Instructional Video10:13
Curated Video

Web Security: Common Vulnerabilities And Their Mitigation - Security related definitions and categories

Higher Ed
What Is Security?: Security related definitions and categories
r/>
This clip is from the chapter "What Is Security?" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, you will learn how...
Instructional Video3:52
Economics Explained

Do Sanctions Work?: Will The Sanctions Work

9th - Higher Ed
How do they hurt the economies doing the sanctioning? What is the difference between economic sanctions and regular old trade restrictions?

What Can Go Wrong? Ultimately, will the sanctions

work?

Helping you become...
Instructional Video12:15
Curated Video

PMP Certification Training - Plan Risk Responses

Higher Ed
This video explains plan risk responses.<br<br/>/>

This clip is from the chapter "Project Risk Management" of the series "PMP® Certification Training".This section explains project risk management.
Instructional Video5:42
Curated Video

PMP Certification Training - Overview of Project Risk Management and Processes

Higher Ed
This video explains project risk management and processes.<br<br/>/>

This clip is from the chapter "Project Risk Management" of the series "PMP® Certification Training".This section explains project risk management.
Instructional Video3:10
Curated Video

PMI-RMP Certification Training - Risk and Risk Factors

Higher Ed
This video explains risk and risk factors.<br<br/>/>

This clip is from the chapter "Plan Risk Management" of the series "PMI-RMP® Certification Training".This section explains planning risk management.
Instructional Video9:50
Curated Video

Describe network protocols : Scalability of Network Programs

Higher Ed
From the section: Programming TCP Clients and Servers In this section, we will learn about how to build TCP Servers and how it works.



In this video, we will learn about scalability of network
programs.
• Learn about...
Instructional Video3:50
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - What Is a Risk?

Higher Ed
This video explains what risk means.<br<br/>/>

This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to understand risk.
Instructional Video8:34
Journey to the Microcosmos

Giant Microscopic Cannibals

9th - Higher Ed
Every experiment has to start somewhere. This one began with a container full of dying microbes, and the five cute, pink ciliates called blepharisma that James, our master of microscopes, accidentally turned into a group of cannibals.
Instructional Video4:52
Curated Video

PMI-RMP Certification Training - Plan Risk Responses Process

Higher Ed
This video explains plan risk responses process.<br<br/>/>

This clip is from the chapter "Plan Risk Responses" of the series "PMI-RMP® Certification Training".This section explains Plan Risk Responses.
Instructional Video11:20
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Risk Management - Identification

Higher Ed
This video discusses how to identify and manage risks.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Instructional Video2:15
Curated Video

C++ 20 (2a) New Features - Concept of Splitting Execution State and the Thread of Execution

Higher Ed
How are coroutines different from threads?

• Discuss how threading
works
• Discuss how corou
tines work
• Discuss the difference between execution thread and sta
te
of execution

This clip is from the...
Instructional Video5:41
The Business Professor

Understanding Porter's Five Forces for Market Analysis

Higher Ed
This video explains Porter's Five Forces framework, which is a tool used to analyze the competitive dynamics of a product or service in a specific market. The five forces include supplier power, buyer power, competitive rivalry, threat...
Instructional Video4:50
Curated Video

PMI-RMP Certification Training - Transfer and Mitigate

Higher Ed
This video introduces you to transfer and mitigate.<br<br/>/>

This clip is from the chapter "Plan Risk Responses" of the series "PMI-RMP® Certification Training".This section explains Plan Risk Responses.
Instructional Video5:42
Curated Video

PMI-RMP Certification Training - Escalate and Avoid

Higher Ed
This video explains escalate and avoid.<br<br/>/>

This clip is from the chapter "Plan Risk Responses" of the series "PMI-RMP® Certification Training".This section explains Plan Risk Responses.
Instructional Video2:49
TMW Media

On Safari with Nala - Tiger Snake

K - 5th
On Safari with Nala - Tiger Snake
Instructional Video2:24
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Assets, Threats, Vulnerabilities, and Risks

Higher Ed
This video explains assets, threats, vulnerabilities and risks.
<
br/>
This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to...
Instructional Video2:05
Curated Video

PMI-RMP Certification Training - Accept

Higher Ed
This video explains accept risk.<br<br/>/>

This clip is from the chapter "Plan Risk Responses" of the series "PMI-RMP® Certification Training".This section explains Plan Risk Responses.
Instructional Video4:36
Hip Hughes History

Schenck vs United States Explained in 5 Minutes: US History Review

6th - 12th
Do you have an absolute right to free speech? The Supreme Court gives it 1919 answer. Learn the basics about the must-know US History Supreme Court Case challenging the constitutionality of the Espionage Act. If you are in a US History...
Instructional Video5:12
Curated Video

PMI-RMP Certification Training - Risk Identification – Tools and Techniques

Higher Ed
This video explains the tools and techniques of identifying risks.<br<br/>/>

This clip is from the chapter "Identify Risks" of the series "PMI-RMP® Certification Training".This section explains identifying risks.
Instructional Video8:17
The Guardian

Why journalists carry guns in the Philippines

Pre-K - Higher Ed
The Philippines is one of the most dangerous countries in which to be a journalist, with at least 75 killed since 1992, and most murders remaining unsolved. Now some journalists are arming themselves. Ali Macabalang is one such reporter....
Instructional Video9:34
Weatherthings

Wildfire Safety: Being Ready

6th - 8th
How, when, and where wildfires happen, with a focus on safety. Wildfires need fuel and heat, so they can happen in any dry place. They are a natural part of Earth and they do have benefits. Most are caused by human activity. Wildfires...
Instructional Video4:05
Curated Video

Understanding PESTLE Analysis for Business: Identifying External Threats and Opportunities

Higher Ed
The video explains the concept of PESTLE analysis, which is a tool used by businesses to identify external threats and opportunities that may impact their future success. PESTLE analysis categorizes the external factors into six main...
Instructional Video4:26
Hip Hughes History

The Truman Doctrine Explained

6th - 12th
A super quick overview of the Truman Doctrine and the beginning of the Cold War taking place in Turkey and Greece.
Instructional Video10:24
TLDR News

Britain Scraps the Northern Ireland Protocol? - TLDR News

12th - Higher Ed
Northern Ireland has always been a difficult subject when it comes to Brexit, and as the issue was never really solved the problem of the Island of Ireland has re-emerged with Johnson now threatening some radical action in order to solve...