Instructional Video8:22
SciShow

How Hackers Hack, and How To Stop Them

12th - Higher Ed
Hacking is tough, but stopping hackers can be even tougher.
Instructional Video3:20
SciShow

Helium

12th - Higher Ed
Hank talks about everyone's favorite squeaky-voice gas and why it's important for more than party balloons.
Instructional Video7:28
TED Talks

TED: The carbonless fuel that could change how we ship goods | Maria Gallucci

12th - Higher Ed
Every day, tens of thousands of cargo ships, filled to the brim with goods, release heavy pollution into the air as they make their way across the ocean. In this eye-opening talk, reporter Maria Gallucci introduces a planet-friendly...
Instructional Video11:14
Curated Video

The Top 4 MEGAREGIONS Of The United States: How These Regions Dominate The Country

9th - Higher Ed
The United States is comprised of 50 full states and a handful of territories. But over the last few decades, a new concept has risen to explain regions that are interconnected despite state or even international borders: the megaregion....
Instructional Video6:05
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacks Against Encryption

Higher Ed
In this video, we will look at the different kinds of attacks that hackers can perform to decrypt an already encrypted hard drive.
Instructional Video5:00
Curated Video

Practical Cyber Hacking Skills for Beginners - Introduction to Zenmap

Higher Ed
This video demonstrates using Zenmap, the graphical user interface for NMAP, to scan different networks.
Instructional Video12:30
Curated Video

Practical Cyber Hacking Skills for Beginners - Scanning Techniques

Higher Ed
This video elaborates on NMAP's different techniques for scanning networks using the available network probes.
Instructional Video10:43
Curated Video

Practical Cyber Hacking Skills for Beginners - Host Discovery Controls - Part 2

Higher Ed
This video continues where we left off, understanding the host discovery controls and the scanning techniques used briefly.
Instructional Video3:46
Curated Video

Practical Cyber Hacking Skills for Beginners - NMAP Port States

Higher Ed
This video will teach us about the six port states: open, closed, filtered, unfiltered, closed/filtered, and open/filtered.
Instructional Video8:36
Curated Video

Practical Cyber Hacking Skills for Beginners - Basics of NMAP

Higher Ed
After installing and configuring NMAP, we will look at how this NMAP scanning program works.
Instructional Video5:51
Curated Video

Practical Cyber Hacking Skills for Beginners - Ports and Protocols

Higher Ed
This video explores the ports, networks, and protocols used to operate each port.
Instructional Video3:00
Curated Video

Population: Physical Factors

6th - 12th
From the very first civilizations, to a modern metropolis - humans have always chosen places to live based on the physical nature of their surroundings. Human Geography - Orientation And Settlements - Learning Points. Early settlements...
Instructional Video4:14
Curated Video

Project Finance and Excel - Build Financial Models from Scratch - Transactions Eligible for Project Finance

Higher Ed
This video talks about the various transactions eligible for project finance. It also talks about what we use project finance for and the use cases. We use project finance for transportation, power, environment, and more. This clip is...
Instructional Video6:36
Curated Video

Building Microservices API in Go - Introduction to Hexagonal Architecture

Higher Ed
In this video, we will explore the principles and concepts of hexagonal architecture, including ports and adapters, and how it can be used to design flexible and maintainable applications in Go. This clip is from the chapter "Application...
Instructional Video17:45
Curated Video

Linux Network Administration - NIC Bonding

Higher Ed
This video explains one of the very important and critical aspect of Linux, which is NIC bonding.
Instructional Video2:33
Curated Video

A Detailed Guide to the OWASP Top 10 - API8:2023 Security Misconfiguration

Higher Ed
In this video, explore Security Misconfiguration risks in APIs, highlighting common misconfigurations and how to secure API settings.
Instructional Video10:05
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Working with Security Groups Lab

Higher Ed
To assist you in understanding security groups, this video will demonstrate their creation and use.
Instructional Video13:19
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - MySQL Lab

Higher Ed
MySQL is a very popular web database solution because it is an open-source database that is compatible with the SQL language and relational database concepts. In this video, you will see how to create a free tier MySQL database in the...
Instructional Video4:32
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Database Hosting Methods

Higher Ed
You can host databases in AWS in two primary ways. One method is managed more by AWS and the other is managed more by your organization. This video helps you understand the pros and cons of each.
Instructional Video7:54
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Dealing with Threats

Higher Ed
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This video covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Instructional Video8:03
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Virtual LANs (VLANs)

Higher Ed
Virtual LANs (VLANs) are common features built into almost all switches. VLANs provide superb control of your LAN but have their own quirks that a good tech understands. This clip is from the chapter "Local Area Networking" of the series...
Instructional Video8:59
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Working with Connections

Higher Ed
When two computers begin the process of sharing data, they create what we call a connection (or session). A good tech knows how to use common utilities to observe these connections and diagnose issues. This clip is from the chapter...
Instructional Video9:57
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - USB Standards

Higher Ed
The Universal Serial Bus (USB) interface is the main peripheral interface these days. Make sure you're aware of different USB standards as well as the different types of USB connectors. This clip is from the chapter "Book Chapter 10 -...
Instructional Video8:01
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Virtual LANs (VLANs)

Higher Ed
Virtual LANs (VLANs) are common features built into almost all switches. VLANs provide superb control of your LAN but have their own quirks that a good tech understands. This clip is from the chapter "Book Chapter 19 - Local Area...