Instructional Video5:07
Curated Video

What is a PERT Chart? Project Management in Under 5

10th - Higher Ed
When it comes to project planning and estimation, there are a few 'go-to' tools that every project manager should know, and one of them is the PERT Method. So, what is a PERT Chart?
Instructional Video6:14
Curated Video

Just Sayin' - Simple Truths about Project Management

10th - Higher Ed
Just Sayin' - wit and wisdom that yields a few simple truths about project management. This short video aims to give you amusement and insight in equal measure. It contains a few simple truth about project management, expressed as pithy...
Instructional Video9:26
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting with Veracrypt

Higher Ed
After learning about encryption, we will look at encrypting a computer using Veracrypt software.
Instructional Video2:54
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - BleachBit

Higher Ed
In this lesson, we will look at a trendy yet controversial tool called BleachBit to clear files.
Instructional Video8:02
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - CC Cleaner

Higher Ed
This video illustrates the CC Cleaner software, how to use it, and the benefits of using it to protect the systems.
Instructional Video1:42
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Using GMER - Rootkit Scanner

Higher Ed
This video demonstrates the GMER rootkit scanner and how it helps eliminate the rootkit from infesting a system.
Instructional Video5:09
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Rootkits

Higher Ed
In this video, we will try to understand rootkits, one of the most dangerous forms of malware.
Instructional Video3:30
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Darknets

Higher Ed
In this video, we will look at some of the websites classified on the dark web that allows you to browse websites or post questions anonymously.
Instructional Video5:07
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Tor Weaknesses

Higher Ed
Here, the author elaborates on the disadvantages of using Tor to browse the Internet.
Instructional Video3:48
Curated Video

Practical Cyber Hacking Skills for Beginners - Introduction to Hashcat

Higher Ed
This video introduces a tool that is an advanced password recovery tool and is available on various platforms.
Instructional Video6:19
Curated Video

Practical Cyber Hacking Skills for Beginners - The Hacking Methodology

Higher Ed
Here, you will learn more about the different hacking methodologies that hackers employ to cause harm to a system or a network and also understand the possibilities of minimizing the attacks.
Instructional Video8:03
Curated Video

Practical Cyber Hacking Skills for Beginners - Social Engineering

Higher Ed
This video discusses social engineering concepts, understanding the human psyche, and how hackers manipulate the human mind to hack.
Instructional Video5:32
Curated Video

Practical Cyber Hacking Skills for Beginners - The Bad Guys - Black Hats, Cyber Criminals and Disgruntled Employees

Higher Ed
Here, you will learn more about hackers, how they operate, their intentions, and how they differ based on the hacking methodologies.
Instructional Video9:13
Curated Video

Practical Cyber Hacking Skills for Beginners - CWE and CVE

Higher Ed
This lesson will examine the common weakness enumeration and the various CWE and CVE websites.
Instructional Video3:36
Curated Video

Risk Management for Cyber Security Managers - What Is Risk?

Higher Ed
This video explains what constitutes a risk in terms of a business, a functioning system, or all kinds of assets.
Instructional Video2:35
Curated Video

Risk Management for Cyber Security Managers - What Is Vulnerability Management?

Higher Ed
This lesson will discuss identifying, assessing, treating, and reporting security vulnerabilities.
Instructional Video4:41
Curated Video

Risk Management for Cyber Security Managers - Third-Party Cyber Risk Management

Higher Ed
This video elaborates on the various options for transferring or outsourcing risk management to a third party or a vendor.
Instructional Video4:34
Learn German with Herr Antrim

Did You Know? These English Words Are Actually German

9th - 12th
Did You Know? These English Words Are Actually German Have you ever wondered where some of your favorite English words came from? In this video, we explore the fascinating history of word borrowing between German and English. Discover...
Instructional Video3:57
FuseSchool

Defining Robotics

6th - Higher Ed
This video provides a foundational understanding of robotics, describing it as a branch of technology that deals with the design, construction, operation, and application of robots. The video explains the general components of...
Instructional Video7:42
Curated Video

The Software Testing Process: What is User Acceptance Testing - UAT?

10th - Higher Ed
This video is for non-technical Project Managers who want a general appreciation of the cycle of software testing, which culminates in User Acceptance Testing. I also look at alpha testing and beta testing. There are four main levels of...
Instructional Video5:57
Curated Video

Game Programmer

9th - Higher Ed
Brad is a Technical Architect for Daybreak Game Company. Dubbed as "the hero of kids everywhere", Brad's main job is writing video game systems. Once the game designers decide what they'd like to see in the game, Brad and his team then...
Instructional Video7:45
Curated Video

Robot Programmer

9th - Higher Ed
Tim is a Robot Programmer with Midwest Engineered Systems where he has worked on projects for jet engines, plasma cutters, and manufacturing plant robots. One of Tim's favorite aspects of the job is how he gets to work with people from...
Instructional Video2:35
Curated Video

Computer Chess Battles

Pre-K - Higher Ed
In the earliest days of electronic calculation when computers occupied a whole room yet were only as powerful as a modern digital watch, designers dreamt of pitting them against the human mind. When computers ultimately mastered chess...
Instructional Video2:33
Curated Video

The Single Chip Cloud Computer (SCC)

Pre-K - Higher Ed
Intel has created an experimental microprocessor called the Single Chip Cloud computer (SCC) with 48 cores. This chip behaves like a network cloud on a single piece of silicon, offering the potential to reduce processing times and save...