Instructional Video11:31
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Social Engineering

Higher Ed
Here, we will discuss social engineering, where human emotions and interactions are exploited to gather information.
Instructional Video6:39
PBS

How To Protect Your Parents From Scams

12th - Higher Ed
Scams are on the rise, and even if you're savvy, your loved ones may need help avoiding them!
Instructional Video2:24
Curated Video

How to Make a Prank Phone Call

9th - Higher Ed
Howcast - People like Ralphige and the Jerky Boys have elevated prank phone calls to an art. Here’s how you can get in on the fun.
Instructional Video1:22
Curated Video

How to Pull the Refrigerator Handle Switch Prank

9th - Higher Ed
Howcast - Most refrigerators allow for reversing the door swing. Normally you also switch the handle. But not if you want to thoroughly confuse the victim of this practical joke.
Instructional Video1:54
Curated Video

How to Scare the Crap Out of Someone

9th - Higher Ed
Howcast - Planning a prank? There’s nothing like scaring someone out of their mind.
Instructional Video1:51
Curated Video

How to Craft the Perfect Insult

9th - Higher Ed
Howcast - At the receiving end of verbal abuse? Don't just sit back and take it! Learn how to dish it out.
Instructional Video2:23
Curated Video

How to Help Someone Suffering from Heat Stroke

9th - Higher Ed
Howcast - The body has natural means of regulating its own temperature—but failure to do so in the face of extreme heat is called heatstroke, and it can result in permanent organ damage or even death. Infants, the elderly, and athletes...
Instructional Video2:02
Curated Video

How to Help Someone Who Has Been Poisoned

9th - Higher Ed
Would you know what to do if someone ingested poison? Equally important, would you know what not to do?
Instructional Video2:23
Curated Video

How to Stay Safe on Campus

9th - Higher Ed
You can dramatically reduce your chances of being a crime victim just by following a few rules.
Instructional Video0:53
Curated Video

How to Shower Someone with Confetti

9th - Higher Ed
Give someone his or her own personal ticker tape parade with this easy prank.
Instructional Video1:31
Curated Video

How to Pull the Burning Pen Prank

9th - Higher Ed
No one will ever ask to borrow your pen again after you pull this hair-raising hoax.
Instructional Video1:26
Curated Video

How to Pull the Spilled Coffee Prank

9th - Higher Ed
Infuse some caffeine into your usual workplace high jinks with this little number.
Instructional Video1:49
Curated Video

How to Treat Heatstroke

9th - Higher Ed
Heatstroke occurs when the body is unable to cool itself. Knowing first-aid techniques to treat this dangerous condition could save a life.
Instructional Video1:02
Curated Video

Sisters of Philadelphia shooting victim remember their 'kind' brother

9th - Higher Ed
Sisters of Philadelphia shooting victim remember their 'kind' brotherSource: Reuters
Instructional Video1:58
Curated Video

The Sole To Persevere

3rd - Higher Ed
Jessica Cox has been facing obstacles her entire life. Born without arms, she has had to learn how to live life differently from everyone else, but that has never made her feel different as a person.



Jessica has gained...
Instructional Video24:15
Curated Video

Framing the story of 'Little Red Riding Hood' as a newsworthy event

Pre-K - Higher Ed
Pupil outcome: I can identify the newsworthy elements within the story of 'Little Red Riding Hood'. Key learning points: - Little Red Riding Hood is a traditional tale which has been adapted and retold in different ways. - Journalistic...
Instructional Video18:07
Curated Video

Comparing the victims in ‘The Speckled Band’ and ‘The Boscombe Valley Mystery’

Pre-K - Higher Ed
Pupil outcome: I can compare the victims of ‘The Speckled Band’ and ‘The Boscombe Valley Mystery’. Key learning points: - Julia Stoner and Charles McCarthy are presented as very different victims. - Stoner is presented more...
Instructional Video13:54
Oxford Comma

Reading, Summary, and Analysis of Dunbar's "The Haunted Oak"

9th - 12th
Paul Laurence Dunbar had the courage and skill to write about what few at the time, and even today, wanted to acknowledge. The result is a poem about one of America's most poignant ghosts.
Instructional Video3:46
Curated Video

Protecting Marine Wildlife: Innovative Solutions to Reduce Bycatch Deaths

Pre-K - Higher Ed
This video highlights the issue of bycatch in fishing practices and explores innovative solutions to protect marine mammals such as turtles, dolphins, and whales. It showcases the use of LED weights and sound-reflecting gill nets to...
Instructional Video5:33
Curated Video

What is the Drama Triangle? Stephen Karpman's Drama Triangle

10th - Higher Ed
The Drama Triangle is a model developed by Stephen Karpman. It helps us understand the dynamics of dysfunctional sequences of miscommunication.



Karpman identified the three roles in the emotional structure of...
Instructional Video5:16
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Phishing Attacks

Higher Ed
Here, we will understand the concepts of phishing, how the attack is performed, the dangers of opening phishing emails, and how to prevent them.
Instructional Video2:17
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Using the Inbuilt AntiRansomware Tool

Higher Ed
In this video, you will learn about the built-in anti-ransomware tools available in the Windows operating system.
Instructional Video8:02
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Ransomware - Cryptolocker, WannaCry, Bad Rabbit

Higher Ed
In this video, we will look at the most effective form of malware today globally, ransomware, a form of malware where the attacker prevents the victim from accessing the computer or the files.
Instructional Video7:59
Curated Video

Practical Cyber Hacking Skills for Beginners - Web Attack - Cross-Site Scripting

Higher Ed
In this lesson, we will look at cross-site scripting, which is a client-side attack that targets the victim's browser with malicious code.