Hi, what do you want to do?
Curated Video
Finding a Function’s Inverse Algebraically
This video will discuss examples of finding a function’s inverse function algebraically.
Curated Video
Increased Elegance
Imperial College cosmologist Claudia de Rham describes her view of how reinterpreting Einstein's theory of gravity in terms of particle physics gives a more coherent and elegant picture of the forces of nature.
Curated Video
Neuroplasticity and Vision
Stanford University neuroscientist Kalanit Grill-Spector describes three aspects of neuroplasticity she is investigating in her work on vision and facial recognition, investigating various ways that the brain might reorganize itself as...
Curated Video
Using the Boclips "Sparks" Feature to Browse Videos by Curriculum Alignments
Learn more about "Sparks," one of the most popular video discovery features on the Boclips CourseSpark platform. Sparks help you browse video recommendations by popular and widely adopted curricula. In this video, you will learn about...
Why U
Algebra 92 - Rational Functions and Holes
In the previous lecture, we saw examples of x values that cause a rational function's numerator to be zero, where those x values produce x-axis intercepts in the function's graph. We also saw x values that cause denominator zeros that...
Why U
Algebra 91 - Rational Functions and Vertical Asymptotes
A rational function is any function that can be written as a fraction whose numerator and denominator are polynomials. Rational functions include a broad range of possibilities. For example, since a polynomial can be a constant, a...
Why U
Algebra 86 - Graphing Polynomial Functions - Part 1
Calculators and graphing utilities are available that are capable of creating accurate graphs of polynomial functions. However, it is often desirable to sketch a quick representation of a function's graph to get a general idea of its...
Curated Video
Domain and Range
“Domain and Range” explains when a relation is a function. The video also describes how to determine the domain and range of a given function.
Curated Video
The Classification of Life
A video entitled “The Classification of Life” which describes taxonomy and how all organisms on Earth are organized according to the Linnaean system.
friEdTech
Google Calendar - Meet with & Find a Time
"Have you ever needed to schedule a meeting with co-workers but hate the back-and-forth emails trying to find a time that works for everyone? With the Meet with and Find a Time features in Google Calendar, you can quickly schedule events...
Curated Video
Introduction to IT and Cybersecurity: Basics, Protocols, and Future Trends
Part 1/16 of Introduction to IT and Cybersecurity series: The video is an introduction to the course "Introduction to IT and Cybersecurity." The course covers topics such as IT hardware and software, networking, servers, databases,...
Curated Video
Business Email Compromise
The video explains the phishing attack of BEC, how it originates and what are the tricks used on employees
Curated Video
Other Phishing Techniques
The video explains the phishing attack techniques and how you can identify and avoid them
Curated Video
DKIM Email Security
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Curated Video
DNS Poisoning Attack
In this video, you will use KALI to learn how to cache poison the DNS (Domain Name Server) entries to redirect the requester to a different page.
Curated Video
Why a Regular Domain User Can be a Real Security Threat
In this video you will learn about the reasons why a regular domain user can be a real danger to your environment, and why those generic and shared Active Directory accounts should not exist.
Curated Video
Setup a Stealthy Command and Control Center Online
This video will teach you how to setup a command and control center over the internet to start you actual attacks
Curated Video
Sender Framework Policy (SPF)
In this tutorial, you will learn about SPF and how to set it up on your DNS server.
Curated Video
Bloodhound and Sharphound
Learn how attackers use Bloodhound and Sharphound to Get Active Directory Domain Admin Access.
Curated Video
Collect and Visualize Data with Maltego
This video will explain the poweful OSINT application called Maltego, and how you can leverage it in collecting open source data on your victim.
Curated Video
Pass the Hash with Mimikatz on Windows
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Curated Video
Wireshark D5 V3 - HTTP analysisDNS analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 3: DNS analysis
Curated Video
Password Spraying
Learn how to spray passwords across many accounts. Password spraying is an attack that attempts to access a large number of accounts (usernames) with a few commonly used passwords.
It is different from the traditional brute-force...
It is different from the traditional brute-force...