Instructional Video5:32
Curated Video

Evolution of Mobile Phones: From Wireless Telephones to Lifestyle Devices

Pre-K - Higher Ed
The video explores the evolution of mobile phone technology, from the earliest wireless telephone invented by Nathan Stubblefield in 1902 to modern advancements like biometric security features and fitness tracking capabilities. It...
Instructional Video4:30
Curated Video

Revolutionizing the Fashion Industry: The Smart Dressing Mirror

Pre-K - Higher Ed
The smart dressing mirror is a cutting-edge technology that revolutionizes the clothes shopping experience by allowing customers to virtually try on garments, mix and match outfits, and receive personalized recommendations. Developed by...
Instructional Video1:40
Curated Video

Internet Security Threats: The Rise of Financially Motivated Hackers

Pre-K - Higher Ed
The video highlights the shift in motivations of modern computer hackers towards financial gain, with a rise in attacks involving identity theft, extortion, and fraud. Symantec's report reveals the prevalence of phishing messages,...
Instructional Video20:48
Curated Video

The Evolution of Roman Defensive Strategies: From Client States to Defence in Depth

6th - Higher Ed
This video explores the evolution of Rome's defensive strategies from client states to a defense in depth system in response to changing geopolitical and military challenges. It discusses the trade-offs between comprehensive security and...
Instructional Video4:56
Curated Video

Vance Packard - The Hidden Persuaders

10th - Higher Ed
Vance Packard was not an advertising executive nor a marketer: he was a journalist. But, his book, the Hidden Persuaders, exposed the 1950s advertising industry. In many ways, Hidden Persuaders provides the background scenery of...
Instructional Video8:57
Curated Video

Ryan & Deci: Self Determination Theory (SDT) - Content Models of Motivation

10th - Higher Ed
Ryan & Deci are the founders of Self Determination Theory (SDT). It's possibly the most substantial modern body of research on motivation. As such, it is essential for modern managers to understand the basics.
Instructional Video1:05
Curated Video

Ensuring Information Security: Challenges and Preparations for Major Events

Pre-K - Higher Ed
The video discusses the importance of information security in the world of technology, highlighting the potential threats from organized crime and individual hackers. It also mentions the massive undertaking of ensuring information...
Instructional Video1:13
Curated Video

Enhanced Airport Security Measures to Combat Terrorism

Pre-K - Higher Ed
Since the terrorist attacks on New York, airports worldwide, including the main airports in the UK, have implemented tighter security measures. The British Airports Authority (BAA) has taken responsibility for airport security and has...
Instructional Video4:34
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - AWS Multi-Factor Authentication (MFA)

Higher Ed
This video demonstrates how to set up the AWS multifactor authentication.
Instructional Video3:12
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - Virtual Private Cloud (VPC)

Higher Ed
This is the final cloud deployment model, the virtual private cloud, which maintains the same security restrictions as a private cloud but offloads apps or workloads as a public cloud.
Instructional Video3:41
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - Private Cloud

Higher Ed
In this video, we will understand the first cloud deployment model, the private model, single-tenant environments accessible by a single organization.
Instructional Video4:38
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - Self-Hosting Versus Hosting Provider

Higher Ed
In this lesson, we will understand the basic difference between the self-hosting provider, which runs and maintains a website or service using a private web server, and the hosting provider, using a service outside of someone's own control.
Instructional Video7:55
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - Disabling Root User Access and Password Authentication

Higher Ed
In this video, we will look at a demonstration to add an extra layer of security to the user and plain password authentication.
Instructional Video8:41
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - Introduction to Linux

Higher Ed
In this video, we will focus on Linux, starting with the Linux overview.
Instructional Video8:54
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - Benefits of Cloud Computing

Higher Ed
This lecture will explain the various benefits of cloud computing, the core advantages, and cloud administration.
Instructional Video4:09
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - IAM Multi-Factor Authentication (MFA)

Higher Ed
This lesson will examine IAM multifactor authentication applicable to AWS and the AWS root account.
Instructional Video2:04
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - Configure a Custom Password Policy

Higher Ed
In this lesson, we will configure a custom password policy as an added layer of security for an AWS user account.
Instructional Video4:16
Curated Video

GCSE Physics - Visible and UV Light #67

9th - Higher Ed
This video covers: - The different colours of visible light - How light is used is optical fibres - The concept of fluorescence with ultraviolet radiation - How ultraviolet radiation can be used in security General info: - Suitable for...
Instructional Video3:15
Curated Video

The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Android Security Tweaks

Higher Ed
This video talks about a few more settings that you might need to tweak to keep your Android device safe from attacks. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to Cybersecurity...
Instructional Video4:23
Curated Video

The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Google Play Versus the App Store

Higher Ed
In this video, the author tries to explain the difference between Google Play Store and the App Store and shares a few statistics to support the explanation. It also answers the question of which is more secure—the Apple App Store or the...
Instructional Video2:39
Curated Video

The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Android Versus Apple Versus Blackberry

Higher Ed
This video helps us compare the top three mobile operating systems, which are Android, Apple, and Blackberry. The author will take you through the major pros and cons of using each one. By the end of the video, you will understand which...
Instructional Video3:15
Packt

Android Security Tweaks

Higher Ed
This video talks about a few more settings that you might need to tweak to keep your Android device safe from attacks. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to Cybersecurity...
Instructional Video5:19
Curated Video

Build a Super Advanced Trading Bot on DYDX Hosted on AWS with Python - AWS EC2 - Plan of Attack

Higher Ed
In this video, we will outline the plan of attack for deploying your trading bot on an AWS EC2 (Elastic Compute Cloud) instance. You will gain a clear understanding of the steps involved, from creating a security group to launching the...
Instructional Video8:42
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - Network ACLs Versus Security Groups

Higher Ed
This video talks about network ACLs versus security groups. This clip is from the chapter "VPC - Configure Custom Virtual Private Cloud in AWS Cloud" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This...