Hi, what do you want to do?
Crash Course
Mythical Language and Idiom: Crash Course World Mythology #41
It's the end of the world, everybody. Well, it's the end of our mythology series, anyway. This week, we're talking about how mythological themes have made their way into the English language. We're taking on the Herculean task of...
SciShow
5 More Computer Viruses You Really Don't Want to Get
From taking your files ransom to foiling uranium enrichment, here are five more computer viruses that you really want to avoid.
TED Talks
Carl June: A "living drug" that could change the way we treat cancer
Carl June is the pioneer behind CAR T-cell therapy: a groundbreaking cancer treatment that supercharges part of a patient's own immune system to attack and kill tumors. In a talk about a breakthrough, he shares how three decades of...
TED Talks
Joshua Prince-Ramus: Building a theater that remakes itself
Can architects re-engineer their design process? Joshua Prince-Ramus shows how the results can be spectacular. He walks us through his fantastic re-creation of the Wyly Theater as a giant "theatrical machine" that reconfigures itself at...
Curated Video
The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Bots and Botnets
Here, we talk about these two very popular terms in cyber security, Bot/Botnet.
Curated Video
Cisco CCNA 200-301: The Complete Guide to Getting Certified - Common Attacks
In this video, dive into common network attacks, such as man-in-the-middle, DDoS, and spoofing.
Curated Video
Cisco CCNA 200-301: The Complete Guide to Getting Certified - Threat Defense Solutions
In this video, learn about modern network threat defense solutions, including firewalls, IPS/IDS, and antivirus software.
Curated Video
Cisco CCNA 200-301: The Complete Guide to Getting Certified - The Security Threat Landscape
In this video, explore the various types of security threats, including malware, phishing, and DoS attacks.
Curated Video
What is the Trojan Horse?
Discover the fascinating story of the Trojan Horse, one of the most famous tricks in ancient history. In this video, we explore how the Greeks used a giant wooden horse to enter the city of Troy and win the Trojan War. Learn about Greek...
Curated Video
The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Trojan
This video talks about mobile trojan horse malware. They can disguise themselves as a legitimate software application to attack the application / device.
<
br/>
This clip is from the chapter "Mobile Threats and Countermeasures" of...
<
br/>
This clip is from the chapter "Mobile Threats and Countermeasures" of...
Mythology & Fiction Explained
The Trojan War | The Story Behind the Fall of Troy
Mythology & Fiction Explained explores the various legends and stories surrounding the Trojan War
Curated Video
Introduction to IT and Cybersecurity: Information Protection
Part 14/16 of Introduction to IT and Cybersecurity series: In this video, the presenter discusses the various approaches and controls that can be implemented to protect information. The video explains how an organization's internal...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Malware
Malicious software is referred to as malware and includes various types including ransomware, fileless viruses, worms, keyloggers, and trojan horses. Infected computers that periodically contact command and control servers are called...
Amor Sciendi
Misinterpretations: Laocoon and His Sons | AmorSciendi
Have you seen this sculpture? I came across it many years ago in the Vatican Museum, and it's one of those that stays with you. I never pursued my interest in the sculpture, though, until I came across a reference to it while reading...
Curated Video
Describe the different types of malware that could affect a computer system or network : Understand the types of malware
From the section: What are the threats?. This section includes threats, types of malware and lot more.
This video gives an overview of malware and threats. It shows how to recognize malware, types of malware and how devices...
This video gives an overview of malware and threats. It shows how to recognize malware, types of malware and how devices...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Malware
This video explains the types of malware and what they do. This clip is from the chapter "Protecting Your Network" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn how to protect...
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Deeper Dive Look at IT Vulnerabilities
This video explains a deeper dive look at IT vulnerabilities.
<
br/>
This clip is from the chapter "Why We Need Risk Management" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the...
<
br/>
This clip is from the chapter "Why We Need Risk Management" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the...