Instructional Video3:32
Teaching Without Frills

How to Write a Research Paper for Kids - Episode 3: Researching

3rd - 5th
In this video, you will learn how to start researching a topic after you make a plan for your animal research paper. We will check to make sure the facts we already knew are really true. Then we'll learn even more information in books,...
Instructional Video8:05
Hip Hughes History

Linkage Institutions Explained

6th - 12th
Perfect for APGOV students, Political Science kids, High Schoolers and especially cray cray on the internet. In this lecture we look at what linkage institutions do and the four examples of them for test day!
Instructional Video3:46
Vlogbrothers

They Hacked Me

6th - 11th
Thank you to Sherri Davidoff from LMG Security for helping me both with this video and also with recovering from my hack. If you're thinking "I won't get hacked, I'm not a public person like Hank," that does NOT protect you. Most hacks...
Instructional Video3:51
Vlogbrothers

Vital Status Report from NYC

6th - 11th
In which Hank mostly goofs off with friends in New York. But, of course, there's a good bit of Paper Towns talk as well.
Instructional Video3:58
Vlogbrothers

Should You Abandon Social Media?

6th - 11th
Did I make a video called "is twitter redeemable" last month? Yes I did. Do I think about Twitter a lot? Yes. Too much? Probably. Ultimately, the moments when I feel like I can't control myself on social media are the ones when I most...
Instructional Video3:41
Vlogbrothers

On Loneliness

6th - 11th
In which John discusses loneliness, isolation, and the kinds of communities that work.
Instructional Video3:51
Vlogbrothers

Are You Stuck in The Sad Gap

6th - 11th
I haven't run across a video that was so hard to fit into four minutes in a long time. There is a lot I want to say about this, and also a lot that I'm not 100% clear on. I don't know to what extent this is an artifact of the structure...
Instructional Video2:58
Vlogbrothers

I Quit Social Media. Here's How It's Going

6th - 11th
In which John describes what he has (and hasn't) learned in his first month away from his twitter, reddit, instagram, and facebook.
Instructional Video3:52
Vlogbrothers

Hackers, Cyber crime, and a New Kind of War.

6th - 11th
In which Hank talks briefly about the fundamental shift in espionage, warfare, crime, and activism that may re-define our age. Hackers have been mounting increasingly sophisticated attacks. Billions of dollars have been stolen, and even...
Instructional Video3:55
Vlogbrothers

You Cannot Trust Yourself (Hank's End of the Year Worries)

6th - 11th
This video had a whole section in it where I complained about how annoyed I get when I see other people who don't consider their impact get really surprised when people get mad at them and how nice it must be to just be blissfully...
Instructional Video2:40
Vlogbrothers

Your Attention

6th - 11th
In which John discusses what's wrong with the Internet, whether it's new, and the power (and value) of our attention.
Instructional Video20:47
Vlogbrothers

We're Thinking About Facebook Wrong

6th - 11th
Usually I'm up in the description being like, "here are a bunch of things I wasn't really able to fit in the video" but actually...turns out, if you let me go for 20 minutes, I get most of it out. OK, I guess the one insight I had...
Instructional Video10:36
Vlogbrothers

We Have Destroyed Copyright Law

6th - 11th
The internet destroyed copyright law and we have not re-built. Instead of laws and courts we now have claims and disputes. YouTube in particular has placed itself in the middle of extra-legal arbitrations over what is and is not fair...
Instructional Video2:27
Curated Video

Web Applications Security Overview

Higher Ed
This video will highlight the security concerns when it comes to web applications
Instructional Video2:12
Curated Video

Browsing the Internet Safely

Higher Ed
The video highlights the tips on how to browse the internet safely and what are the risky habits to avoid over the internet
Instructional Video3:54
Curated Video

Steps to plan a successfull pentest

Higher Ed
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Instructional Video6:52
Curated Video

Hack Facebook, Twitter, and Gmail Accounts

Higher Ed
We will use the SET tool to setup a phishing campaign in order to hack social media accounts
Instructional Video6:27
Curated Video

Hack Using Google ONLY

Higher Ed
You will learn how to easily perform hacking using search engines and publicly available information. Find passwords, confidential files, and gain access to systems with minimum efforts.
Instructional Video4:40
Curated Video

Types of Attackers and Cybersecurity Professionals

Higher Ed
In the field of information security, there are three well-known categories of hackers: black hats, white hats, and grey hats. In an effort to set themselves apart from one another and distinguish the good hackers from the evil, hackers...
Instructional Video4:37
Curated Video

Acquire Malicious Apps1

Higher Ed
This video will describe the methods of acquiring malicious Android applications over the internet. There are few publicly available sites in addition to Github links that will be shared.
Instructional Video4:12
Curated Video

Hack Using a Rogue Access Point

Higher Ed
In this tutorial, you will learn how to create a fake wireless access point and use it to hack the users logged on to it. We will use WiFi Pineapple device.
Instructional Video6:27
Curated Video

Google Dorks Live Examples

Higher Ed
Spot the vulnerabilities in the wild, leverage Google to hack into web applications and systems that are published over the Internet. You will be surprised by how easy it is.
Instructional Video5:03
Curated Video

LAB 2: Google Hacking

Higher Ed
I will show you the basics of Google hacking without any prior technical knowledge
Instructional Video2:58
Curated Video

Welcome Note

Higher Ed
The video explains the importance of cyber security in a connected world