Instructional Video12:09
Crash Course

Mythical Language and Idiom: Crash Course World Mythology #41

12th - Higher Ed
It's the end of the world, everybody. Well, it's the end of our mythology series, anyway. This week, we're talking about how mythological themes have made their way into the English language. We're taking on the Herculean task of...
Instructional Video10:17
SciShow

5 More Computer Viruses You Really Don't Want to Get

12th - Higher Ed
From taking your files ransom to foiling uranium enrichment, here are five more computer viruses that you really want to avoid.
Instructional Video15:09
TED Talks

Carl June: A "living drug" that could change the way we treat cancer

12th - Higher Ed
Carl June is the pioneer behind CAR T-cell therapy: a groundbreaking cancer treatment that supercharges part of a patient's own immune system to attack and kill tumors. In a talk about a breakthrough, he shares how three decades of...
Instructional Video18:35
TED Talks

Joshua Prince-Ramus: Building a theater that remakes itself

12th - Higher Ed
Can architects re-engineer their design process? Joshua Prince-Ramus shows how the results can be spectacular. He walks us through his fantastic re-creation of the Wyly Theater as a giant "theatrical machine" that reconfigures itself at...
Instructional Video3:28
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Bots and Botnets

Higher Ed
Here, we talk about these two very popular terms in cyber security, Bot/Botnet.
Instructional Video18:17
Curated Video

Cisco CCNA 200-301: The Complete Guide to Getting Certified - Common Attacks

Higher Ed
In this video, dive into common network attacks, such as man-in-the-middle, DDoS, and spoofing.
Instructional Video17:11
Curated Video

Cisco CCNA 200-301: The Complete Guide to Getting Certified - Threat Defense Solutions

Higher Ed
In this video, learn about modern network threat defense solutions, including firewalls, IPS/IDS, and antivirus software.
Instructional Video13:43
Curated Video

Cisco CCNA 200-301: The Complete Guide to Getting Certified - The Security Threat Landscape

Higher Ed
In this video, explore the various types of security threats, including malware, phishing, and DoS attacks.
Instructional Video5:23
Curated Video

What is the Trojan Horse?

K - 5th
Discover the fascinating story of the Trojan Horse, one of the most famous tricks in ancient history. In this video, we explore how the Greeks used a giant wooden horse to enter the city of Troy and win the Trojan War. Learn about Greek...
Instructional Video3:34
Curated Video

The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Trojan

Higher Ed
This video talks about mobile trojan horse malware. They can disguise themselves as a legitimate software application to attack the application / device.
<
br/>
This clip is from the chapter "Mobile Threats and Countermeasures" of...
Instructional Video41:39
Mythology & Fiction Explained

The Trojan War | The Story Behind the Fall of Troy

12th - Higher Ed
Mythology & Fiction Explained explores the various legends and stories surrounding the Trojan War
Instructional Video17:44
Curated Video

Introduction to IT and Cybersecurity: Information Protection

Higher Ed
Part 14/16 of Introduction to IT and Cybersecurity series: In this video, the presenter discusses the various approaches and controls that can be implemented to protect information. The video explains how an organization's internal...
Instructional Video13:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Malware

Higher Ed
Malicious software is referred to as malware and includes various types including ransomware, fileless viruses, worms, keyloggers, and trojan horses. Infected computers that periodically contact command and control servers are called...
Instructional Video6:50
Amor Sciendi

Misinterpretations: Laocoon and His Sons | AmorSciendi

12th - Higher Ed
Have you seen this sculpture? I came across it many years ago in the Vatican Museum, and it's one of those that stays with you. I never pursued my interest in the sculpture, though, until I came across a reference to it while reading...
Instructional Video3:41
Curated Video

Describe the different types of malware that could affect a computer system or network : Understand the types of malware

Higher Ed
From the section: What are the threats?. This section includes threats, types of malware and lot more.



This video gives an overview of malware and threats. It shows how to recognize malware, types of malware and how devices...
Instructional Video6:50
Amor Sciendi

Misinterpretations Laocoon and His Sons

12th - Higher Ed
Misinterpretations Laocoon and His Sons
Instructional Video10:12
Packt

CompTIA Network+ Certification N10-007: The Total Course - Malware

Higher Ed
This video explains the types of malware and what they do. This clip is from the chapter "Protecting Your Network" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn how to protect...
Instructional Video4:12
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Deeper Dive Look at IT Vulnerabilities

Higher Ed
This video explains a deeper dive look at IT vulnerabilities.
<
br/>
This clip is from the chapter "Why We Need Risk Management" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the...