Hi, what do you want to do?
Global Ethics Solutions
The Stuff of Work: Ethics and Assets
Applying business ethics principles is the responsibility of every employee, regardless of their role in the company. When employees are given company-owned assets to use, they have a responsibility to make sure they handle them with...
Curated Video
Explain web security : Operating Systems and Tools Used
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Curated Video
Practical Cyber Hacking Skills for Beginners - Ports and Protocols
This video explores the ports, networks, and protocols used to operate each port.
Global Ethics Solutions
Cyber Ethics in a Real World
When using your company’s computer, it is important to remember that it is owned by your employer. This means that they have a right to monitor or view anything that you do on that computer. As an employee, you have a responsibility to...
Curated Video
ChatGPT Foundations: Ethical Considerations for Responsible AI Use
We'll explore the importance of using ChatGPT ethically and responsibly, ensuring that your AI interactions are both productive and conscientious. We'll discuss various ethical considerations, such as data privacy and confidentiality,...
Curated Video
ChatGPT and Prompt Engineering With Advanced Data Analysis - Potential Risks of ChatGPT
Explore the potential risks and ethical concerns of using ChatGPT and similar language generation models. We discuss issues such as bias, misinformation, privacy, and security, and how these risks can impact the use of ChatGPT in...
TED Talks
Ellen Jorgensen: Biohacking -- you can do it, too
We have personal computing -- why not personal biotech? That's the question biologist Ellen Jorgensen and her colleagues asked themselves before opening Genspace, a nonprofit DIY bio lab in Brooklyn devoted to citizen science, where...
Global Ethics Solutions
Ethical Expectations: Code of Conduct and Compliance Training (Section 4)
This presentation introduces participants to various ethical decision-making models and then expands to cover common code of conduct topics. The emphasis of this course is to help employees develop solid ethical decision-making skills in...
Global Ethics Solutions
Ethical Expectations: Code of Conduct Training | Part 4
Develop ethical decision-making skills in business technology and communication. Learn responsibilities, proper use, and boundaries in Part 4 of this training.
Learning Mole
Jobs for the Future - AI Ethics Managers
What does an AI ethics manager do and why are they important in technology? Watch this episode of "Jobs for the Future" to learn about guiding responsible use of artificial intelligence.
Curated Video
Explain web security : Reconnais-sance and Passive In-formation Gathering
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether...
Curated Video
How to Use ChatGPT and Generative AI for Passive Income - Use ChatGPT to Write Emails for Sales
Discover how to use ChatGPT to draft effective sales emails that drive conversions. This video will show you how to use AI to generate personalized and persuasive messages that engage with your target audience and encourage them to...
TED Talks
TED: Fake videos of real people -- and how to spot them | Supasorn Suwajanakorn
Do you think you're good at spotting fake videos, where famous people say things they've never said in real life? See how they're made in this astonishing talk and tech demo. Computer scientist Supasorn Suwajanakorn shows how, as a grad...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Taking a Screenshot of the Target's Browser
This video teaches you to take a screenshot of the target system's browser.
r/>
This clip is from the chapter "MITM Attacks (Man in the Middle)" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In...
r/>
This clip is from the chapter "MITM Attacks (Man in the Middle)" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Preventing Privilege Escalation
In this video, you'll learn how to prevent privilege escalation.
r/>
This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
r/>
This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Networking Terminology
In this video, you'll learn the basic terminology used in networking.
r/>
This clip is from the chapter "Networking Tools and Essential Terminology" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In...
r/>
This clip is from the chapter "Networking Tools and Essential Terminology" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In...
Global Health with Greg Martin
AI and Health
Artificial Intelligence is being used in healthcare in an array of clinical settings. This video explores AI and Health in terms of the application of machine learning to diagnostic problems and long term clinical decision making through...
Curated Video
Can AI Tell Whether You're A Criminal From Your Face? | Machine Learning and Physiognomy
Can AI Tell Whether You're A Criminal From Your Face? | Machine Learning and Physiognomy
IDG TECHtalk
Machine learning and AI advancements
The hype around artificial intelligence and machine learning is giving way to real use. Join us as InfoWorld’s Serdar Yegulalp and IDG TECHtalk host Ken Mingis discuss how AI and ML have become easier to put into production, how AI and...
Curated Video
Explain web security : Basic Terminologies
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Curated Video
Explain web security : The Course Overview
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Curated Video
Practical Cyber Hacking Skills for Beginners - Section Preview-5
This video briefly outlines the section concepts, including a typical home network setup, DHCP and DNS, commands used in them, TCP versus UDP, and firewalls and hardening networks to prevent attacks.
TED Talks
TED: Machine intelligence makes human morals more important | Zeynep Tufekci
Machine intelligence is here, and we're already using it to make subjective decisions. But the complex way AI grows and improves makes it hard to understand and even harder to control. In this cautionary talk, techno-sociologist Zeynep...
Be Smart
De-Extinction: A Mammoth Undertaking
De-extinction, or using the power of modern biotechnology to bring back extinct species like mammoths and dinosaurs, would be cool. But is it really as easy as the movies make it look? Or do the cruel hands of time make it impossible?...