Instructional Video10:26
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Hacking Over the Internet with Ngrok

Higher Ed
This video teaches you to perform hacking over the Internet with Ngrok.
r/>
This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Instructional Video10:43
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Getting a Meterpreter Session Over the Internet with Port Forwarding

Higher Ed
In this video, you'll learn to use port forwarding to get a Meterpreter session.
r/>
This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In...
Instructional Video7:22
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - MITM Attacks Explained

Higher Ed
This video shows you all the attacks that can be performed using MITM.
r/>
This clip is from the chapter "MITM Attacks (Man in the Middle)" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Instructional Video10:53
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Reflected Cross-Site Scripting (XSS)

Higher Ed
In this video, you'll learn what reflected XSS is and how to use it.
r/>
This clip is from the chapter "Web Application Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Instructional Video4:41
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Enabling Monitor Mode

Higher Ed
This video shows you how to use monitor mode in Kali Linux.
r/>
This clip is from the chapter "Wireless Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll...
Instructional Video8:57
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Cloning Any Webpage

Higher Ed
In this video, you'll learn to clone any webpage.
r/>
This clip is from the chapter "MITM Attacks (Man in the Middle)" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll get an...
Instructional Video10:19
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Networking Terminology

Higher Ed
In this video, you'll learn the basic terminology used in networking.
r/>
This clip is from the chapter "Networking Tools and Essential Terminology" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In...
Instructional Video9:06
Brainwaves Video Anthology

Charles Fadel - Education for the Age of AI

Higher Ed
Charles Fadel, founder of the Center for Curriculum Redesign, discusses the evolving role of education in an AI-driven world. He argues that rather than focusing solely on how teachers can use AI, we should reconsider what students need...
Instructional Video4:08
Curated Video

How to Use ChatGPT and Generative AI to Help Create Content - Fundaments of Using Generative AI

Higher Ed
In this video, you will learn about the basic principles of using Generative AI, including how to choose the right model for your needs and some common use cases.
<
br/>
This clip is from the chapter "Introduction to Generative AI"...
Instructional Video1:47
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - How to Prevent Google Indexing from Happening

Higher Ed
This video demonstrates how to prevent Google Indexing from happening.
<
br/>
This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Instructional Video2:53
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-Web Application Security Testing with Google Hacking

Higher Ed
This video provides an introduction to the section.
<
br/>
This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section...
Instructional Video3:26
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Summary-2

Higher Ed
This video helps you with the summary of the entire section.
<
br/>
This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Instructional Video5:37
Curated Video

ChatGPT 101 - Supercharge Your Work and Life with ChatGPT - ChatGPT Restrictions

Higher Ed
This video explores the restrictions that apply to the use of ChatGPT. You will learn about the types of content that ChatGPT cannot provide, such as medical or legal advice, and ethical considerations in using an AI language model....
Instructional Video10:37
Curated Video

The blinds.com Founder Shares His Business Insights for Success

Higher Ed
The video is about the journey of an entrepreneur who started from a small mom and pop store selling window coverings and blinds. He explains how the company grew and expanded into the online world, becoming the largest online seller of...
Instructional Video58:06
World Science Festival

Rethinking the Internet: How We Lost Control and How to Take it Back

6th - 11th
“Move fast and break things,” went the Silicon Valley rallying cry, and for a long time, we cheered along. Big Tech, in its infancy, spouted noble goals of bringing us closer. But now, in its adolescence, it’s testing our boundaries. How...
Instructional Video5:42
Curated Video

Explain web security : Basic Terminologies

Higher Ed
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Instructional Video5:03
Curated Video

Practical Cyber Hacking Skills for Beginners - Kali Linux Walkthrough

Higher Ed
This video is a demonstrative walkthrough of the Kali Linux operative system, how to use it, and work on it.
Instructional Video3:46
Kids Academy

Construction Workers - Social Studies for Kids | Kids Academy

Pre-K - 4th
Construction Workers - Social Studies for Kids | Kids Academy So, it’s time for you to tell your kids about construction workers? If yes then you are at the right place because today we are going to tell you in detail how to make your...
Instructional Video2:25
Big Think

Is tech addictive? It won't be for long. | Joscha Bach

6th - 11th
Do we want to be at the mercy of our devices, or do we want to be fulfilled? Cognitive scientist Joscha Bach explains how the big decision we're coming to in tech ethics will mimic another moment in tech history: the battle of the search...
Instructional Video3:49
Big Think

Who is getting rich off you? The insidious big data economy. | Rita Gunther McGrath

6th - 11th
Where is your data now? Follow the money. - Your day to day actions on the Internet give businesses personal data that turns you into an ad target – or the opposite. - Facebook, for example, allowed landlords to block demographic groups...
Instructional Video5:02
Kurzgesagt – In a Nutshell

How Facebook Is Stealing Billions of Views

9th - Higher Ed Standards
Have you ever posted a video that's gone viral? Savvy social media scholars examine the not-so-honest practice of using autoplay to count video views during a thought-provoking video. The animated video depicts the life of an uploaded...
Instructional Video12:51
Crash Course

Life and Longevity: Crash Course History of Science #44

9th - 12th Standards
In the future, will medical treatment be tailored to specific DNA? An episode of the Crash Course History of Science discusses the biotechnology of modern medicine. The narrator explains the history of DNA research and how that applies...
Instructional Video3:48
SciShow

Stem Cells

9th - 12th
Stem cell research and ethics are hotly debated, but many pupils don't really know what a stem cell is. The video describes what they are, why they are different than other cells, and where they can be found. The video continues with how...
Instructional Video
Planet Nutshell

Planet Nutshell: Net Safe: Say No to "Sexting" (7 12)

9th - 10th
Posting a picture only takes a second, but can last forever. A photo is forever on the Internet because it can easily be copied using a function called copy and paste. It can be added from one website to another. Also, a picture can be...