Instructional Video8:02
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - CC Cleaner

Higher Ed
This video illustrates the CC Cleaner software, how to use it, and the benefits of using it to protect the systems.
Instructional Video7:15
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to Proxy Servers

Higher Ed
Let's discuss the first anonymizer, the proxy server, and how it can provide a proxy IP address to hide your activity.
Instructional Video4:22
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The Brave Browser

Higher Ed
In this video, we will look at the Brave browser, how to install it, and how it is a better browser, faster than other browsers, and more secure.
Instructional Video3:58
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Browsing in Incognito Mode - The Shocking Truth!

Higher Ed
In this video, we will understand what going "incognito" is and how we can browse incognito on the Internet.
Instructional Video4:18
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Five Places You Are Tracked Online

Higher Ed
In this video, we will look at the different places for tracking you online, like social media such as Facebook, Twitter, Instagram, Google search history, Yahoo, and Bing.
Instructional Video7:59
Curated Video

Practical Cyber Hacking Skills for Beginners - Web Attack - Cross-Site Scripting

Higher Ed
In this lesson, we will look at cross-site scripting, which is a client-side attack that targets the victim's browser with malicious code.
Instructional Video6:20
Curated Video

Practical Cyber Hacking Skills for Beginners - Cookies Revisited

Higher Ed
Here, you will learn about cookies, why and how they are used, and how they affect display of online pages.
Instructional Video9:13
Curated Video

Practical Cyber Hacking Skills for Beginners - CWE and CVE

Higher Ed
This lesson will examine the common weakness enumeration and the various CWE and CVE websites.
Instructional Video10:09
Curated Video

Carbs and Sugar

K - 5th
Avril has major tummy trauma after eating too many candy apples at Greasy World. Fizzy calls Sully the Cell to teach us about simple sugars and complex sugars, and Freezer Burn drops a spooky song about the dangers of too much Halloween...
Instructional Video12:27
Curated Video

How the Girl Scout Cookie Empire Was Built

12th - Higher Ed
Weird History Food is giving into temptation by giving you the History Girl Scout Cookies. While you may see these delicious Girl Scout Cookies being sold around town or your co-worker is sending around the order sheet at the office,...
Instructional Video16:49
Curated Video

Popular Food Brands That Have Been Around Longer Than We Thought

12th - Higher Ed
Weird History Food is going to shock you with some news about the age of your favorite food brands. Some of the most common foods you see on grocery store shelves have been around for decades - if not centuries. These items have been...
Instructional Video4:33
Curated Video

Arrays for Kids | What are multiplication arrays?

K - 5th
In this fun and educational video, we dive into the fascinating world of arrays. Arrays are a fantastic way to understand multiplication and division visually. We'll show you how to recognize arrays and why they're so helpful in math.
Instructional Video4:03
Wonderscape

Understanding Chemical Reactions: Reactants, Products, and Chemical Bonds

K - 5th
Learn about the components of a chemical reaction, including reactants and products, and how chemical bonds are affected during the process. Explore examples like cookies and rusty bike fenders to understand these concepts...
Instructional Video4:34
Wonderscape

Understanding the Law of Conservation of Matter

K - 5th
Explore the concept of the conservation of matter, which states that during a chemical reaction, matter is neither created nor destroyed. Learn how this fundamental principle applies to various examples, from dissolving sugar in tea to...
Instructional Video4:08
Wonderscape

Understanding Energy Changes in Chemical Reactions

K - 5th
Explore the concept of energy changes in chemical reactions, including exothermic and endothermic reactions. Learn how chemical reactions can either release or absorb energy in the form of heat or light, with examples ranging from...
Instructional Video4:32
Wonderscape

Identifying Chemical Reactions: Observable Signs and Indicators

K - 5th
Explore the various changes in properties that occur as a result of chemical reactions. Learn how to recognize signs such as color change, emission of odor, production of gas, and formation of precipitates, with practical examples like...
Instructional Video6:32
Curated Video

Fundamentals of Secure Software - Introduction to Session Management

Higher Ed
This video provides an introduction to session management and best practices.
Instructional Video7:21
Curated Video

Fundamentals of Secure Software - Cryptographic Failures

Higher Ed
This video explains what sensitive data exposure is and talks about cryptographic failures.
Instructional Video7:53
Curated Video

A Detailed Guide to the OWASP Top 10 - #3 Cross-Site Scripting Attacks

Higher Ed
This video explains another important client-side based attack, which is called the cross-site scripting attack.
Instructional Video7:18
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - You Have Been HACKED - Now What?

Higher Ed
In this video, you will look at steps to take after you have been hacked and how exactly you would respond.
<
br/>
This clip is from the chapter "Conclusion" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part...
Instructional Video12:25
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Identify Legit Apps

Higher Ed
In this video, the author shares a few tips on how to successfully navigate Google Play Store and download the right kind of application to help you identify legit apps and spot the fake apps out there.
<
br/>
This clip is from the...
Instructional Video17:06
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Personal Cybersecurity - What I Do

Higher Ed
In this video, the author talks about the necessary steps that he takes to keep himself and his data safe from malware and hackers.
<
br/>
This clip is from the chapter "Introduction" of the series "The Absolute Beginners Guide to...
Instructional Video2:02
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - IOS

Higher Ed
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device.
<
br/>
This clip is from the chapter "Mobile Security" of the series "The Absolute Beginners...
Instructional Video5:43
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - Android

Higher Ed
This video talks about the kinds of permissions the applications have on an Android device. We will look at app permissions such as Instagram, Rebtel, and introduce to you an app to manage the permissions quickly and effectively.
<
br/>...