TED Talks
John Wilbanks: Let's pool our medical data
When you're getting medical treatment, or taking part in medical testing, privacy is important; strict laws limit what researchers can see and know about you. But what if your medical data could be used -- anonymously -- by anyone...
Crash Course
Who Can You Trust? Crash Course Navigating Digital Information #4
In which John Green teaches you how to assess the sources of information you find on the internet. The growing suspicion of expertise is a growing problem on the internet, and it can be very difficult to figure out which sources are...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Reconnaissance Methods
In this lesson, you will learn about footprinting, or the art of collecting information about a person or object of interest, called reconnaissance.
Curated Video
CISSP Crash Course - Conducting Logging and Monitoring Activities
This video explains logging and monitoring activities as well as incident management steps. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
Curated Video
Delivering a Speech
In this video the student will learn techniques for delivering a speech.
Curated Video
Historical Sources
A video entitled “Historical Sources” identifies the differences between primary and secondary sources and discusses how these sources can be used to study the past.
Visual Learning Systems
Your Science Fair Project: Steps in the Scientific Method
The scientific method is the foundation of work for scientists. In this video the scientific method is explained in detail serving as the basis for your science fair project. The process of creating a science fair project along with...
Curated Video
Bug Bounty Program Certification 3.1: Overview of Preparation Steps
In this video, we will have a look at the preparation steps. • Explore various technologies • Learn about ports and services information • Explore vulnerability scanning and tools
Curated Video
Bug Bounty Program Certification 11.1: About Android App Frontend Penetration
In this video, you will learn about Android app frontend penetration overview. • Explore frontend penetration techniques • Understand the process of frontend penetration • Learn about the goals of frontend penetration
Curated Video
Bug Bounty Program Certification 13.6: Certification Exam Practice Questions – Part 5
Exam questions. • Practice questions • Solutions • Explanation of answer
Curated Video
Bug Bounty Program Certification 6.5: Gather Machine User Login Credentials
In this video, you will gather information about Windows and Kali Linux password files. • Learn about Kali Linux shadow file • Use john the Ripper to crack password file • Gather information about Windows SAM file
Curated Video
Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Curated Video
Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4
Exam questions. • Practice questions • Solutions • Explanation of answer
Curated Video
Bug Bounty Program Certification 9.3: Non-persistent Attack on Websites Frontend
In this video, you will perform non - persistent attack on websites. • Setup Lab using Mutillidae Buggy web application for non-persistent attack • Explore non-persistent XSS attack using popup box generation • Learn about cookie...
Curated Video
Bug Bounty Program Certification 1.2: How to Get Most Out of This Course?
This video will give you a brief overview about the course. • Explain about course topics • Explore various components • Prepare for next sections
Curated Video
Bug Bounty Program Certification 2.6: Various Components of Network Bug Bounty Program
This video explores components of bug bounty program. • Explore components of bug bounty program • Various components of network bug bounty program • Explain functioning of a network bug bounty program
Curated Video
Using Tally Marks to Gather Information
In this video, students learn how to gather information by using tally marks in a table. The teacher explains the concept of tally marks and how they can be used to keep track of quantities. Through examples of counting stickers and...
Curated Video
Bug Bounty Program Certification 12.3: Find Bugs and Hack Android Machine Databases
In this video, you will look at Drozer commands to hack database. • Connect console of Drozer • Explore various Drozer commands • Hack database using Drozer and get username and password of database
Visual Learning Systems
Your Science Fair Project: the Next Steps
The scientific method is the foundation of work for scientists. In this video the scientific method is explained in detail serving as the basis for your science fair project. The process of creating a science fair project along with...
Bloomberg
Big Tech CEOs Head Back to Capitol Hill
Jul.08 -- The chief executive officers of Amazon.com Inc., Facebook Inc., Alphabet Inc. and Apple will testify on July 27 before a U.S. congressional panel investigating competition in the technology industry. Rep. Ken Buck, a Republican...
Curated Video
AP Debrief: Mueller report did not exonerate Trump
Special counsel Robert Mueller says President Donald Trump's efforts to influence the Russia investigation "were mostly unsuccessful," but that was because the people surrounding the president "declined to carry out orders to accede to...
Curated Video
AP Debrief: Mueller report did not exonerate Trump
Special counsel Robert Mueller says President Donald Trump's efforts to influence the Russia investigation "were mostly unsuccessful," but that was because the people surrounding the president "declined to carry out orders to accede to...
Curated Video
AP Debrief: Mueller report did not exonerate Trump
Special counsel Robert Mueller says President Donald Trump's efforts to influence the Russia investigation "were mostly unsuccessful," but that was because the people surrounding the president "declined to carry out orders to accede to...