Instructional Video5:18
Curated Video

Active Directory with Windows Server 2016 - Working with Admin Templates

Higher Ed
In this video, you’ll learn admin template management, and walk through the configuration options for the Central Store.
r/>
This clip is from the chapter "Create and Manage Group Policy" of the series "Active Directory with...
Instructional Video12:34
Curated Video

The Modern JavaScript Bootcamp (2019) - Handling User Interaction

Higher Ed
In this video, you’ll learn how to handle user interaction. This will allow us to respond to things the user does like clicking a button or entering some text in a field.
r/>
This clip is from the chapter "Javascript in the...
Instructional Video12:01
National Parks Service

Everglades National Park - Catch and Release Techniques

Pre-K - Higher Ed
Video about catch and release techniques in Florida Bay.
Instructional Video3:13
Curated Video

PySpark and AWS: Master Big Data with PySpark and AWS - Applications of PySpark

Higher Ed
Let's explore the in-demand applications of Spark in this session.
r/>
This clip is from the chapter "Introduction" of the series "PySpark and AWS: Master Big Data with PySpark and AWS".Welcome to the course. This section...
Instructional Video14:09
Curated Video

Modern HTML and CSS from the Beginning (Including Sass) - Smartphone View

Higher Ed
EdgeLedger Website (Flexbox): Smartphone View
r/>
This clip is from the chapter "EdgeLedger Website (Flexbox)" of the series "Modern HTML and CSS from the Beginning (Including Sass)".In this Section, we’ll learn about...
Instructional Video14:14
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Post Exploitation Modules

Higher Ed
This video introduces you to exploitation modules.
r/>
This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn...
Instructional Video10:05
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Crafting Windows Payloads with Msfvenom

Higher Ed
This video teaches you about Msfvenom and how to craft Windows payloads using it.
r/>
This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To...
Instructional Video11:55
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Changing Directory

Higher Ed
In this video, you'll learn to change directories.
r/>
This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn...
Instructional Video14:10
The Wall Street Journal

What is the Real Cost of a Breach?

Higher Ed
WSJ's David Breg and Rob Sloan discuss how understanding the costs of a breach can help companies organize defenses and prioritize investments. <br/>
Instructional Video5:59
NASA

NASA | Making Hubble More Powerful

3rd - 11th
The Hubble Space Telescope would not be able to produce its breathtaking science without the upgraded infrastructure targeted...
Instructional Video23:57
Curated Video

Dive Into Ansible - From Beginner to Expert in Ansible - Ansible Playbooks- Breakdown of Sections

Higher Ed
This video explains the sections that make up a playbook.
r/>
This clip is from the chapter "Ansible Playbooks Introduction" of the series "Dive Into Ansible - From Beginner to Expert in Ansible".This section provides an...
Instructional Video2:34
Curated Video

KS2 Primary Maths Age 13-17 - Calculations: Word Problems - Explained

3rd - 5th
SchoolOnline's Primary Maths videos are brilliant, bite-size tutorial videos delivered by examiners. Ideal for ages 9-13, they cover every key topic and sub topic covered in Maths in clear and easy to follow steps.



This video...
Instructional Video7:56
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Scanning with Zenmap

Higher Ed
In this video, you'll learn how to perform scanning using zenmap.
r/>
This clip is from the chapter "Active Information Gathering and Port Scanning" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In...
Instructional Video6:50
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - The Theory Behind Reverse Shell

Higher Ed
This video discusses the theory behind the reverse shell session.
r/>
This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
Instructional Video8:36
Curated Video

Linux Administration Bootcamp: Go from Beginner to Advanced - The Linux Boot Process

Higher Ed
This video explains the Linux boot process.
r/>
This clip is from the chapter "The Linux Boot Process and System Logging" of the series "Linux Administration Bootcamp: Go from Beginner to Advanced".This section introduces you...
Instructional Video2:43
Curated Video

Data Science and Machine Learning (Theory and Projects) A to Z - Introduction to Machine Learning: Supervised Learning

Higher Ed
In this video, we will cover supervised learning.
<
br/>
This clip is from the chapter "Deep learning: Artificial Neural Networks with Python" of the series "Data Science and Machine Learning (Theory and Projects) A to Z".In this...
Instructional Video13:08
Curated Video

Machine Learning Random Forest with Python from Scratch - Labels and Features

Higher Ed
In this lesson, we will look at a target or label as output data and feature, a measurable property or characteristic of an element.
<
br/>
This clip is from the chapter "Introduction to Machine Learning" of the series "Machine...
Instructional Video0:40
The March of Time

British anti-air demo

12th - Higher Ed
MOT 1942: BRITISH ANTI-AIR DEMO: WS Sky w/ bomber airplane & bomb path drawn anti-aircraft cannon's missile path drawn animated bomber airplane on path animated anti-air missile on path airplane thrown off course bomb missing factory. WWII
Instructional Video6:21
Curated Video

Excel VBA Programming The Complete Guide - The Worksheet_SelectionChange Event

Higher Ed
The Worksheet_SelectionChange event is triggered when the user navigates to a different cell with a spreadsheet. In this lesson, we react our first Excel event and also explore the ByVal keyword in the automatically generated...
Instructional Video17:25
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Bypassing Firewalls with Nmap

Higher Ed
In this video, you'll learn another use of Nmap—to bypass firewalls.
r/>
This clip is from the chapter "Active Information Gathering and Port Scanning" of the series "The Complete Ethical Hacking Bootcamp: Beginner To...
Instructional Video13:30
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Embedding Backdoor in Image Part 1

Higher Ed
In this video, you'll learn how to embed backdoor techniques in an image.
r/>
This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Instructional Video18:46
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Capturing Screenshot on Target PC

Higher Ed
In this video, you'll learn how to capture screenshots on the target PC.
r/>
This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Instructional Video11:31
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Windows 10 Privilege Escalation

Higher Ed
In this video, you'll learn about privilege escalation with Windows 10.
r/>
This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Instructional Video7:11
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Connection with Reverse Shell

Higher Ed
In this video, you'll learn how to connect with reverse shell.
r/>
This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...