Instructional Video10:30
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - AWS Control Tower

Higher Ed
This video will explore the features and benefits of using AWS Control Tower to manage multiple AWS accounts.
Instructional Video4:07
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - AWS Cost Explorer

Higher Ed
AWS Cost Explorer gives granular detail about your spending in AWS, so there's no more surprises when your month-end bill comes in.
Instructional Video11:28
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 1 (Part1)

Higher Ed
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Instructional Video3:47
Curated Video

ChatGPT and DALL-E: Sell Your Creative Thinking with AI - How to Address AI Bias in Creative Work

Higher Ed
In this video, we will explore some ways to address bias in creative work that involves AI systems. We will discuss the importance of being aware of bias and provide some tips on how to mitigate bias in your AI-generated content. This...
Instructional Video2:28
Curated Video

ChatGPT and DALL-E: Sell Your Creative Thinking with AI - Limitation 2: Output Is Not Reliably Accurate

Higher Ed
In this video, we will examine the limitation that generative AI output is not always accurate or reliable. This clip is from the chapter "When (And When Not) to Use AI" of the series "ChatGPT and DALL-E: Sell Your Creative Thinking with...
Instructional Video24:09
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 1

Higher Ed
This is the first of the two-part video that demonstrates the actual attack where you would take control of the account with the help of Clickjacking. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the...
Instructional Video16:39
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through Polyglot File

Higher Ed
This video explains bypassing CSP through polyglot file. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses...
Instructional Video4:24
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 2

Higher Ed
This is the second of the two-part video that demonstrates how to be prevented from the account takeover through Clickjacking. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking...
Instructional Video11:29
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 1 (Part1)

Higher Ed
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how the hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Instructional Video10:29
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - User Redirection through window.opener Tabnabbing – Part 1

Higher Ed
This is the first of the two-part video that talks about how to attack through link. You will work on the user redirection through window.opener tabnabbing. This clip is from the chapter "Hacking Web Applications through PDFs, Images,...
Instructional Video15:49
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Token Hijacking through PDF – Part 2

Higher Ed
This is the second of the two-part video that demonstrates token hijacking through PDF. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation...
Instructional Video10:18
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Token Hijacking through PDF – Part 1

Higher Ed
This is the first of the two-part video that demonstrates token hijacking through PDF. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation...
Instructional Video17:49
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Bypassing CSP through AngularJS

Higher Ed
This video explains and demonstrates the bypassing of CSP through AngularJS. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation...
Instructional Video7:03
Curated Video

ChatGPT for Creatives - Creating Settings and Monsters

Higher Ed
In this video, you will learn about creating settings and monsters for our manga and comics. We will discuss various techniques and tips for creating unique and interesting settings that will enhance the story's mood and themes. We will...
Instructional Video2:09
Great Big Story

From prank to practice, the unexpected journey of Liquid Ass

12th - Higher Ed
Explore the quirky story of Liquid Ass, a prank fart spray that found an unexpected role in military medical training, helping prepare troops for real-world conditions.
Instructional Video4:40
Curated Video

Deep Learning - Artificial Neural Networks with Tensorflow - Stochastic Gradient Descent

Higher Ed
In this video, you will learn about stochastic gradient descent. This clip is from the chapter "In-Depth: Gradient Descent" of the series "Deep Learning - Artificial Neural Networks with TensorFlow".In this optional section, we will dive...
Instructional Video17:21
Curated Video

Deep Learning - Artificial Neural Networks with Tensorflow - Activation Functions

Higher Ed
In this video, you will learn about activation functions. This clip is from the chapter "Feedforward Artificial Neural Networks" of the series "Deep Learning - Artificial Neural Networks with TensorFlow".In this section, we will cover...
Instructional Video15:53
Curated Video

Deep Learning - Artificial Neural Networks with Tensorflow - Code Preparation (Classification Theory)

Higher Ed
In this video, we will take a crash course in linear classification for TensorFlow 2.0. This clip is from the chapter "Machine Learning and Neurons" of the series "Deep Learning - Artificial Neural Networks with TensorFlow".In this...
Instructional Video9:00
Curated Video

Limitless: The Evolution and Future of Athletic Records

6th - Higher Ed
Dive into the world of athletic records and the ongoing quest to push human limits in sports like pole vaulting, swimming, and sprinting. Explore how athletes like Renaud Lavillenie and Frédérick Bousquet have shattered expectations and...
Instructional Video8:51
Curated Video

Young Prodigies: The Making of Tomorrow's Champions

6th - Higher Ed
Explore the rigorous worlds of budding young athletes in sports like synchronized swimming and tennis at INSEP, France's premier training facility for elite sports. Discover how young prodigies like Juliette and Rayane are shaped by a...
Instructional Video7:33
Curated Video

Chilled to the Bone: Nicolas Vanier's Mastery of the Extreme Cold

6th - Higher Ed
Dive into the frigid world of Nicolas Vanier as he trains on the Vercors plateau, preparing for the grueling conditions of the Siberian winter. This feature explores how Nicolas and his sled dogs adapt to severe cold, focusing on...
Instructional Video10:51
Curated Video

Deep Learning - Convolutional Neural Networks with TensorFlow - Transfer Learning Code (Part 1)

Higher Ed
In this video, we will dive into action and look at codes for transfer learning with data augmentation. This clip is from the chapter "Transfer Learning for Computer Vision" of the series "Deep Learning - Convolutional Neural Networks...
Instructional Video8:15
Curated Video

Deep Learning - Convolutional Neural Networks with TensorFlow - Transfer Learning Theory

Higher Ed
In this video, we will get introduced to the concept of transfer learning. This clip is from the chapter "Transfer Learning for Computer Vision" of the series "Deep Learning - Convolutional Neural Networks with TensorFlow".In this...
Instructional Video4:54
Curated Video

Deep Learning - Convolutional Neural Networks with TensorFlow - 2 Approaches to Transfer Learning

Higher Ed
In this video, we will discuss the two approaches used for transfer learning, which we will use in the next videos. This clip is from the chapter "Transfer Learning for Computer Vision" of the series "Deep Learning - Convolutional Neural...