Instructional Video6:14
Curated Video

Practical Cyber Hacking Skills for Beginners - Introduction to NAT

Higher Ed
This video is a detailed introduction to Network Address Translation, allowing computers to share the same public IP address.
Instructional Video9:22
Curated Video

Practical Cyber Hacking Skills for Beginners - Working with DHCP Commands

Higher Ed
This video takes us through the different commands to operate the DHCP and protect a system or network from attacks.
Instructional Video5:34
Curated Video

Practical Cyber Hacking Skills for Beginners - Introduction to DHCP and DNS

Higher Ed
This video introduces us to the dynamic host configuration protocol and the domain name service.
Instructional Video5:03
Curated Video

Practical Cyber Hacking Skills for Beginners - Kali Linux Walkthrough

Higher Ed
This video is a demonstrative walkthrough of the Kali Linux operative system, how to use it, and work on it.
Instructional Video3:25
Curated Video

Build and Learn ASP.NET 6.0 Blazor Hands-On - The Program Class and Host Object

Higher Ed
This lecture explains the hosting process of a Blazor application where the Program class main method is the entry point to the application. This clip is from the chapter "Create a CRUD Application in Blazor" of the series "Build and...
Instructional Video3:32
Curated Video

Risk Management for Cyber Security Managers - Risk Avoidance

Higher Ed
This is the second way we can respond to a certain kind of risk and learn how to avoid risks at all costs.
Instructional Video4:14
Curated Video

Practical Cyber Hacking Skills for Beginners - Home Setup

Higher Ed
This video briefly overviews a network setup in a typical home, including electronic devices, modems, routers, hubs, and so on.
Instructional Video4:28
Brainwaves Video Anthology

US Senator Richard Blumenthal - Social Media: Online Safety

Higher Ed
U.S. Senator Richard Blumenthal from Connecticut discusses his concerns about the harmful effects of social media on children. While acknowledging the benefits of social media, he highlights the dangers, including exposure to content...
Instructional Video5:19
Curated Video

What Caused the Crowdstrike IT Disaster?

12th - Higher Ed
An analysis of CrowdStrike's official explanation of the code hat resulted in the largest IT disaster in history that crashed 8.5 million Windows computers in a single day. Topics Covered: Analysis of CrowdStrike disaster Why did...
Instructional Video7:27
Curated Video

Big Tech Events of July, 2024: OpenAI vs Google

12th - Higher Ed
Let's take a look at 15 big events that happened in Tech in July 2024, like Google's Alpha Proof math AI, the CrowdStrike Windows disaster, Node.js TypeScript support, new Python web frameworks, and more. Topics Covered: Tuaw Zombie...
Instructional Video4:22
Curated Video

Are We On the Brink of Another World Browser War

12th - Higher Ed
Google Chrome, Mozilla Firefox, Microsoft Edge, and Apple Safari dominate the web browser market share, but there are new emerging alternatives like Arc, Brave, and Ladybird that could shakeup the Internet over the next few years....
Instructional Video4:19
Curated Video

An Overview of Megaupload and Kim Dotcom

12th - Higher Ed
A brief history of Megaupload and its controversial founder Kim Dotcom. Find out how a teenage hacker built one of the largest websites in the world, which was eventually seized by the FBI for piracy. Topics Covered: Kim Dotcom...
Instructional Video3:35
Curated Video

Flaws in the Internet's Border Gateway Protocol

12th - Higher Ed
The White House recently unveiled a plan to deal with networking weaknesses in the Border Gateway Protocol. In the past, the BGP has been exploited or misconfigured to cause massive disruptions on the Internet. Topics Covered: Biggest...
Instructional Video4:49
Curated Video

Dox Vulnerabilities in Meta's Orion Glasses

12th - Higher Ed
Meta's new Orion Ray-Ban glasses are packed full of AI-features, but a group of college students have demonstrated potential privacy concerns with an app that can dox people in realtime called I-XRAY. Topics Covered: Meta Ray-Ban Orion...
Instructional Video4:21
Curated Video

How Hackers Targeted the Internet Archive's Wayback Machine

12th - Higher Ed
The Internet Archive's Wayback Machine was hit by hackers recently with DDoS attacks, a data breach, and vandalism on its website. Over 31 million accounts were compromised and the Wayback Machine has been temporarily taken offline. ...
Instructional Video7:00
Curated Video

Unpacking the Wordpress/WP Engine Fued

12th - Higher Ed
Automattic CEO Matt Mullenweg recently started a crusade against WP Engine, a profit-driven company based on WordPress’s open source platform, which has evolved into a lawsuit that could blow a hole in the internet. Find out why...
Instructional Video6:10
Curated Video

How to Break the Technical Interview

12th - Higher Ed
With the rise of remote work and AI, the tech world has also seen a rise in cheating on the software engineering technical interview. Let's look into modern techniques people use to cheat during coding interviews and the consequences of...
Instructional Video3:56
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Anonymizer

Higher Ed
In this video, we will look at the tools and software used to make activity on the Internet untraceable.
Instructional Video2:28
Great Big Story

Abby Stein’s journey from Hasidic roots to self-discovery

12th - Higher Ed
Follow Abby Stein's inspiring journey as she transitions from a sheltered Hasidic upbringing in Brooklyn to embracing her identity as a transgender woman.
Instructional Video3:12
Science ABC

What Is A Modem And What Does It Do?

Pre-K - Higher Ed
A modem is a very important piece of network hardware that allows a computer to send and receive data through a telephone line or cable connection. In simple words, its the device that connects a computer to the Internet. The word modem...
Instructional Video3:17
Science ABC

OAuth Explained

Pre-K - Higher Ed
OAuth is a protocol that helps big websites (websites that have a very large number of users, such as Google, Facebook, etc.) grant access to its users information to third-party websites or applications without sharing the users...
Instructional Video3:48
Science ABC

Does WiFi Have the Power to Travel Through Walls?

Pre-K - Higher Ed
Wi-Fi signals can penetrate walls using radio waves in the frequency range of 2.4GHz or 5GHz. These wavelengths are small enough to pass through cracks and openings in walls. WiFi signals also reflect off objects, allowing the signals to...
Instructional Video4:22
Science ABC

Did texting Kill Grammar?

Pre-K - Higher Ed
Language change is a natural process, as it changes with the changing needs of the people who speak it. First and foremost, language change is not necessarily a bad thing; if language never changed, we wouldn’t have words to indicate...
Instructional Video8:43
Curated Video

Cell nucleus: structure and function

9th - Higher Ed
The nucleus is one of the most important organelles found in eukaryotic cells. In this video, we will cover the definition, structure and functions of the cell nucleus.