SciShow
How Hackers Hack, and How To Stop Them
Hacking is tough, but stopping hackers can be even tougher.
SciShow
Helium
Hank talks about everyone's favorite squeaky-voice gas and why it's important for more than party balloons.
TED Talks
TED: The carbonless fuel that could change how we ship goods | Maria Gallucci
Every day, tens of thousands of cargo ships, filled to the brim with goods, release heavy pollution into the air as they make their way across the ocean. In this eye-opening talk, reporter Maria Gallucci introduces a planet-friendly...
Curated Video
The Top 4 MEGAREGIONS Of The United States: How These Regions Dominate The Country
The United States is comprised of 50 full states and a handful of territories. But over the last few decades, a new concept has risen to explain regions that are interconnected despite state or even international borders: the megaregion....
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacks Against Encryption
In this video, we will look at the different kinds of attacks that hackers can perform to decrypt an already encrypted hard drive.
Curated Video
Practical Cyber Hacking Skills for Beginners - Introduction to Zenmap
This video demonstrates using Zenmap, the graphical user interface for NMAP, to scan different networks.
Curated Video
Practical Cyber Hacking Skills for Beginners - Scanning Techniques
This video elaborates on NMAP's different techniques for scanning networks using the available network probes.
Curated Video
Practical Cyber Hacking Skills for Beginners - Host Discovery Controls - Part 2
This video continues where we left off, understanding the host discovery controls and the scanning techniques used briefly.
Curated Video
Practical Cyber Hacking Skills for Beginners - NMAP Port States
This video will teach us about the six port states: open, closed, filtered, unfiltered, closed/filtered, and open/filtered.
Curated Video
Practical Cyber Hacking Skills for Beginners - Basics of NMAP
After installing and configuring NMAP, we will look at how this NMAP scanning program works.
Curated Video
Practical Cyber Hacking Skills for Beginners - Ports and Protocols
This video explores the ports, networks, and protocols used to operate each port.
Curated Video
Population: Physical Factors
From the very first civilizations, to a modern metropolis - humans have always chosen places to live based on the physical nature of their surroundings. Human Geography - Orientation And Settlements - Learning Points. Early settlements...
Curated Video
Project Finance and Excel - Build Financial Models from Scratch - Transactions Eligible for Project Finance
This video talks about the various transactions eligible for project finance. It also talks about what we use project finance for and the use cases. We use project finance for transportation, power, environment, and more. This clip is...
Curated Video
Building Microservices API in Go - Introduction to Hexagonal Architecture
In this video, we will explore the principles and concepts of hexagonal architecture, including ports and adapters, and how it can be used to design flexible and maintainable applications in Go. This clip is from the chapter "Application...
Curated Video
Linux Network Administration - NIC Bonding
This video explains one of the very important and critical aspect of Linux, which is NIC bonding.
Curated Video
A Detailed Guide to the OWASP Top 10 - API8:2023 Security Misconfiguration
In this video, explore Security Misconfiguration risks in APIs, highlighting common misconfigurations and how to secure API settings.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Working with Security Groups Lab
To assist you in understanding security groups, this video will demonstrate their creation and use.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - MySQL Lab
MySQL is a very popular web database solution because it is an open-source database that is compatible with the SQL language and relational database concepts. In this video, you will see how to create a free tier MySQL database in the...
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Database Hosting Methods
You can host databases in AWS in two primary ways. One method is managed more by AWS and the other is managed more by your organization. This video helps you understand the pros and cons of each.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Dealing with Threats
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This video covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Virtual LANs (VLANs)
Virtual LANs (VLANs) are common features built into almost all switches. VLANs provide superb control of your LAN but have their own quirks that a good tech understands. This clip is from the chapter "Local Area Networking" of the series...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Working with Connections
When two computers begin the process of sharing data, they create what we call a connection (or session). A good tech knows how to use common utilities to observe these connections and diagnose issues. This clip is from the chapter...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - USB Standards
The Universal Serial Bus (USB) interface is the main peripheral interface these days. Make sure you're aware of different USB standards as well as the different types of USB connectors. This clip is from the chapter "Book Chapter 10 -...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Virtual LANs (VLANs)
Virtual LANs (VLANs) are common features built into almost all switches. VLANs provide superb control of your LAN but have their own quirks that a good tech understands. This clip is from the chapter "Book Chapter 19 - Local Area...