Instructional Video16:19
TED Talks

John Wilbanks: Let's pool our medical data

12th - Higher Ed
When you're getting medical treatment, or taking part in medical testing, privacy is important; strict laws limit what researchers can see and know about you. But what if your medical data could be used -- anonymously -- by anyone...
Instructional Video13:46
Crash Course

Who Can You Trust? Crash Course Navigating Digital Information #4

12th - Higher Ed
In which John Green teaches you how to assess the sources of information you find on the internet. The growing suspicion of expertise is a growing problem on the internet, and it can be very difficult to figure out which sources are...
Instructional Video8:18
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Reconnaissance Methods

Higher Ed
In this lesson, you will learn about footprinting, or the art of collecting information about a person or object of interest, called reconnaissance.
Instructional Video12:49
Curated Video

CISSP Crash Course - Conducting Logging and Monitoring Activities

Higher Ed
This video explains logging and monitoring activities as well as incident management steps. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
Instructional Video4:51
Curated Video

Delivering a Speech

3rd - Higher Ed
In this video the student will learn techniques for delivering a speech.
Instructional Video4:51
Curated Video

Historical Sources

3rd - Higher Ed
A video entitled “Historical Sources” identifies the differences between primary and secondary sources and discusses how these sources can be used to study the past.
Instructional Video3:27
Curated Video

High Five Facts - Satellites

Pre-K - 5th
This video explores five fun facts about the satellites.
Instructional Video3:42
Visual Learning Systems

Your Science Fair Project: Steps in the Scientific Method

9th - 12th
The scientific method is the foundation of work for scientists. In this video the scientific method is explained in detail serving as the basis for your science fair project. The process of creating a science fair project along with...
Instructional Video5:59
Curated Video

Bug Bounty Program Certification 3.1: Overview of Preparation Steps

Higher Ed
In this video, we will have a look at the preparation steps. • Explore various technologies • Learn about ports and services information • Explore vulnerability scanning and tools
Instructional Video6:27
Curated Video

Bug Bounty Program Certification 11.1: About Android App Frontend Penetration

Higher Ed
In this video, you will learn about Android app frontend penetration overview. • Explore frontend penetration techniques • Understand the process of frontend penetration • Learn about the goals of frontend penetration
Instructional Video7:50
Curated Video

Bug Bounty Program Certification 13.6: Certification Exam Practice Questions – Part 5

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video8:33
Curated Video

Bug Bounty Program Certification 6.5: Gather Machine User Login Credentials

Higher Ed
In this video, you will gather information about Windows and Kali Linux password files. • Learn about Kali Linux shadow file • Use john the Ripper to crack password file • Gather information about Windows SAM file
Instructional Video8:43
Curated Video

Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines

Higher Ed
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Instructional Video8:06
Curated Video

Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video7:59
Curated Video

Bug Bounty Program Certification 9.3: Non-persistent Attack on Websites Frontend

Higher Ed
In this video, you will perform non - persistent attack on websites. • Setup Lab using Mutillidae Buggy web application for non-persistent attack • Explore non-persistent XSS attack using popup box generation • Learn about cookie...
Instructional Video3:12
Curated Video

Bug Bounty Program Certification 1.2: How to Get Most Out of This Course?

Higher Ed
This video will give you a brief overview about the course. • Explain about course topics • Explore various components • Prepare for next sections
Instructional Video4:15
Curated Video

Bug Bounty Program Certification 2.6: Various Components of Network Bug Bounty Program

Higher Ed
This video explores components of bug bounty program. • Explore components of bug bounty program • Various components of network bug bounty program • Explain functioning of a network bug bounty program
Instructional Video5:09
Curated Video

Using Tally Marks to Gather Information

K - 5th
In this video, students learn how to gather information by using tally marks in a table. The teacher explains the concept of tally marks and how they can be used to keep track of quantities. Through examples of counting stickers and...
Instructional Video5:42
Curated Video

Bug Bounty Program Certification 12.3: Find Bugs and Hack Android Machine Databases

Higher Ed
In this video, you will look at Drozer commands to hack database. • Connect console of Drozer • Explore various Drozer commands • Hack database using Drozer and get username and password of database
Instructional Video1:11
Visual Learning Systems

Your Science Fair Project: the Next Steps

9th - 12th
The scientific method is the foundation of work for scientists. In this video the scientific method is explained in detail serving as the basis for your science fair project. The process of creating a science fair project along with...
News Clip7:31
Bloomberg

Big Tech CEOs Head Back to Capitol Hill

Higher Ed
Jul.08 -- The chief executive officers of Amazon.com Inc., Facebook Inc., Alphabet Inc. and Apple will testify on July 27 before a U.S. congressional panel investigating competition in the technology industry. Rep. Ken Buck, a Republican...
News Clip4:51
Curated Video

AP Debrief: Mueller report did not exonerate Trump

Higher Ed
Special counsel Robert Mueller says President Donald Trump's efforts to influence the Russia investigation "were mostly unsuccessful," but that was because the people surrounding the president "declined to carry out orders to accede to...
News Clip4:51
Curated Video

AP Debrief: Mueller report did not exonerate Trump

Higher Ed
Special counsel Robert Mueller says President Donald Trump's efforts to influence the Russia investigation "were mostly unsuccessful," but that was because the people surrounding the president "declined to carry out orders to accede to...
News Clip2:05
Curated Video

AP Debrief: Mueller report did not exonerate Trump

Higher Ed
Special counsel Robert Mueller says President Donald Trump's efforts to influence the Russia investigation "were mostly unsuccessful," but that was because the people surrounding the president "declined to carry out orders to accede to...