Instructional Video8:18
Curated Video

Finding a Function’s Inverse Algebraically

K - 8th
This video will discuss examples of finding a function’s inverse function algebraically.
Instructional Video2:44
Curated Video

Increased Elegance

12th - Higher Ed
Imperial College cosmologist Claudia de Rham describes her view of how reinterpreting Einstein's theory of gravity in terms of particle physics gives a more coherent and elegant picture of the forces of nature.
Instructional Video2:36
Curated Video

Neuroplasticity and Vision

12th - Higher Ed
Stanford University neuroscientist Kalanit Grill-Spector describes three aspects of neuroplasticity she is investigating in her work on vision and facial recognition, investigating various ways that the brain might reorganize itself as...
Instructional Video5:15
Curated Video

Using the Boclips "Sparks" Feature to Browse Videos by Curriculum Alignments

Pre-K - Higher Ed
Learn more about "Sparks," one of the most popular video discovery features on the Boclips CourseSpark platform. Sparks help you browse video recommendations by popular and widely adopted curricula. In this video, you will learn about...
Instructional Video26:57
Why U

Algebra 92 - Rational Functions and Holes

12th - Higher Ed
In the previous lecture, we saw examples of x values that cause a rational function's numerator to be zero, where those x values produce x-axis intercepts in the function's graph. We also saw x values that cause denominator zeros that...
Instructional Video13:06
Why U

Algebra 91 - Rational Functions and Vertical Asymptotes

12th - Higher Ed
A rational function is any function that can be written as a fraction whose numerator and denominator are polynomials. Rational functions include a broad range of possibilities. For example, since a polynomial can be a constant, a...
Instructional Video15:13
Why U

Algebra 86 - Graphing Polynomial Functions - Part 1

12th - Higher Ed
Calculators and graphing utilities are available that are capable of creating accurate graphs of polynomial functions. However, it is often desirable to sketch a quick representation of a function's graph to get a general idea of its...
Instructional Video3:00
Curated Video

Domain and Range

3rd - Higher Ed
“Domain and Range” explains when a relation is a function. The video also describes how to determine the domain and range of a given function.
Instructional Video3:58
Curated Video

The Classification of Life

3rd - 8th
A video entitled “The Classification of Life” which describes taxonomy and how all organisms on Earth are organized according to the Linnaean system.
Instructional Video2:53
friEdTech

Google Calendar - Meet with & Find a Time

Higher Ed
"Have you ever needed to schedule a meeting with co-workers but hate the back-and-forth emails trying to find a time that works for everyone? With the Meet with and Find a Time features in Google Calendar, you can quickly schedule events...
Instructional Video12:11
Curated Video

Introduction to IT and Cybersecurity: Basics, Protocols, and Future Trends

Higher Ed
Part 1/16 of Introduction to IT and Cybersecurity series: The video is an introduction to the course "Introduction to IT and Cybersecurity." The course covers topics such as IT hardware and software, networking, servers, databases,...
Instructional Video2:30
Curated Video

Business Email Compromise

Higher Ed
The video explains the phishing attack of BEC, how it originates and what are the tricks used on employees
Instructional Video3:04
Curated Video

Other Phishing Techniques

Higher Ed
The video explains the phishing attack techniques and how you can identify and avoid them
Instructional Video4:28
Curated Video

DKIM Email Security

Higher Ed
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Instructional Video5:21
Curated Video

DNS Poisoning Attack

Higher Ed
In this video, you will use KALI to learn how to cache poison the DNS (Domain Name Server) entries to redirect the requester to a different page.
Instructional Video4:09
Curated Video

Why a Regular Domain User Can be a Real Security Threat

Higher Ed
In this video you will learn about the reasons why a regular domain user can be a real danger to your environment, and why those generic and shared Active Directory accounts should not exist.
Instructional Video6:02
Curated Video

Setup a Stealthy Command and Control Center Online

Higher Ed
This video will teach you how to setup a command and control center over the internet to start you actual attacks
Instructional Video5:35
Curated Video

Sender Framework Policy (SPF)

Higher Ed
In this tutorial, you will learn about SPF and how to set it up on your DNS server.
Instructional Video5:28
Curated Video

Cross Site Scripting

Higher Ed
This video will explain what CSS is
Instructional Video4:55
Curated Video

Bloodhound and Sharphound

Higher Ed
Learn how attackers use Bloodhound and Sharphound to Get Active Directory Domain Admin Access.
Instructional Video4:47
Curated Video

Collect and Visualize Data with Maltego

Higher Ed
This video will explain the poweful OSINT application called Maltego, and how you can leverage it in collecting open source data on your victim.
Instructional Video6:32
Curated Video

Pass the Hash with Mimikatz on Windows

Higher Ed
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Instructional Video5:54
Curated Video

Wireshark D5 V3 - HTTP analysisDNS analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 3: DNS analysis
Instructional Video4:42
Curated Video

Password Spraying

Higher Ed
Learn how to spray passwords across many accounts. Password spraying is an attack that attempts to access a large number of accounts (usernames) with a few commonly used passwords.

It is different from the traditional brute-force...