Instructional Video5:01
Curated Video

Ordering Fractions by Creating Common Denominators

K - 5th
In this video, students learn about the numerator and denominator of a fraction, and how to find the least common multiple to determine the common denominators. The teacher provides examples and guides the students through the process of...
Instructional Video5:42
Curated Video

Bug Bounty Program Certification 12.3: Find Bugs and Hack Android Machine Databases

Higher Ed
In this video, you will look at Drozer commands to hack database. • Connect console of Drozer • Explore various Drozer commands • Hack database using Drozer and get username and password of database
Instructional Video9:28
Curated Video

Bug Bounty Program Certification 8.4: Database Attack Using Manual Techniques

Higher Ed
This video focuses on manual database attack. • Explore manual database attack • Understand various injection commands to exploit database • Explanation of the manual commands
Instructional Video5:19
Curated Video

Serverless JavaScript Projects 4.2: Setting Up the UI with DynamoDB Database

Higher Ed
In this video, we need to locate the places for Database Updates and pulls and setup DynamoDB in AWS. • Find locations in the front end where we will call the database endpoints • Setup DynamoDB capabilities in AWS • Prepare to run the...
Instructional Video6:47
Curated Video

Bug Bounty Program Certification 8.3: Find Bug and Hack Database of a Website Using Windows Tools

Higher Ed
This video focuses on database attack using Windows tool. • Explore Havij tool • Download and installation of Havij in Windows • Understand Web database penetration using Havij tool in windows
Instructional Video9:32
Curated Video

Bug Bounty Program Certification 8.2: Find Bug and Hack Database of a Website Using Kali Linux Tools

Higher Ed
This video explores database attack using Kali Linux tool. • Understand sqlmap tool • Explore web database penetration using sqlmap commands in Kali Linux • Explanation of commands
Instructional Video8:24
Curated Video

Bug Bounty Program Certification 8.1: Find Bugs in Websites for Database Penetration

Higher Ed
This video will help you understand injection vulnerability scanning using Acunetix. • Explore injection attacks • Understand Injection vulnerability scanning using Acunetix • Explanation of database vulnerabilities
Instructional Video8:36
Curated Video

PowerShell for Automating Administration - XML Configuration File

Higher Ed
This video explains the XML configuration file that is used to configure the parameters and initial settings for our computer programs. This clip is from the chapter "Project Introduction" of the series "PowerShell for Automating...
Instructional Video14:16
Curated Video

Serverless JavaScript Projects 4.5: Utilizing the Different CRUD Lambdas to Connect Our Front-End App to a Database

Higher Ed
We need to work out all the calls to the DB endpoints from the front-end application. • Start working out all the calls to the API endpoints • Put all the calls in place • Test to make sure everything is working
Instructional Video3:30
Curated Video

Cloud Native Development on Azure with Java 2.2: Deploy a New Cosmos DB in Azure

Higher Ed
Now it’s time to take a step ahead with the TODO list we created in the previous video! We are going to connect our Java application to use Azure Cosmos DB as a backend for storing the TODO list data items. • Create a new Cosmos DB...
Instructional Video8:47
Curated Video

Bug Bounty Program Certification 1.3: Teaser – Finding Bugs in Websites and Gain Bug Bounty

Higher Ed
This video explores example of bug bounty. • Explore injection attack • Learn about manual commands • Exploit database
Instructional Video9:11
Curated Video

Serverless JavaScript Projects 4.3: Building a Create and Read Lambda

Higher Ed
In this video, we need to read the database and create new records for the cards and boards. • Set up the functions for create and read • Run the serverless deploy script • Make sure CORS is on for these functions in AWS
Instructional Video16:53
Curated Video

Serverless JavaScript Projects 2.2: Build Your Location AWS Lambda

Higher Ed
We need a way to capture the location information from the provided IP address. • Install serverless and AWS CLI • Utilize a function that queries a database for info from IP • Return the geolocation information to the user
Instructional Video7:52
Curated Video

Predictive Analytics with TensorFlow 9.1: Using BRNN for Image Classification

Higher Ed
We will first provide some contextual information about RNNs. We will see how to implement a BRNN implementation example using the TensorFlow library. The example is using the MNIST database of handwriting. • Look at contextual...
Instructional Video9:10
Brainwaves Video Anthology

Stephen Wolfram - Computational Thinking

Higher Ed
Stephen Wolfram, (born August 29, 1959, London, England), English physicist and author best known for his contributions to the field of cellular automata and the development of Mathematica, an algebraic software system, and Wolfram...
Instructional Video14:57
TED Talks

TED: How the blockchain will radically transform the economy | Bettina Warburg

12th - Higher Ed
Say hello to the decentralized economy -- the blockchain is about to change everything. In this lucid explainer of the complex (and confusing) technology, Bettina Warburg describes how the blockchain will eliminate the need for...
Instructional Video35:47
Curated Video

Full Stack Web Development MASTERY Course - Novice to Expert - Git and GitHub in One Lecture

Higher Ed
This video explains in detail about Git and GitHub. This clip is from the chapter "Git and GitHub" of the series "Full Stack Web Development Mastery Course - Novice to Expert".This section focuses on Git and GitHub.
Instructional Video11:35
Curated Video

Bug Bounty Program Certification 13.3: Certification Exam Practice Questions – Part 2

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video16:41
Curated Video

Serverless JavaScript Projects 3.3: Put the Finishing Touches on the Lambda

Higher Ed
We need to bring in IBM Watson. • Install IBM Watson developer tools as a dependency • Add the Watson AssistantV1 call to the Lambda • Send back the response that Watson returns as the new API response
Instructional Video5:04
Curated Video

Mastering Tableau 2018.1, Second Edition 2.3: Saving Data Sources and Workbooks, Live, or Extracts

Higher Ed
In this video, we’ll see how to save data sources and workbooks. • Understand the different types of workbooks and data sources • The difference between Extract connection and Live connection
Instructional Video6:19
Curated Video

Bug Bounty Program Certification 10.4: Components of the Android App Bug Bounty Program

Higher Ed
In this video, you will get Information about Android app components. • Learn about various components of Android app bug bounty program • Explore various vulnerabilities in android machines • Learn about reward on the basis of level of...
Instructional Video4:59
Curated Video

Bug Bounty Program Certification 10.3: About the Android App Bug Bounty Program

Higher Ed
This video focuses on the information about Android bug bounty program. • Get basic understanding of Android bug bounty program overview • Explore listing tools and resources used • Learn about the process of Android app bug bounty
Instructional Video0:49
The March of Time

1944: THE TIMES: EXT The Times Dispatch offices. Virginius Dabney (1901-1995) at desk. CU Dabney reading editorial to coworker, '...advocates employment of Colored police...teachers all races equal pay...end racial segregation for street cars.'

12th - Higher Ed
MOT 1944: THE TIMES: EXT The Times Dispatch offices. Virginius Dabney (1901-1995) at desk. CU Dabney reading editorial to coworker, '...advocates employment of Colored police...teachers all races equal pay...end racial segregation for...
Instructional Video5:18
Curated Video

Containerize Spring Boot CRUD App with Docker and Docker Compose - Need for Docker

Higher Ed
In this video, we will understand the need for Docker. This clip is from the chapter "Everything About Docker" of the series "Containerize Spring Boot CRUD App with Docker and Docker Compose".In this section, you will learn everything...