Instructional Video4:41
Curated Video

3 Ways to Hack the IELTS Exam

9th - Higher Ed
Today you’ll learn 3 specific strategies to hack the IELTS Exam. There are efficient ways to prepare for IELTS and ways that waste time. Listen in to make sure you know these time-saving tips! The first thing to know here is that there...
Instructional Video1:49
Tarver Academy

HOW TO TAKE A PICTURE THE FULL LENGTH OF YOUR IPHONE 169

12th - Higher Ed
In This Episode, Tyler Teaches Us About HOW TO TAKE A PICTURE THE FULL LENGTH OF YOUR IPHONE 169
Instructional Video3:09
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Designing security into our software

Higher Ed
CISM Domain 1: Information Security Governance: Designing security into our software This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security...
Instructional Video1:14
Next Animation Studio

FBI tricked international cartels into using ‘encrypted’ phones

12th - Higher Ed
The huge surveillance operation started years ago, when a convicted drug smuggler offered the ‘back door’ of his special new gangster phone to the FBI.
Instructional Video2:38
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - How Hard Is it to Get Hacked?

Higher Ed
You will learn how hard it has become to hack into systems and company networks these days. This clip is from the chapter "How Hard Is it to Get Hacked?" of the series "The Beginners 2022 Cyber Security Awareness Training Course".This...
Instructional Video8:06
Curated Video

Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video1:09
Next Animation Studio

U.S. and allies accuse China of serious ransomware crimes

12th - Higher Ed
Beijing is being accused of supporting Chinese officials who hire hackers to steal from individuals and firms worldwide.
Instructional Video1:28
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Greeting from Your Instructor, Reza

Higher Ed
This clip is from the chapter "Course Introduction" of the series "The Beginners 2022 Cyber Security Awareness Training Course".This section introduces you to the course.
Instructional Video16:16
Curated Video

CISSP®- US Laws, European Laws, and International Treaties

Higher Ed
This video focuses on US laws, European laws, and international treaties. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Instructional Video15:21
Curated Video

Building a Responsive Application with Bootstrap (Video 12)

Higher Ed
Bootstrap discards the myth of ���the creative typeï¿½Û and enforces the belief that even you are capable of design. It is easy to learn, open source, customizable, and coupled with an incredible support from the community; in...
Instructional Video8:39
IDG TECHtalk

RSA Conference tips and predictions | TECH(talk)

Higher Ed
What should you expect at this year's RSA Conference? Security reporter J.M. Porup and TECH(talk) host Juliet Beauchamp talk about the hot topics and sessions to look for at the March 4 to 8 gathering in San Francisco.
Instructional Video0:52
Science360

What is neuroethics?

12th - Higher Ed
What is neuroethics? Tim Brown, doctoral candidate and research assistant at University of Washington's Center for Neurotechnology, answers the question on this edition of "Ask a Scientist."
Instructional Video5:32
Packt

CompTIA Network+ Certification N10-007: The Total Course - Symmetric Encryption

Higher Ed
This video explains how to perform symmetric encryption. Both parties have the same key to encrypt and decrypt. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA...
Instructional Video3:12
Science360

EDITORS' PICK: 'GO BABY GO!' MOBILITY FOR KIDS WITH DISABILITIES

12th - Higher Ed
The exploration experiences that children have at an early age play an important role in cognitive development. A research team from the University of Delaware, led by physical therapy professor Cole Galloway, is working on ways to help...
Instructional Video9:56
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Creating Android Payloads with Msfvenom

Higher Ed
In this video, you'll learn to create Android payloads with Msfyenom. This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll...
Instructional Video4:18
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Identifying IT Risks

Higher Ed
This video explains identifying IT risks. This clip is from the chapter "Risk Identification" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to identify risk.
Instructional Video7:04
Centro Selenium

El INCREÍBLE trastorno que te hace prestar ATENCIÓN a solo la MITAD | HEMINEGLIGENCIA

9th - 12th
Descubre en este video que es la heminegligencia o negligencia hemiespacial, que es lo que la produce y cual es su tratamiento o cura
Instructional Video10:28
TLDR News

The Huawei Hacking Controversy Explained - TLDR News

12th - Higher Ed
Over recent months, Chinese telecommunications and electronics company, Huawei has found itself at the centre of international controversy. There has been growing fear that Huawei’s equipment can or will be used by the Chinese government...
Instructional Video4:12
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Deeper Dive Look at IT Vulnerabilities

Higher Ed
This video explains a deeper dive look at IT vulnerabilities. This clip is from the chapter "Why We Need Risk Management" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the need for...
Instructional Video23:46
The Wall Street Journal

The Road to Recovery

Higher Ed
SolarWinds CEO Sudhakar Ramakrishna tells the story of the 2020 attack on the company and its customers that brought supply chain attacks to the fore and was the start of a long journey of remediation and winning back customer support.
Instructional Video11:28
Flame Media

Real Future: Hackers

12th - Higher Ed
As companies like Ashley Madison and celebrities like Jennifer Lawrence have learned, being hacked can have devastating consequences. But how bad can it get? Our host decides to find out by inviting two of the world's most elite hackers...
Instructional Video1:23
Next Animation Studio

Hackers force shutdown of major U.S. pipeline

12th - Higher Ed
The hack on a 5,500-mile pipeline on the U.S. East Coast is being looked at as one of the most significant attacks on key national infrastructure in history.
Instructional Video7:35
ACDC Leadership

5 comparative advantage HACKS you need to know

12th - Higher Ed
Hey econ students, I made this video to help you rock the comparative advantage and terms of trade question on your econ exams.
Instructional Video4:59
Science360

Science of the Winter Olympics - Curling

12th - Higher Ed
Curling has been in the Winter Olympics for four years now, but it still seems a little strange to most of us. John Shuster, the captain--or "skip"--of the U.S. Curling Team in Vancouver, explains this unusual sport, and NSF-funded...