Hi, what do you want to do?
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 4 Ask Me Anything (AMA)
Malware is malicious software that comes in many different shapes and sizes. This episode tackles examples of malicious code and how it related to Visual Basic for Applications (VBA).
r/>
This clip is from the chapter "Tools of...
r/>
This clip is from the chapter "Tools of...
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Programming concepts
CISM Domain 1: Information Security Governance: Programming concepts
r/>
This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security Governance...
r/>
This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security Governance...
Science360
Fab Labs
Imagine if you had the tools to build almost anything you wanted. One MIT physicist has figured out how to fit four tools into one small space, so people can do just that. He calls it a ""Fab Lab"" and, with help from the National...
Curated Video
Learning LESS (Video 25)
CSS is great; it's a staple of the web and it helps us to produce beautiful websites, but some parts of it are archaic, and it's often time-consuming to get right. LESS changes that. LESS includes built-in features that allow you...
Curated Video
Google Maps Secrets: How Exactly Does Google Maps Work?
How Google Maps work? How does Google Maps know about the traffic conditions? How is it so accurate about predicting traffic conditions? This is a short, animated videos for kids and laymen to understand the science and technology that...
Curated Video
Python for Network Forensics 1.1: The Course Overview
This video provides an overview of the entire course.
Curated Video
Explain web security : Methodolo-gy of Hack-ers
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether...
Programming Electronics Academy
ESP32 super simple setup with Arduino IDE
You've probably heard of the ESP32. It is a Wi-Fi and Bluetooth enabled micro controller that's really pretty cool. They're super affordable. Everybody seems to be using them. They've been around for a while. Great community built up...
Curated Video
Active Directory with Windows Server 2016 - DC Configuration Options
You’ll explore DC locations, global catalog servers, SRV records, and the DNS manager. Explore the FSMO roles and learn more about role operations and management.
r/>
This clip is from the chapter "Install and Configure AD DS"...
r/>
This clip is from the chapter "Install and Configure AD DS"...
Seven Dimensions
Teaching Greeting and Communication Skills
In this video, a team leader is guiding a new employee on how to properly greet and interact with guests as a receptionist. They discuss the importance of using correct titles and last names, offering beverages to guests, and making a...
Curated Video
Learning Python Web Penetration Testing (Video 4)
With the huge growth in the number of web applications in the recent times, there has also been an upsurge in the need to make these applications secure. Web penetration testing is the use of tools and code to attack a website or...
National Institute of Standards and Technology
Pat Gallagher at the Cloud Computing Forum & Workshop
NIST Director Pat Gallagher opens the Cloud Computing Forum & Workshop May 20, 2010. He describes cloud computing as a computing architecture that fully realizes the capability of a highly networked system and offers an opportunity for...
friEdTech
Four Google Image Search Tricks
This video was made with Screencastify,://goo.gl/Qytv7f,' target='_blank' rel='nofollow'>Screencastify, it's an amazin
g, free, simple Screencasting tool available in the Chrome browser.
atbr/>In this video, learn Four Google...
g, free, simple Screencasting tool available in the Chrome browser.
atbr/>In this video, learn Four Google...
Science360
Peter Elmer of Princeton explains how data is critical to understanding fundamental physics
Peter Elmer of Princeton University explains how the Large Hadron Collider (LHC) is a Higgs boson factory, and why hunting through its data is like looking for a needle in a haystack. Elmer is the principal investigator on the $25...
Brainwaves Video Anthology
Jordan Shapiro - The School of the Future
Jordan Shapiro, PhD is a globally celebrated public intellectual. He's currently senior fellow for the Joan Ganz Cooney Center at Sesame Workshop, where he coordinates research and advocacy around digital technology and education...
Curated Video
The Art of Calligraphy
Calligraphy is an artistic form of writing practiced by people around the world. Understand some of the historical and cultural significances of calligraphy. Explore different styles of calligraphy and the tools used to draw letters and...
Curated Video
Python 3: Project-based Python, Algorithms, Data Structures - Section intro and overview - Python in-depth
Introduction to material covered in the section and the who it's intended for
r/>
This clip is from the chapter "Python in-depth" of the series "Python 3: Project-based Python, Algorithms, Data Structures".This section is about...
r/>
This clip is from the chapter "Python in-depth" of the series "Python 3: Project-based Python, Algorithms, Data Structures".This section is about...
IDG TECHtalk
Why new remote work policies attract hackers
With widespread mandated work from home policies due to the coronavirus, many employees are working remotely for the first time. In some cases, employers had never intended their employees to be remote-only, and they may lack key work...
Espresso Media
Mighty Sea Crane: Tour of the Oleg Strashnov
Mighty Sea Crane part 5/8: In this video, we are taken on a tour of the Oleg Strashnov, an offshore workhorse. The video showcases the inner workings of the ship, including the crane and its lifting tools used for various operations. We...
Curated Video
Master Java Web Services and REST API with Spring Boot- Introduction to Course & Course Guide
Getting Started: Introduction to Course & Course Guide
r/>
This clip is from the chapter "Getting Started" of the series "Master Java Web Services and REST API with Spring Boot".This section introduces us to the course. It...
r/>
This clip is from the chapter "Getting Started" of the series "Master Java Web Services and REST API with Spring Boot".This section introduces us to the course. It...
Curated Video
Active Directory with Windows Server 2016 - Introduction to AD DS Part 2
We continue looking into the robust interaction of the various components, exploring the global catalog, RODC, and how to work with OUs.
r/>
This clip is from the chapter "Install and Configure AD DS" of the series "Active...
r/>
This clip is from the chapter "Install and Configure AD DS" of the series "Active...
Brainwaves Video Anthology
Chris Lehmann - Science Leadership Academy
Chris Lehmann is the founding principal of the Science Leadership Academy in Philadelphia, PA.
Schooling Online Kids
The Life Stage Series: Emotional Development - If Josh Disappeared
Josh is a happy boy, but sometimes he makes mistakes. Today, Josh is having a bad day – he has made lots of mistakes and upset his family! What if he just disappeared? Would they notice?
<
br/>
In this story, your child will learn...
<
br/>
In this story, your child will learn...
Packt
Identifying Locators (id.Name.Linktext) with Developer Tools -1
This is the first part of a two-part lecture that explains how to identify locators with developer tools.
<
br/>
This clip is from the chapter "Locator Techniques and Tools used to Identify Objects" of the series "Selenium WebDriver...
<
br/>
This clip is from the chapter "Locator Techniques and Tools used to Identify Objects" of the series "Selenium WebDriver...