Instructional Video3:08
Science ABC

Do Plants Next To Roads Absorb Pollution And Become Harmful?

Pre-K - Higher Ed
Plants next to roads can absorb pollution and become harmful, but it really depends on the type of pollution and how close the plant is to the road.



Vehicles don’t just produce carbon dioxide and nitrous oxides, but also...
Instructional Video1:19
Let's Tute

Is Alaskapox Virus the Next COVID 19 Pandemic

9th - Higher Ed
Recently, the world faced a massive pandemic, and now we're confronted with another emerging threat: Alaskapox, a virus from the same family as smallpox and cowpox. In today’s short video, we’ll take a closer look at this virus,...
Instructional Video10:30
Curated Video

What Is The Asian Himbo And Why Is This Character So Popular

12th - Higher Ed
Black Kung Fu films reigned in the 1970s – a fusion of Blaxploitation and Kung Fu where protagonists took justice into their own hands…in style! These films were wildly popular, a welcome response to the anger many people felt against...
Instructional Video3:46
Wonderscape

Understanding the Threat of Climate Change to Forests

K - 5th
Explore the significant threat posed by climate change to forests worldwide. Learn about the causes and consequences of climate change, including the role of greenhouse gases and the impact on forest ecosystems. Discover how forests,...
Instructional Video8:25
Curated Video

The Rise of Islam in Ancient India

3rd - Higher Ed
For a long time, Hindu civilization had isolated itself. The leaders, believing in their cultural superiority, discouraged sea travel and did not invest in sea defenses, leaving them vulnerable to invasions. This vulnerability was...
Instructional Video11:44
PBS

The Origins of ‘Big Bug’ Science Fiction

9th - Higher Ed
Insects make up 80 percent of the world’s species, so it's not all that surprising we’ve occasionally made them into monsters in science fiction and horror. What is staggering is why the “big bug” subgenre took off in the 1950s. Find out...
Instructional Video7:41
Curated Video

The Animal Within: Uncovering Human Instincts

6th - Higher Ed
Explore the primal instincts that connect humans with the animal kingdom. This fascinating documentary delves into the survival and reproductive behaviors that humans share with animals, demonstrating our innate responses to fear and...
Instructional Video9:22
Curated Video

Fundamentals of Secure Software - Microsoft Threat Model Tool demo

Higher Ed
This is a demo video of the Microsoft Threat Model tool.
Instructional Video7:14
Curated Video

Fundamentals of Secure Software - Introduction to Threat Modeling

Higher Ed
This video provides an introduction to threat modeling.
Instructional Video11:09
Curated Video

Fundamentals of Secure Software - Threat Actors and More Definitions

Higher Ed
This video demonstrates the different attackers that threaten software and systems. You will look at more foundational definitions.
Instructional Video4:27
Curated Video

ChatGPT and DALL-E: Sell Your Creative Thinking with AI - Why AI Can't Replace Creatives (But We Should Still Learn It)

Higher Ed
In this video, we will explore the relationship between AI and creativity. We will discuss why AI can never fully replace human creativity but why it is still essential for creatives to understand and learn about AI.
<
br/>
This...
Instructional Video1:22
Great Big Story

Secrets of the Japanese giant salamander, an ancient survivor

12th - Higher Ed
Uncover the unique traits and challenges facing the Japanese giant salamander, one of the world's largest and oldest amphibians.
Instructional Video9:26
Curated Video

CISSP Crash Course - Secure Coding Guidelines

Higher Ed
This video explains the weaknesses in software and API security.<br<br/>/>

This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Instructional Video3:25
Curated Video

CISSP Crash Course - Assess Software Security

Higher Ed
This video explains assessing software security and how to audit and log the changes.<br<br/>/>

This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Instructional Video12:24
Curated Video

CISSP Crash Course - Security Controls in the SDLC

Higher Ed
This video explains SDLC practices and security controls in the SDLC.<br<br/>/>

This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Instructional Video7:06
Curated Video

CISSP Crash Course - Security in the SDLC

Higher Ed
This video explains security in the SDLC, methodologies, and maturity models.<br<br/>/>

This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Instructional Video6:13
Curated Video

CISSP Crash Course - Physical Security and Safety

Higher Ed
This video explains KPIS of physical security and safety.<br<br/>/>

This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video9:42
Curated Video

CISSP Crash Course - Recovery and Response Strategies

Higher Ed
This video explains recovery and response strategies with respect to disasters.
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
Instructional Video3:03
Curated Video

CISSP Crash Course - Patch and Vulnerability Management

Higher Ed
This video explains the patch and vulnerability management process.<br<br/>/>

This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video10:49
Curated Video

CISSP Crash Course - Operate Detective and Preventative Controls

Higher Ed
This video explains firewalls and how to operate detective and preventative controls.
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on...
Instructional Video3:06
Curated Video

CISSP Crash Course - Resource Protection

Higher Ed
This video explains media management and protection.<br<br/>/>

This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video5:03
Curated Video

CISSP Crash Course - Security Operations Concepts

Higher Ed
This video explains security operations concepts and separation of duties.
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security...
Instructional Video1:41
Curated Video

CISSP Crash Course - Configuration Management

Higher Ed
This video explains configuration management.<br<br/>/>

This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video12:49
Curated Video

CISSP Crash Course - Conducting Logging and Monitoring Activities

Higher Ed
This video explains logging and monitoring activities as well as incident management steps.
<
br/>
This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on...