Instructional Video6:18
Organizational Communication Channel

Types of Questions

Higher Ed
These are the type of questions groups ask for discussions: Fact, value, policy, and prediction. Each type of question leads group discussions in predictable directions. If you want to get better at group leadership skills, asking the...
Instructional Video4:56
Organizational Communication Channel

Group Attraction: 3 Reasons Certain Groups Attract Us

Higher Ed
Group Attraction explains why we join certain groups and not others. This video looks at the top three reasons we are attracted to groups.
Instructional Video11:49
Economics Explained

Capitalism Doesn't Need Consumers | Economics Explained

9th - Higher Ed
After the launch of Chat-GPT and Dall-E, AI started to raise concerns for jobs and society. As machines and sophisticated technologies surpass human abilities, a growing number of complex jobs are being outsourced to machines who can do...
Instructional Video8:09
Hip Hughes History

5 Ways to Win With Technology in Your Classroom

6th - 12th
My five pieces of advice for teachers who find themselves with a 1:1 classroom. Check out my classic flip tutorial • I Flip, You Flip,... and my recommended tech apps • I Flip, You Flip,...
Instructional Video4:08
Curated Video

Rearview Mirror Part 1: The Power of Self Reflection

6th - 8th
In this episode of "In Control," we kickstart our series titled "Rearview Mirror" by delving into the power of self-reflection. Using the metaphor of a rearview mirror, we highlight how examining our past actions can inform better...
Instructional Video2:28
friEdTech

Google Collections

Higher Ed
Collections allow you to curate items and other creative assets with one another. You can combine images, videos, and text to create shareable collections.
Instructional Video3:40
Vlogbrothers

Who Owns DFTBA? An Introduction to Trademarks

6th - 11th
In which John discusses the increasingly widespread use by large corporations of the phrases "DFTBA" and "Don't forget to be awesome," and discusses why even though we COULD stop those uses by trademarking nerdfighter slogans, we aren't...
Instructional Video2:16
Vlogbrothers

What's Up with Start Ups

6th - 11th
I'm just getting a little sick of the system that values aggregators of content more than creators of content, and presumes some kind of magical future where owning users free time results in lots of money.
Instructional Video3:00
Vlogbrothers

Please Google, Take Me to Mars

6th - 11th
In which Hank talks an awful lot about Mars..and then goes kinda crazy...
Instructional Video8:19
All In One Social Media

How To Find Trending Sounds On TikTok For Your Business

Higher Ed
TikTok success starts with the perfect sound, but how do you know which ones are trending? Will work best for you? Will help you go viral? In this video, learn how to find trending sounds on TikTok to help your business go viral with...
Instructional Video1:32
Curated Video

Open-source Intelligence (OSINT)

Higher Ed
In this video, you will learn about OSINT (Open-source intelligence), which is a multi-methods methodology for collecting, analyzing and making decisions about data accessible in publicly available sources to be used in an intelligence...
Instructional Video6:58
Curated Video

Mobile Malware Types

Higher Ed
In this video, we will explain the various types of mobile malway such as RAT, trojans, spyware, etc..
Instructional Video1:51
Curated Video

Who is Selling Your Email Addresses

Higher Ed
This video will help you identify those companies you sign up to, who in return sell your email addresses to companies who will spam you. You can easily identify those now.
Instructional Video6:27
Curated Video

Hack Using Google ONLY

Higher Ed
You will learn how to easily perform hacking using search engines and publicly available information. Find passwords, confidential files, and gain access to systems with minimum efforts.
Instructional Video5:21
Curated Video

DNS Poisoning Attack

Higher Ed
In this video, you will use KALI to learn how to cache poison the DNS (Domain Name Server) entries to redirect the requester to a different page.
Instructional Video6:27
Curated Video

Google Dorks Live Examples

Higher Ed
Spot the vulnerabilities in the wild, leverage Google to hack into web applications and systems that are published over the Internet. You will be surprised by how easy it is.
Instructional Video5:03
Curated Video

LAB 2: Google Hacking

Higher Ed
I will show you the basics of Google hacking without any prior technical knowledge
Instructional Video0:56
Curated Video

Multi Factor Authentication

Higher Ed
This video will shed the light on the additional security layer you need in order to protect your everything. Multi factor authentication or MFA
Instructional Video5:35
Curated Video

Sender Framework Policy (SPF)

Higher Ed
In this tutorial, you will learn about SPF and how to set it up on your DNS server.
Instructional Video3:02
Curated Video

Lab 1 Introduction to LTSpice -Task 0

Higher Ed
Basics of Power Electronics - Walid Issa Lab 1 Introduction to LTSpice
Instructional Video5:54
Curated Video

Wireshark D5 V3 - HTTP analysisDNS analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 3: DNS analysis
Instructional Video4:15
Curated Video

Rogue Hotpot with Fake Facebook Page

Higher Ed
Learn how to create a rogue access point, install a fake social media website, and capture the traffic. We will use Evil Portal component.
Instructional Video8:21
Curated Video

Lab 1 Task 4 LTSPICE Models and Library

Higher Ed
Lab 1 Task 4 LTSPICE Models and Library Walid Issa
Instructional Video5:21
Curated Video

Perform a DNS Spoofing Attack

Higher Ed
This video will teach you how to perform a DNS spoofing attack, and how to take user's URL request to a crafted web application of your own