Instructional Video9:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations

Higher Ed
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
Instructional Video1:43
60 Second Histories

Maya religion - sacrifice

K - 5th
This short video looks at why the Ancient Maya believed in sacrifice and how they carried it out - not too gruesome but not for the feint-hearted either.
Instructional Video8:04
Kult America

Abandoned - Atlantic City

Higher Ed
Over the past years Atlantic City, New Jersey, has been slowly turning into a ghost city. Once one of the most popular gambling destinations, now it’s dotted with enormous abandoned hotels with little to see and little to eat. What was...
Instructional Video10:36
Weird History

What Was It Like To Be A Body Collector During The Black Plague?

12th - Higher Ed
Buboes, black spots, and bloody froth: it was all in a day’s work for Black Death body collectors. The plague, which may have killed as many as 200 million people worldwide, changed everything—including body disposal.
Instructional Video5:10
Science360

Autonomous Helicopters

12th - Higher Ed
Claire Tomlin, formerly of Stanford and currently with Berkeley, is pushing the envelope of aerospace design, building a new class of autonomous helicopters, with support from the National Science Foundation. These aircraft don't need a...
Instructional Video31:25
The Wall Street Journal

Working Together

Higher Ed
Businesses need to cooperate with government and with one another to defend against cybersecurity threats. But it isn't always clear how to make those relationships work. Leaders in this effort explore how to get it done.
Instructional Video12:03
Mazz Media

My Blog: Why Are There Bullies? (What are They Thinking?)

6th - 8th
This program explores the reasons why kids become bullies. Through live-action, age-appropriate scenarios, viewers will come to understand why some kids are so aggressive, hurtful and mean to their classmates, teammates, friends and...
Instructional Video6:25
Curated Video

Surviving Trauma and Finding Inner Power: The Story of Sam

Higher Ed
Sam's Triumph part 1/4: The video is a transcript of an interview with a survivor of the Holocaust, who shares his experiences of living through the trauma of the war and losing his family members to the violence of the German occupying...
Instructional Video7:57
Step Back History

Elizabeth Bathory and the Literal Blood Bath

12th - Higher Ed
The Countess Elizabeth Bathory is one of the most infamous women in history. She's known for legendarily drinking and bathing in the blood of young girls. But, how accurate is that?
Instructional Video9:35
AllTime 10s

10 Mysteries Solved By The Internet

12th - Higher Ed
Sometime it takes more than good old fashioned detective work to solve the supposedly unsolvable.
Instructional Video6:19
Curated Video

Surviving Childhood Trauma: A Personal Story

Higher Ed
Maria's Triumph part 1/4: The video contains a personal testimony by an individual who grew up in the Dominican Republic and experienced trauma such as alcoholism in their family, abuse and rape at a young age. They share their childhood...
Instructional Video9:55
Curated Video

Bug Bounty Program Certification 5.3: Perform Denial of Service Attack on Server

Higher Ed
This video will help you understand DOS attack process • Use LOIC tool to perform DOS attack • Attack on other systems in network • Monitor DOS attack using Wireshark
Instructional Video18:05
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Hacking Terminology

Higher Ed
This video teaches you the terminology used in hacking.
r/>
This clip is from the chapter "Networking Tools and Essential Terminology" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
Instructional Video30:11
The Wall Street Journal

The Threat Landscape

Higher Ed
The FBI discusses how businesses are being targeted, how the picture varies at a national/international level and what resources or help the respective agencies can offer.
Instructional Video1:46
60 Second Histories

Mary Seacole; successfully treats cholera

K - 5th
Part 2 of this series, Mary describes her first experience of treating cholera victims in Panama. 
Instructional Video1:43
Institute for New Economic Thinking

The Origins of American Racial Disparities

Higher Ed
Why does the racial divide persist between comparatively similar segments of the workforce? If additional education is not the solution to racial inequality, what is? Why did the Civil War lead to a troubling trend in the North? In this...
Instructional Video3:44
Science ABC

How Long It Takes For Chloroform To Make A Person Unconscious?

Pre-K - Higher Ed
In 1865, The Lancet, the medical journal, called upon any person, criminal or not, to prove that waving a chloroform-drenched handkerchief was enough to knock someone out. To date, nobody has stepped forward!



While the right...
Instructional Video2:27
Healthcare Triage

Samoa's Devastating Measles Outbreak: An Antivax Story

Higher Ed
Measles is one of the world’s most contagious diseases but is preventable with high vaccination rates. Unfortunately, this isn't happening everywhere, including in Samoa.
Instructional Video5:18
Curated Video

Crocodilian Interaction with Ancient and Modern Humans

Pre-K - Higher Ed
This video explores the fascinating history and mythology surrounding crocodilians, shedding light on their cultural significance and the misconceptions that have surrounded them. It also delves into the threats they face today,...
Instructional Video6:16
Psychology Unlocked

What's the difference between INTERNAL and EXTERNAL VALIDITY?

Higher Ed
Validity is a key concept in research methods. It can be broken down into two umbrella categories: internal validity and external validity. 1) Internal validity considers factors within the design of the experiment. 2) External validity...
Instructional Video14:58
The Wall Street Journal

What Are The New Risks In Ransomware?

Higher Ed
WSJ's Marilia Wyatt and David Breg discuss the latest incidents of ransomware attacks, the new compliance risks for businesses, and how attackers may respond.
Instructional Video12:01
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Stored XSS

Higher Ed
In this video, you'll learn how to use stored XSS (persistent XSS) for your web applications.
r/>
This clip is from the chapter "Web Application Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp:...
Instructional Video13:55
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Session Fixation

Higher Ed
This video shows you what session fixation is with an example.
r/>
This clip is from the chapter "Web Application Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
Instructional Video9:12
Brainwaves Video Anthology

Kanchan Bhaskar - Leaving: How I Set Myself Free from an Abusive Marriage

Higher Ed
Kanchan Bhaskar was born and brought up in New Delhi, India. She holds a master’s degree in social work from Delhi University and a postgraduate certificate in personnel management and industrial relations. She moved to the US in 2000...