Instructional Video5:09
Global Ethics Solutions

The Stuff of Work: Ethics and Assets

Higher Ed
Applying business ethics principles is the responsibility of every employee, regardless of their role in the company. When employees are given company-owned assets to use, they have a responsibility to make sure they handle them with...
Instructional Video1:52
Curated Video

Explain web security : Operating Systems and Tools Used

Higher Ed
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Instructional Video5:51
Curated Video

Practical Cyber Hacking Skills for Beginners - Ports and Protocols

Higher Ed
This video explores the ports, networks, and protocols used to operate each port.
Instructional Video5:21
Global Ethics Solutions

Cyber Ethics in a Real World

Higher Ed
When using your company’s computer, it is important to remember that it is owned by your employer. This means that they have a right to monitor or view anything that you do on that computer. As an employee, you have a responsibility to...
Instructional Video2:59
Curated Video

ChatGPT Foundations: Ethical Considerations for Responsible AI Use

Pre-K - Higher Ed
We'll explore the importance of using ChatGPT ethically and responsibly, ensuring that your AI interactions are both productive and conscientious. We'll discuss various ethical considerations, such as data privacy and confidentiality,...
Instructional Video8:00
Curated Video

ChatGPT and Prompt Engineering With Advanced Data Analysis - Potential Risks of ChatGPT

Higher Ed
Explore the potential risks and ethical concerns of using ChatGPT and similar language generation models. We discuss issues such as bias, misinformation, privacy, and security, and how these risks can impact the use of ChatGPT in...
Instructional Video10:08
TED Talks

Ellen Jorgensen: Biohacking -- you can do it, too

12th - Higher Ed
We have personal computing -- why not personal biotech? That's the question biologist Ellen Jorgensen and her colleagues asked themselves before opening Genspace, a nonprofit DIY bio lab in Brooklyn devoted to citizen science, where...
Instructional Video5:24
Global Ethics Solutions

Ethical Expectations: Code of Conduct and Compliance Training (Section 4)

Higher Ed
This presentation introduces participants to various ethical decision-making models and then expands to cover common code of conduct topics. The emphasis of this course is to help employees develop solid ethical decision-making skills in...
Instructional Video5:14
Global Ethics Solutions

Ethical Expectations: Code of Conduct Training | Part 4

Higher Ed
Develop ethical decision-making skills in business technology and communication. Learn responsibilities, proper use, and boundaries in Part 4 of this training.
Instructional Video3:21
Learning Mole

Jobs for the Future - AI Ethics Managers

Pre-K - 12th
What does an AI ethics manager do and why are they important in technology? Watch this episode of "Jobs for the Future" to learn about guiding responsible use of artificial intelligence.
Instructional Video8:32
Curated Video

Explain web security : Reconnais-sance and Passive In-formation Gathering

Higher Ed
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether...
Instructional Video3:21
Curated Video

How to Use ChatGPT and Generative AI for Passive Income - Use ChatGPT to Write Emails for Sales

Higher Ed
Discover how to use ChatGPT to draft effective sales emails that drive conversions. This video will show you how to use AI to generate personalized and persuasive messages that engage with your target audience and encourage them to...
Instructional Video7:15
TED Talks

TED: Fake videos of real people -- and how to spot them | Supasorn Suwajanakorn

12th - Higher Ed
Do you think you're good at spotting fake videos, where famous people say things they've never said in real life? See how they're made in this astonishing talk and tech demo. Computer scientist Supasorn Suwajanakorn shows how, as a grad...
Instructional Video11:04
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Taking a Screenshot of the Target's Browser

Higher Ed
This video teaches you to take a screenshot of the target system's browser.
r/>
This clip is from the chapter "MITM Attacks (Man in the Middle)" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In...
Instructional Video6:24
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Preventing Privilege Escalation

Higher Ed
In this video, you'll learn how to prevent privilege escalation.
r/>
This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
Instructional Video10:19
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Networking Terminology

Higher Ed
In this video, you'll learn the basic terminology used in networking.
r/>
This clip is from the chapter "Networking Tools and Essential Terminology" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In...
Instructional Video11:43
Global Health with Greg Martin

AI and Health

Higher Ed
Artificial Intelligence is being used in healthcare in an array of clinical settings. This video explores AI and Health in terms of the application of machine learning to diagnostic problems and long term clinical decision making through...
Instructional Video8:41
Curated Video

Can AI Tell Whether You're A Criminal From Your Face? | Machine Learning and Physiognomy

Higher Ed
Can AI Tell Whether You're A Criminal From Your Face? | Machine Learning and Physiognomy
Instructional Video21:37
IDG TECHtalk

Machine learning and AI advancements

Higher Ed
The hype around artificial intelligence and machine learning is giving way to real use. Join us as InfoWorld’s Serdar Yegulalp and IDG TECHtalk host Ken Mingis discuss how AI and ML have become easier to put into production, how AI and...
Instructional Video5:42
Curated Video

Explain web security : Basic Terminologies

Higher Ed
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Instructional Video2:57
Curated Video

Explain web security : The Course Overview

Higher Ed
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Instructional Video2:12
Curated Video

Practical Cyber Hacking Skills for Beginners - Section Preview-5

Higher Ed
This video briefly outlines the section concepts, including a typical home network setup, DHCP and DNS, commands used in them, TCP versus UDP, and firewalls and hardening networks to prevent attacks.
Instructional Video17:42
TED Talks

TED: Machine intelligence makes human morals more important | Zeynep Tufekci

12th - Higher Ed
Machine intelligence is here, and we're already using it to make subjective decisions. But the complex way AI grows and improves makes it hard to understand and even harder to control. In this cautionary talk, techno-sociologist Zeynep...
Instructional Video4:41
Be Smart

De-Extinction: A Mammoth Undertaking

12th - Higher Ed
De-extinction, or using the power of modern biotechnology to bring back extinct species like mammoths and dinosaurs, would be cool. But is it really as easy as the movies make it look? Or do the cruel hands of time make it impossible?...