Hi, what do you want to do?
Science ABC
Do Plants Next To Roads Absorb Pollution And Become Harmful?
Plants next to roads can absorb pollution and become harmful, but it really depends on the type of pollution and how close the plant is to the road.
Vehicles don’t just produce carbon dioxide and nitrous oxides, but also...
Vehicles don’t just produce carbon dioxide and nitrous oxides, but also...
Let's Tute
Is Alaskapox Virus the Next COVID 19 Pandemic
Recently, the world faced a massive pandemic, and now we're confronted with another emerging threat: Alaskapox, a virus from the same family as smallpox and cowpox. In today’s short video, we’ll take a closer look at this virus,...
Curated Video
What Is The Asian Himbo And Why Is This Character So Popular
Black Kung Fu films reigned in the 1970s – a fusion of Blaxploitation and Kung Fu where protagonists took justice into their own hands…in style! These films were wildly popular, a welcome response to the anger many people felt against...
Wonderscape
Understanding the Threat of Climate Change to Forests
Explore the significant threat posed by climate change to forests worldwide. Learn about the causes and consequences of climate change, including the role of greenhouse gases and the impact on forest ecosystems. Discover how forests,...
Curated Video
The Rise of Islam in Ancient India
For a long time, Hindu civilization had isolated itself. The leaders, believing in their cultural superiority, discouraged sea travel and did not invest in sea defenses, leaving them vulnerable to invasions. This vulnerability was...
PBS
The Origins of ‘Big Bug’ Science Fiction
Insects make up 80 percent of the world’s species, so it's not all that surprising we’ve occasionally made them into monsters in science fiction and horror. What is staggering is why the “big bug” subgenre took off in the 1950s. Find out...
Curated Video
The Animal Within: Uncovering Human Instincts
Explore the primal instincts that connect humans with the animal kingdom. This fascinating documentary delves into the survival and reproductive behaviors that humans share with animals, demonstrating our innate responses to fear and...
Curated Video
Fundamentals of Secure Software - Microsoft Threat Model Tool demo
This is a demo video of the Microsoft Threat Model tool.
Curated Video
Fundamentals of Secure Software - Introduction to Threat Modeling
This video provides an introduction to threat modeling.
Curated Video
Fundamentals of Secure Software - Threat Actors and More Definitions
This video demonstrates the different attackers that threaten software and systems. You will look at more foundational definitions.
Curated Video
ChatGPT and DALL-E: Sell Your Creative Thinking with AI - Why AI Can't Replace Creatives (But We Should Still Learn It)
In this video, we will explore the relationship between AI and creativity. We will discuss why AI can never fully replace human creativity but why it is still essential for creatives to understand and learn about AI.
<
br/>
This...
<
br/>
This...
Great Big Story
Secrets of the Japanese giant salamander, an ancient survivor
Uncover the unique traits and challenges facing the Japanese giant salamander, one of the world's largest and oldest amphibians.
Curated Video
CISSP Crash Course - Secure Coding Guidelines
This video explains the weaknesses in software and API security.<br<br/>/>
This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Assess Software Security
This video explains assessing software security and how to audit and log the changes.<br<br/>/>
This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Security Controls in the SDLC
This video explains SDLC practices and security controls in the SDLC.<br<br/>/>
This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Security in the SDLC
This video explains security in the SDLC, methodologies, and maturity models.<br<br/>/>
This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Physical Security and Safety
This video explains KPIS of physical security and safety.<br<br/>/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Recovery and Response Strategies
This video explains recovery and response strategies with respect to disasters.
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
Curated Video
CISSP Crash Course - Patch and Vulnerability Management
This video explains the patch and vulnerability management process.<br<br/>/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Operate Detective and Preventative Controls
This video explains firewalls and how to operate detective and preventative controls.
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on...
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on...
Curated Video
CISSP Crash Course - Resource Protection
This video explains media management and protection.<br<br/>/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Security Operations Concepts
This video explains security operations concepts and separation of duties.
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
Curated Video
CISSP Crash Course - Configuration Management
This video explains configuration management.<br<br/>/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Curated Video
CISSP Crash Course - Conducting Logging and Monitoring Activities
This video explains logging and monitoring activities as well as incident management steps.
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on...
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on...