Instructional Video1:17
Curated Video

Only In Turkey 12 - Drum Record

9th - Higher Ed
Drum Record:Around 2,500 workers in Istanbul gather with their drums in an attempt to break the world record for the largest drum ensemble, showcasing musical unity.
Instructional Video2:09
Curated Video

Robotic Dinosaurs: Bringing the Prehistoric World to Life

Pre-K - Higher Ed
Experience the awe and wonder of the prehistoric world with Animatronics, a Mexican company revolutionizing the entertainment industry with their lifelike robotic dinosaurs. Using cutting-edge technology, they create giant dinosaur...
Instructional Video1:32
Curated Video

Biota Spring Water: Innovating with Corn-Based Plastic Bottles for a Greener Future

Pre-K - Higher Ed
Biota Spring Water is a Colorado-based company that has traveled to the Rocky Mountains to find a pure source of spring water. They have gone a step further by using corn-based plastic, called polylactic acid (PLA), to create an...
Instructional Video12:45
Curated Video

How Has SPAM Stayed So Popular?

12th - Higher Ed
Weird History Food is sending you a SPAM alert. No, not those annoying emails you get from Planet Fitness, but the delicious ham in a can. SPAM has a longer history than you would expect, but probably a little longer than a can of SPAM's...
Instructional Video2:05
Curated Video

Water Purification System Provides Lifeline to Tsunami-Stricken Province

Pre-K - Higher Ed
In the aftermath of the devastating tsunami in Indonesia's Archer province, a state-of-the-art water purification system, donated by General Electric, is providing nearly 450,000 liters of drinkable water per day. With the assistance of...
Instructional Video2:16
Curated Video

Revolutionizing Advertising: Hypertag Technology Takes Marketing to the Next Level

Pre-K - Higher Ed
This video discusses the use of new technology called Hypertag, which allows advertisers to deliver promotional material directly to mobile phones. By using infrared or Bluetooth capabilities, shoppers can receive electronic discount...
Instructional Video10:05
Mister Simplify

The Eclectic Paradigm or OLI Framework - Simplest Explanation Ever

12th - Higher Ed
The Eclectic Paradigm or OLI Framework - The Simplest explanation ever Companies achieve growth by expanding to international markets. The OLI framework or Eclectic paradigm is a reliable and simple framework used by organisations to...
Instructional Video9:44
Curated Video

Your First Leadership Role: How to Succeed

10th - Higher Ed
How can you make a success of your first leadership role. That’s a question I’ve been asked a few times, so, let’s get into it. Here's a message I got from a student. English isn't their first language, so I've edited it a little......
Instructional Video5:16
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Phishing Attacks

Higher Ed
Here, we will understand the concepts of phishing, how the attack is performed, the dangers of opening phishing emails, and how to prevent them.
Instructional Video3:47
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The Way Back Machine

Higher Ed
This service serves as a database or archive of snapshots of webpages from the past or even just before changing the current website as a reference.
Instructional Video8:18
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Reconnaissance Methods

Higher Ed
In this lesson, you will learn about footprinting, or the art of collecting information about a person or object of interest, called reconnaissance.
Instructional Video5:03
Curated Video

Practical Cyber Hacking Skills for Beginners - Target Reconnaissance

Higher Ed
In this video, you will learn how to perform reconnaissance based on a specific target, usually, a location, understand the groundwork and infrastructure involved, and the possibilities of being able to hack.
Instructional Video6:19
Curated Video

Practical Cyber Hacking Skills for Beginners - The Hacking Methodology

Higher Ed
Here, you will learn more about the different hacking methodologies that hackers employ to cause harm to a system or a network and also understand the possibilities of minimizing the attacks.
Instructional Video8:03
Curated Video

Practical Cyber Hacking Skills for Beginners - Social Engineering

Higher Ed
This video discusses social engineering concepts, understanding the human psyche, and how hackers manipulate the human mind to hack.
Instructional Video5:32
Curated Video

Practical Cyber Hacking Skills for Beginners - The Bad Guys - Black Hats, Cyber Criminals and Disgruntled Employees

Higher Ed
Here, you will learn more about hackers, how they operate, their intentions, and how they differ based on the hacking methodologies.
Instructional Video9:09
Curated Video

Build and Learn ASP.NET 6.0 Blazor Hands-On - Lifecycle Methods (Code Example) - SetParametersAsync

Higher Ed
This lecture discusses the SetParametersAsync method, which is the first method called in a component's lifecycle. This clip is from the chapter "Advanced Concepts with Hands-On Coding in Blazor" of the series "Build and Learn ASP.NET...
Instructional Video11:08
Curated Video

Risk Management for Cyber Security Managers - Business Continuity and Disaster Recovery Plans

Higher Ed
This video elaborates on how an organization can develop a plan for continuity or recovery when a cyber-attack occurs.
Instructional Video5:28
Curated Video

Risk Management for Cyber Security Managers - Ethical Hacking and Pen Testing

Higher Ed
In this video, we will discuss ethical hacking and penetration testing and how we can use these techniques to mitigate cyber risks in an organization.
Instructional Video8:19
Curated Video

Risk Management for Cyber Security Managers - Implementation of Security Controls

Higher Ed
This lesson will look at the practical methods available to implement security controls in order to avoid/mitigate risks.
Instructional Video3:07
Curated Video

Risk Management for Cyber Security Managers - Risk Acceptance and Risk Rejection

Higher Ed
In this lesson, you will learn the options when we cannot mitigate risk, transfer risk, or avoid a hazard.
Instructional Video3:32
Curated Video

Risk Management for Cyber Security Managers - Risk Avoidance

Higher Ed
This is the second way we can respond to a certain kind of risk and learn how to avoid risks at all costs.
Instructional Video5:16
Curated Video

Risk Management for Cyber Security Managers - Risk Identification

Higher Ed
We will look at the first step in cyber risk management: cyber risk identification.
Instructional Video7:12
Curated Video

Risk Management for Cyber Security Managers - Types of Risks

Higher Ed
In this lesson, we will look at the different risks that a company, an organization, or a system might face from a business perspective.
Instructional Video3:36
Curated Video

Risk Management for Cyber Security Managers - What Is Risk?

Higher Ed
This video explains what constitutes a risk in terms of a business, a functioning system, or all kinds of assets.