News Clip2:58
Curated Video

Republicans, Dems clash at Clinton email hearing

Higher Ed
Republican and Democratic lawmakers clashed and three witnesses ordered to testify on Capitol Hill about Hillary Clinton's use of a private email server either did not appear, or refused to answer questions, invoking the Fifth Amendment....
News Clip2:58
Curated Video

GOP, Dems Clash at Clinton Email Hearing

Higher Ed
Republican and Democratic lawmakers clashed and three witnesses ordered to testify on Capitol Hill about Hillary Clinton's use of a private email server either did not appear, or refused to answer questions, invoking the Fifth Amendment....
News Clip2:15
Curated Video

GOP, Dems Clash at Clinton Email Hearing

Higher Ed
FOR CLEAN VERSION SEE STORY NUMBER: apus062939Republican and Democratic lawmakers clashed and three witnesses ordered to testify on Capitol Hill about Hillary Clinton's use of a private email server either did not appear, or refused to...
Instructional Video11:32
TED Talks

Peter Beck: Small rockets are the next space revolution

12th - Higher Ed
We're in the dawn of a new space revolution, says engineer Peter Beck: the revolution of the small. In a talk packed with insights into the state of the space industry, Beck shares his work building rockets capable of delivering small...
Instructional Video10:07
TED Talks

TED: Your phone company is watching | Malte Spitz

12th - Higher Ed
What kind of data is your cell phone company collecting? Malte Spitz wasn’t too worried when he asked his operator in Germany to share information stored about him. Multiple unanswered requests and a lawsuit later, Spitz received 35,830...
Instructional Video9:37
SciShow

5 of the Worst Computer Viruses Ever

12th - Higher Ed
Michael Aranda explains five of the worst computer viruses that have hit the net!
Instructional Video10:35
Bozeman Science

Cell Communication

12th - Higher Ed
Paul Andersen discusses cell communication. He begins by explaining how he communicates with other individuals using various forms of electronic communication. He them explains how cells communicate when the distance between them is big,...
Instructional Video11:13
SciShow

How the Internet Was Invented | The History of the Internet, Part 1

12th - Higher Ed
The Internet is older than you might think!
Instructional Video8:01
SciShow

What Happens to an Email After You Click "Send"?

12th - Higher Ed
Email is one of the most essential things to our life. But do you actually know what happens when you click the "send" button, and how it's sent to your friends?
Instructional Video10:46
Crash Course

The Secret to Business Writing: Crash Course Business - Soft Skills

12th - Higher Ed
In business, you need to know how to write. And that involves learning a bunch of things like knowing who you're writing to and what kind of thing you're writing. In this episode of Crash Course Business Soft Skills, Evelyn talks to us...
Instructional Video3:36
Curated Video

Increase Your Email Responses: How to Get People to Respond to Emails

10th - Higher Ed
Do you want to increase your email responses? I expect you do. After all, you take the trouble to craft your email. So why wouldn't you want people to respond to it? Project Management technology is changing fast. But it's a fair bet...
Instructional Video1:42
Learning Mole

How Does it work? - Email

Pre-K - 12th
This video is explaining how Email works for kids.
Instructional Video3:55
Curated Video

Let’s Communicate About Communication

3rd - Higher Ed
Miss Palomine gives the student an overview of how communication and related devices have changed.
Instructional Video4:19
Curated Video

Using Communication Technology

3rd - Higher Ed
Miss Palomine uses her cell phone to find her friend at an amusement park. This leads to a discussion of the benefits of current communication technologies, like the cell phone and email.
Instructional Video4:02
Curated Video

US Postal Service

3rd - Higher Ed
Miss Palomine talks about the history of the US Postal System.
Instructional Video3:51
Curated Video

SkillSprints: Understanding and Preventing Phishing Emails

Pre-K - Higher Ed
Phishing is a major cybersecurity problem. In this video you'll learn how to identify Phishing emails and properly dispose of them when you receive them.
Instructional Video7:15
Hip Hughes History

The Hatch Act Explained

6th - 12th
Did James Comey violate the Hatch Act? What is the Hatch Act?
Instructional Video2:30
Curated Video

Business Email Compromise

Higher Ed
The video explains the phishing attack of BEC, how it originates and what are the tricks used on employees
Instructional Video3:04
Curated Video

Other Phishing Techniques

Higher Ed
The video explains the phishing attack techniques and how you can identify and avoid them
Instructional Video6:52
Curated Video

Hack Facebook, Twitter, and Gmail Accounts

Higher Ed
We will use the SET tool to setup a phishing campaign in order to hack social media accounts
Instructional Video1:47
Curated Video

Dealing With Security Incidents

Higher Ed
This video will advise you on how to deal with cyber security incidents once they happen, and whom to contact in order to get help
Instructional Video1:51
Curated Video

Who is Selling Your Email Addresses

Higher Ed
This video will help you identify those companies you sign up to, who in return sell your email addresses to companies who will spam you. You can easily identify those now.
Instructional Video4:28
Curated Video

DKIM Email Security

Higher Ed
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Instructional Video4:49
Curated Video

Execute a Phishing Attack

Higher Ed
In this video, you will learn how to plan and execute a phishing attack using the SET tool