Instructional Video3:01
Curated Video

The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Removing Ransomware

Higher Ed
This video explains the different techniques to remove ransomware from your mobile device by switching on the device in safe mode. This clip is from the chapter "Mobile Threats and Countermeasures" of the series "The Absolute Beginners...
Instructional Video2:31
Curated Video

Real-World DevOps Project From Start to Finish - Essentials - Cron

Higher Ed
This video explores the power of cron jobs for automating repetitive tasks, teaching you how to schedule and manage cron jobs efficiently, enabling streamlined execution of routine operations, and freeing up valuable time for more...
Instructional Video10:21
Curated Video

Real-World DevOps Project From Start to Finish - Essentials - Packages

Higher Ed
This video dives deep into package management, guiding you through installing, updating, and managing software packages and effectively handling dependencies to ensure smooth operations within the DevOps ecosystem. This clip is from the...
Instructional Video3:25
Curated Video

Animals and their Tails - Hindi

Pre-K - 3rd
Learn about a beautiful moral about how everyone is beautiful how they are with this wonderful story about animals
Instructional Video2:55
Curated Video

Geography of Italy | Countries of the World

Pre-K - 5th
Geography of Italy | Countries of the World
Instructional Video5:24
Curated Video

How Can We Make An Equal Number?

K - 8th
Miss P reminds the student what “an equal number” means by showing an equal number of boots and gloves. She then shows the student several groups. The student must decide if there are an equal number of objects, and if not, by adding and...
Instructional Video6:08
Curated Video

British English Pronunciation Practice - "Inconsistent" Poem & Explanation

Pre-K - Higher Ed
British English pronunciation is notoriously tricky. To honor some of the nuances of its "inconsistent" pronunciation I wrote a little poem. Mastering pronunciation requires consistent and focused practice.
Instructional Video6:15
Learn German with Herr Antrim

#28 Compound Nouns (GwP1) - Deutsch lernen

9th - 12th
This is the 28th video in German with Puppets Series #1. In this video my puppets explain the tragedy of the German language losing its longest word to European bureaucracy and how you can make your own unending German word.
Instructional Video4:52
Lingokids

How to Draw a Cat

Pre-K - 3rd
What's fluffy and says meow? A cat! Tune in to this Crafts by Lingokids episode so that your little artist can learn how to draw a cat, step by step.
Instructional Video4:01
Señor Jordan

Video Recap over the years....

12th - Higher Ed
Video Recap over the years....
Instructional Video4:09
Señor Jordan

Present Tense -IR Verbs Made Easy with a Song in Spanish!

12th - Higher Ed
I wrote the lyrics to this one and put it to the tune of a familiar kids' song. I think it turned out well!
Instructional Video10:42
Señor Jordan

01067 Spanish Lesson - Present Tense - E-I Stem-changing verbs

12th - Higher Ed
¡Hola! In this video lesson we'll be talking about verbs that have a little change in the middle. We call these stem-changing verbs. This is a video on the third type of three.
Instructional Video9:16
Señor Jordan

01066 Spanish Lesson - Present Tense - O-UE Stem-changing verbs

12th - Higher Ed
¡Hola! In this video lesson we'll be talking about verbs that have a little change in the middle. We call these stem-changing verbs. This is a video on the second type of three.
Instructional Video10:33
Señor Jordan

01065 Spanish Lesson - Present Tense - E-IE Stem-changing verbs

12th - Higher Ed
¡Hola! In this video lesson we'll be talking about verbs that have a little change in the middle. We call these stem-changing verbs. This is a video on the first type of three.
Instructional Video4:46
Señor Jordan

02 Pedir, Servir and Traer in the Preterite

12th - Higher Ed
This video was made for Paige, Bailey, Gita, and Maria from Mrs. Bigenho's 6th period class at Franklin Regional.
Instructional Video7:58
Curated Video

Making Predictions as You Read

6th - 8th
How can readers make predictions as they read? Following the fortune teller reading, predict what will happen next by observing pictures. Then read 3 situations on task cards to predict what will happen next. Your future looks bright...
Instructional Video7:11
Curated Video

How to Attack Modern Wireless Networks - Introduction

Higher Ed
This video is a general overview on how to attack wireless networks
Instructional Video0:36
Curated Video

Different Installation Methods

Higher Ed
This video will show you various approaches to setup Kali Linux
Instructional Video7:12
Curated Video

Jumpstart IoT

Higher Ed
Your first step into IoT and security setup
Instructional Video7:24
Ancient Lights Media

Italy

6th - 8th
This clip looks at the physical features, history, climate and culture of Italy
Instructional Video9:05
Curated Video

Describe the different types of malware that could affect a computer system or network : Rootkits

Higher Ed
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Instructional Video2:08
Encyclopaedia Britannica

Britannica Explores: Scottish Language

Pre-K - Higher Ed
Britannica editor Jeff Wallenfeldt provides an overview of the Scots language.
Instructional Video6:57
Packt

Introduction to computer hardware and software : Boot Order

Higher Ed
From the section: Mass Storage Technologies. In this section, we cover topics related to Mass storage. Today’s computers often use multiple mass storage devices. It’s critical that the system boots from the right device. Boot order is...
Instructional Video11:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing Hardware

Higher Ed
All IT solutions, in the end, run on hardware somewhere. Restricting physical access to IT hardware such as through locked server rooms and encryption of data at rest provide a layer of security. This clip is from the chapter "Securing...