, the author elaborates on the disadvantages of using Tor to browse the Internet.
Instructional Video3:48
Curated Video

Practical Cyber Hacking Skills for Beginners - Introduction to Hashcat

Higher Ed
This video introduces a tool that is an advanced password recovery tool and is available on various platforms.
Instructional Video6:19
Curated Video

Practical Cyber Hacking Skills for Beginners - The Hacking Methodology

Higher Ed
Here, you will learn more about the different hacking methodologies that hackers employ to cause harm to a system or a network and also understand the possibilities of minimizing the attacks.