Instructional Video3:46
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Welcome to the Course

Higher Ed
In this video, the author talks about what to expect from this course and explains why cybersecurity is important. This clip is from the chapter "Introduction" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part...
Instructional Video11:28
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 1 (Part1)

Higher Ed
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Instructional Video11:29
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 1 (Part1)

Higher Ed
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how the hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Instructional Video3:05
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Summary – Hacking AngularJS Applications

Higher Ed
This is a summary video on hacking AngularJS applications. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS...
Instructional Video3:36
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Hacking AngularJS Applications

Higher Ed
This video introduces the section. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS applications.
Instructional Video1:31
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Hacking Web Applications via PDFs, Images, and Links

Higher Ed
This video introduces the section. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking web...
Instructional Video5:51
Curated Video

I FINALLY understand the Maillard reaction

Pre-K - Higher Ed
You’ve probably heard of the Maillard reaction, but here's how it actually works (AND how to hack it).
Instructional Video2:45
The Business Professor

Racketeering

Higher Ed
Racketeering is a type of organized crime in which the persons set up a coercive, fraudulent, extortionary, or otherwise illegal coordinated scheme or operation to repeatedly or consistently collect a profit.
Instructional Video3:46
Vlogbrothers

They Hacked Me

6th - 11th
Thank you to Sherri Davidoff from LMG Security for helping me both with this video and also with recovering from my hack. If you're thinking "I won't get hacked, I'm not a public person like Hank," that does NOT protect you. Most hacks...
Instructional Video3:52
Vlogbrothers

Hackers, Cyber crime, and a New Kind of War.

6th - 11th
In which Hank talks briefly about the fundamental shift in espionage, warfare, crime, and activism that may re-define our age. Hackers have been mounting increasingly sophisticated attacks. Billions of dollars have been stolen, and even...
Instructional Video2:42
Curated Video

Handle Passwords Safely

Higher Ed
This video will introduce you to best practices in handling your passwords
Instructional Video17:35
Curated Video

Introduction to Termux

Higher Ed
A simple tool for ethical hacking is Termux. There are numerous tools for Termux available online, so we've compiled a list of the top hacking tools for Termux along with instructions on how to use each one.
Instructional Video1:55
Curated Video

Ethical Hacking with Kali Linux Introduction

Higher Ed
This video is an introduction on ethical hacking
Instructional Video1:09
Next Animation Studio

How China used iPhone hack in Uyghur genocide

12th - Higher Ed
MIT’s Technology Review magazine recently analyzed the infamous Chaos hack that targeted iPhones in 2018, suggesting that China used a civilian competition to create the hack and then used it to spy on its Uyghur Muslim minority. The...
Instructional Video16:03
Physics Girl

The Most EXPLOSIVE Holiday Gift Ever; Making A Volcano From Wrapping Paper l The Great Gift Exchange

9th - 12th
As part of THE GREAT GIFT EXCHANGE, Physics Girl is transported to a whimsical “Wrapshop” to wrap a charitable gift for creator Alex Wassabi. With help from The World’s Most Famous Gift Wrap Artist, Physics Girl creates an EXPLOSIVE gift...
Instructional Video10:11
TLDR News

Why Don't We Vote Online in Elections? - TLDR Explains

12th - Higher Ed
Voting can be complicated a time consuming, and having your say in an election can take its toll. That's why many have discussed taking voting online to make engaging in democracy quicker and easier. However, Estonia is the only country...
Instructional Video3:12
Science360

From Navy weather forecaster to NSF Graduate Research Fellow

12th - Higher Ed
Navy veteran Amy Battocletti describes her military service and her transition to academe. She is now a second-year Ph.D. student in the Biology Program at Georgetown University.
Instructional Video5:11
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - DNS Security

Higher Ed
DNS is a crucial network service used by everybody to resolve names to IP addresses and as a result, it is a target for attackers. This episode also discusses other protocols such has Simple Network Management Protocol (SNMP) and Secure...
Instructional Video2:32
Curated Video

Bug Bounty Program Certification 1.1: The Course Overview

Higher Ed
This video provides an overview of the entire course.
Podcast27:02
NASA

‎NASA in Silicon Valley: Geert Barentsen Talks About Bringing People Together To Contribute to Exoplanet Science

Pre-K - Higher Ed
A conversation with Geert Barentsen, the Guest Observer Office director for the Kepler and K2 mission at NASA’s Ames Research Center in Silicon Valley.
Instructional Video8:33
Englishing

Lesson on the FUTURE (Future Simple, going to, Present continuous, and Present Simple)

9th - Higher Ed
This lesson will delve into four types of tenses used for the future: Future Simple - will, going to, Present Continuous and Present Simple. For each one, Mr. P. will list the most important rules there are. He will provide examples as...
Instructional Video1:09
Next Animation Studio

U.S. charges four Chinese military operatives in Equifax 2017 hack

12th - Higher Ed
A federal grand jury charged four Chinese military officers on Tuesday for the massive hack of the credit rating giant Equifax that occurred in 2017.
Instructional Video24:23
The Wall Street Journal

The Year in Hacks

Higher Ed
Andy Ellis, chief security officer at Akamai and Siobhan Gorman, partner, Cybersecurity and Privacy at Brunswick Group, dissect some of the biggest hacks of the past year.
Instructional Video2:18
Next Animation Studio

Possible ‘Havana Syndrome’ attack delays V.P. Harris’ flight

12th - Higher Ed
Havana Syndrome is a mysterious illness that many experts believe could only be caused by directed energy weapons that pulse invisible microwaves at targets.