Instructional Video8:48
SciShow

How Encryption Keeps Your Data Safe

12th - Higher Ed
Keeping our data safe and secure is necessary in today's world, but a lot of the encryption we depend on has been in development for thousands of years!
Instructional Video12:00
Crash Course

Cryptography: Crash Course Computer Science

12th - Higher Ed
Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a...
Instructional Video7:59
SciShow

Cryptography: The Science of Making and Breaking Codes

12th - Higher Ed
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Instructional Video1:59
Curated Video

What to Wear When B-Boying

9th - Higher Ed
Howcast - Learn what gear to wear when you're b-boying in this Howcast breakdancing tutorial with choreographer Victor "Kid Glyde" Alicea.
Instructional Video1:35
Curated Video

What Is a B-Boy Cipher?

9th - Higher Ed
Howcast - Learn what a b-boy cipher is in this Howcast breakdancing tutorial with choreographer Victor "Kid Glyde" Alicea.
Instructional Video9:21
Curated Video

L.A. Noire Walkthrough: "Nicholson Electroplating" (1 of 5)

9th - Higher Ed
Howcast - Check out part 2 of this L.A. Noire walkthrough and beat "Nicholson Electroplating" with this online demo.
Instructional Video2:16
Curated Video

How to Freestyle in B-Boying

9th - Higher Ed
Howcast - Learn how to b-boy freestyle in this Howcast breakdancing tutorial with choreographer Victor "Kid Glyde" Alicea.
Instructional Video2:32
Curated Video

Neo4j in 100 Seconds

12th - Higher Ed
Neo4j is a native graph database designed to handle highly complex relational data.
Instructional Video10:20
Curated Video

Introduction to IT and Cybersecurity: Cyber Security Essentials

Higher Ed
Part 13/16 of Introduction to IT and Cybersecurity series: The video discusses the essentials of cyber security and covers various aspects such as encryption, firewalls, digital certificates and signatures, passwords, and intrusion...
Instructional Video7:39
Physics Girl

Quantum Cryptography Explained

9th - 12th
With recent high-profile security decryption cases, encryption is more important than ever. Much of your browser usage and your smartphone data is encrypted. But what does that process actually entail? And when computers get smarter and...
Instructional Video1:32
PBS

What's In the Backpack?

6th - 8th
A Beat Making Lab is an electronic music studio small enough to fit in a backpack. We build Labs in collaboration with communities all around the world; donating laptops, microphones, software and other equipment. From our first Beat...
Instructional Video5:05
Curated Video

SSL Complete Guide 2021: HTTP to HTTPS - Overview of Cipher Suites

Higher Ed
In this video, we'll take a quick overview of cipher suites.<br/<br/>>

This clip is from the chapter "SSL, TLS, and HTTPS" of the series "SSL Complete Guide 2021: HTTP to HTTPS".In this section, we'll learn about SSL, TLS, and HTTPS.
Instructional Video9:35
Curated Video

Python - Object-Oriented Programming - Assignment 4

Higher Ed
In this assignment, you will learn to define a text encryption method called Caesar cypher.
<
br/>
This clip is from the chapter "Magic Functions" of the series "Python - Object-Oriented Programming".This section demonstrates the...
Instructional Video6:40
1
1
Code.org

The Internet: Encryption and Public Keys

6th - 12th
We can partially thank Caesar that our e-mails are secure! Viewers learn how encryption and public key cryptography keep our communications safe over the Internet. The video also briefly covers the history of ciphers, such as the Caesar...
Instructional Video12:33
Crash Course

Cryptography: Crash Course Computer Science #33

9th - Higher Ed
Uncover key concepts in cryptography in the 33rd installment of a computer science series. An engaging video describes various encryption methods. It explains substitution ciphers, permutation ciphers, the Enigma machine, advanced...
Instructional Video13:04
Crash Course

Alan Turing: Crash Course Computer Science #15

9th - Higher Ed
Meet the man many consider to be the father of computer science. Future computer scientists watch a video to learn about Alan Turing. From Turing machines to artificial intelligence, the video briefly covers his achievements.
Instructional Video
Massachusetts Institute of Technology

Mit: Blossoms: Fabulous Building Cryptosystems

9th - 10th
As part of this introduction to cryptography, students will build three devices and learn how to encrypt and decrypt messages. Video is accompanied by a teacher's guide, transcript, and other handouts, as well as links for learning more...
Instructional Video
Khan Academy

Khan Academy: Journey Into Cryptography: Pseudorandom Number Generators

9th - 10th
Learn about random vs. pseudorandom number generators.
Instructional Video
Instructional Video
Instructional Video
Khan Academy

Khan Academy: Journey Into Cryptography: What Is Cryptography?

9th - 10th
What is Cryptography? A story which takes us from Caesar to Claude Shannon.
Instructional Video
Khan Academy

Khan Academy: Journey Into Cryptography: The Caesar Cipher

9th - 10th
Lear about the Caesar Cipher with this video.