Instructional Video9:12
PBS

Our “Junk DNA” Is More Important Than We Once Thought

12th - Higher Ed
In the search for the genes that make us human, some of the most important answers were hiding not in the genes themselves, but in what was once considered genomic junk.
News Clip6:41
PBS

Thinking about math in terms of literacy - not levels

12th - Higher Ed
Algebra is a core subject for U.S. high school students. But should it be? Author Andrew Hacker believes we should reconsider how math is taught: only 5 percent of the American workforce actually uses math beyond arithmetic, though...
Instructional Video5:39
SciShow

Why Was the WannaCry Attack Such a Big Deal?

12th - Higher Ed
On Friday, May 12th, 2017, the ransomware program WannaCry started spreading to computers all over the world at an alarming rate. A couple days later, it was basically completely contained with very little damage done. So what happened?
Instructional Video18:32
TED Talks

Misha Glenny: Hire the hackers!

12th - Higher Ed
Despite multibillion-dollar investments in cybersecurity, one of its root problems has been largely ignored: who are the people who write malicious code? Underworld investigator Misha Glenny profiles several convicted coders from around...
Instructional Video9:50
TED Talks

TED: Why good hackers make good citizens | Catherine Bracy

12th - Higher Ed
Hacking is about more than mischief-making or political subversion. As Catherine Bracy describes in this spirited talk, it can be just as much a force for good as it is for evil. She spins through some inspiring civically-minded projects...
Instructional Video10:15
SciShow

5 Devastating Security Flaws You've Never Heard Of

12th - Higher Ed
Devastating vulnerabilities are hiding in the technology in programs, protocols, and hardware all around us. Most of the time, you can find ways to protect yourself.
Instructional Video6:27
TED Talks

Tim Leberecht: 3 ways to (usefully) lose control of your brand

12th - Higher Ed
The days are past (if they ever existed) when a person, company or brand could tightly control their reputation -- online chatter and spin mean that if you're relevant, there's a constant, free-form conversation happening about you that...
Instructional Video9:32
Crash Course

The Biggest Problems We're Facing Today & The Future of Engineering: Crash Course Engineering #46

12th - Higher Ed
In our final episode of Crash Course Engineering we are going to take all the tools and ideas we’ve discussed throughout this series and try to imagine where we’re headed. We’re going to explore some of the biggest problems that today’s...
Instructional Video8:22
SciShow

How Hackers Hack, and How To Stop Them

12th - Higher Ed
Hacking is tough, but stopping hackers can be even tougher.
Instructional Video11:20
Crash Course

Hackers & Cyber Attacks: Crash Course Computer Science

12th - Higher Ed
Today we're going to talk about hackers and their strategies for breaking into computer systems. Now, not all hackers are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White...
Instructional Video6:25
SciShow

How the Krack Hack Breaks Wi-Fi Security

12th - Higher Ed
After 14 years of going unnoticed, a vulnerability in Wi-Fi security was published last week. It's a serious problem, but it's already in the process of being fixed.
Instructional Video2:30
SciShow

Is Public WiFi Safe

12th - Higher Ed
You might want to think twice before signing into that too-good-to-be-true "Free Airport Wi-Fi." It might not be what you think it is.
Instructional Video5:18
SciShow

How the Massive Equifax Data Breach Happened

12th - Higher Ed
There was a massive data breach in the United States, and chances are you're probably affected by it. While Hank can't undo what was done, he can give you some insight into how it all went down.
Instructional Video11:57
Crash Course

Cybersecurity: Crash Course Computer Science

12th - Higher Ed
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use...
Instructional Video16:39
TED Talks

Keren Elazari: Hackers: the Internet's immune system

12th - Higher Ed
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and advocate for our rights. By exposing...
Instructional Video5:40
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - This Is NOT Hacking

Higher Ed
New ReviewIn this video, the author explains the concepts of hacking in detail and provides examples of what is hacking and what is not.
Instructional Video0:46
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Section Introduction-The possibilities of protecting our systems from malware and cyber-attacks

Higher Ed
New ReviewThis brief video outlines the possibilities of protecting our systems from malware and cyber-attacks.
Instructional Video6:23
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Types of Hackers

Higher Ed
New ReviewThis video elaborates on the different types of hackers based on their hacking skills and their level of hacking.
Instructional Video4:30
Curated Video

Becoming a Cyber Security Professional - A Beginner's Career Guide - EC-Council

Higher Ed
New ReviewHere, we will get a thorough understanding about the EC-council, for those looking to become an ethical hacker.
Instructional Video5:51
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - What Else Can You Do to Protect Yourself Part II

Higher Ed
New ReviewIn part II of this recap module, you will continue to be shown even more cool tips and tricks on how to protect yourself when using computers, smartphones, and the Internet. And we will wrap up the training with information on how you...
Instructional Video6:52
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - What Else Can You Do to Protect Yourself Part I

Higher Ed
New ReviewIn this final two-part module, I will review for you the good cyber security solutions presented in the training. After the recap, you will be taught even more cool tips and tricks on how to protect yourself when using computers,...
Instructional Video5:57
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - IoT / Internet of Things

Higher Ed
New ReviewIn this easy-to-follow module, you will learn what we mean when we say IoT, and then you will be presented with an in-depth discussion of the major security issues involving these connected devices. You will also visually be guided,...
Instructional Video7:16
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - Encryption/Travel

Higher Ed
New ReviewIn this informative module, you will learn—at a basic level—all about encryption, why it is so very important to enforce security and privacy, and then you will be presented with some common encryption solutions you can use both at home...
Instructional Video3:25
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - Identity Theft

Higher Ed
New ReviewIn this interesting module, you will learn how devastating the Equifax hack was for most of us and how our personal data is most likely already on the Dark Web and in the hands of hackers and fraudsters. You will then be shown how you...