Instructional Video8:08
Mazz Media

My Blog: How To Get Along (Without Beating Each Other Up)

6th - 8th
Whether it’s work inside the classroom, or play outside the classroom, conflicts can arise. It’s natural. This program helps viewers to learn the skills necessary to foster cooperation, collaboration and compromise in just about any...
Instructional Video4:53
TLDR News

Conservative and Labour Compromise Explained - Brexit Explained

12th - Higher Ed
May's deal has failed in the House of Commons on three occasions, but May hasn't given up yet. For the past few weeks, she has been in talks with opposition leader Jeremy Corbyn to try and strike a cross-party agreement. In this video,...
Instructional Video12:56
Mazz Media

Get Along Monsters: 5 Ways to Work Things Out (without Fighting)

6th - 8th
Every day, young people face problems with friends, family and schoolmates. This program gives kids five strategies to help them resolve the problems they face in a safe and appropriate way. Children are taught that hitting is not a way...
Instructional Video1:24
XKA Digital

Never compromise your values

Higher Ed
James Parr is a designer, entrepreneur and technologist who for over 15 years has been dedicated to answering the question: How can we help innovate radical new approaches to systems problems? Trillium Technologies, of which James is...
Instructional Video3:40
IDG TECHtalk

How to set up Edge Chromium security options

Higher Ed
Edge Chromium can provide more protection for organizations that use older versions of Windows.
Instructional Video3:34
Curated Video

How can Britain fix Brexit?

12th - Higher Ed
Parliament's rejection of Theresa May's Brexit plan has created a democratic mess. The Economist's Britain editor, Tom Wainwright, explains how the country got into this muddle, and the solution for getting out.
Instructional Video4:57
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Request Forgery Attacks

Higher Ed
Hijacked authenticated user sessions can result in Cross-Site Request Forgery (CSRF) attacks. This episode explains how these attacks occur and how they can be mitigated. This clip is from the chapter "Securing Dedicated Systems" of the...
Instructional Video9:52
Hip Hughes History

The Constitutional Convention of 1787 Explained in 10 Minutes

6th - 12th
Created for students taking US History and Government, specifically geared for the NY State Regents Exam. Vintage HHH, the old school stuff
Instructional Video9:02
TLDR News

Brexit Negotiations: What The Hell is Happening? - Brexit Explained.

12th - Higher Ed
In the last few weeks, there's been a lot of drama surrounding Brexit, but it's not been clear that any real progress has been made in negotiations. So in this video we cut through the drama, the rhetoric and theatrics to look at what's...
Instructional Video5:47
IDG TECHtalk

Best practices for secure work-from-home VPN connections

Higher Ed
As more employees work from home, it’s important to review your VPN settings and following the best guidance.
Instructional Video10:43
Mazz Media

My Blog: Working Things Out (The Answer is Out There)

6th - 8th
Effective problem solving is one of the keys to finding solutions and resolving conflicts. In this program, students are taught the strategies and skills necessary to become problem solvers. Viewers will come to understand how asking...
Instructional Video8:44
Curated Video

Excel VBA Programming The Complete Guide - Macro Security

Higher Ed
Macros have been used to package malicious code in the past. In this lesson, we explore the security options built into Excel that prevent macro code from executing automatically. We also add a directory to a Trusted Locations list of...
Instructional Video1:24
XKA Digital

Be true to your values

Higher Ed
Craig is a speaker, trainer and coach on the European conference circuit, with expertise in personal leadership. He loves his work with companies and individuals and feels privileged to have worked with so many amazing people. Craig...
Instructional Video5:41
Hip Hughes History

The Compromise of 1877 Explained: US History Review

6th - 12th
Understand the deal which ended Reconstruction and finalized the election of 1876. Known as the Compromise of 1877, its name in African American circles is the Great Betray, find out why.
Instructional Video3:05
Curated Video

AZ-104: Microsoft Azure Administrator Full Course - What is Multifactor Authentication

Higher Ed
In this video, we will cover multifactor authentication. This clip is from the chapter "Identity" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section introduces identities and Azure Active Directory features...
Instructional Video18:06
Curated Video

How To Deal With Conflict & Negotiate In English | ADVANCED ENGLISH LESSON #spon

Pre-K - Higher Ed
Negotiations and dealing with conflict is something you will have to do in both your professional and personal life. During this lesson we will look at key rules for dealing with conflict, and learn the best phrases & vocabulary to use....
Instructional Video6:10
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Business Email Compromise

Higher Ed
In this interesting module, you will learn about Business Email Compromise attacks, also known as ‘CEO Fraud’. You will visually see how they trick us into initiating large wire transfers, what the red flags are, and then you will...
Instructional Video26:15
Mazz Media

Play It Out: Healthy Dating Relationships (Head Over Heels? How To Keep Your Balance. )

6th - 8th
Just by nature, humans are social creatures. We develop and maintain many different kinds of relationships. Healthy relationships are an important part of our lives. This program explores the characteristics of a healthy dating...
Instructional Video10:24
Hip Hughes History

The U.S. Congress in Twenty Minutes (1 of 2)

6th - 12th
A broad overview of Congressional content on the United States History exam in Regents, NY State. Topics include delegated power, the Great Compromise, the Electoral College, House of Representation Ideas, the U.S. Senate as well as...
Instructional Video7:40
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Threat Analysis and Mitigating Actions

Higher Ed
Stepping through how attackers manage to compromise a system or exfiltrate data helps harden environments to prevent future incidents. This episode covers the Cyber Kill Chain, the Mitre ATT&CK Framework, the Diamond Model of Intrusion...
Instructional Video5:16
Mr. Beat

The Compromise of 1850 (according to the Traveling Salesman)

6th - 12th
This is the best video about the Compromise of 1850 ever made. It was also the first educational video Mr. Beat ever made. If you are watching this, you are watching history...about history.
Instructional Video5:33
Cerebellum

American Transformation And Industrialisation: 1868-1890 - The Compromise (1877)

9th - 12th
American democracy has a lineage of written records that we can trace to show the development of our nation, and how each document builds on those before it to make our foundation of freedom stronger. In this video, documents conceived...
Instructional Video20:21
Hip Hughes History

Congress for Dummies -- Article 1 of the Constitution

6th - 12th
The second in the Constitution for Dummies series, in this lecture HipHughes takes you through Article I of the Constitution examining all ten sections outlining Legislative Powers.
Instructional Video3:48
Professor Dave Explains

Millard Fillmore: Last of the Whigs (1850 - 1853)

12th - Higher Ed
There's a reason you've never heard of Millard Fillmore. He wasn't that good of a president. He was so mediocre that he pretty much killed off the Whig Party. But it's still worth learning a bit about him, so let's take a look!