Instructional Video12:09
Crash Course

Mythical Language and Idiom: Crash Course World Mythology #41

12th - Higher Ed
It's the end of the world, everybody. Well, it's the end of our mythology series, anyway. This week, we're talking about how mythological themes have made their way into the English language. We're taking on the Herculean task of...
Instructional Video10:17
SciShow

5 More Computer Viruses You Really Don't Want to Get

12th - Higher Ed
From taking your files ransom to foiling uranium enrichment, here are five more computer viruses that you really want to avoid.
Instructional Video15:09
TED Talks

Carl June: A "living drug" that could change the way we treat cancer

12th - Higher Ed
Carl June is the pioneer behind CAR T-cell therapy: a groundbreaking cancer treatment that supercharges part of a patient's own immune system to attack and kill tumors. In a talk about a breakthrough, he shares how three decades of...
Instructional Video18:35
TED Talks

Joshua Prince-Ramus: Building a theater that remakes itself

12th - Higher Ed
Can architects re-engineer their design process? Joshua Prince-Ramus shows how the results can be spectacular. He walks us through his fantastic re-creation of the Wyly Theater as a giant "theatrical machine" that reconfigures itself at...
Instructional Video3:34
Curated Video

The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Trojan

Higher Ed
This video talks about mobile trojan horse malware. They can disguise themselves as a legitimate software application to attack the application / device. This clip is from the chapter "Mobile Threats and Countermeasures" of the series...
Instructional Video41:39
Mythology & Fiction Explained

The Trojan War | The Story Behind the Fall of Troy

12th - Higher Ed
Mythology & Fiction Explained explores the various legends and stories surrounding the Trojan War
Instructional Video17:44
Curated Video

Introduction to IT and Cybersecurity: Information Protection

Higher Ed
Part 14/16 of Introduction to IT and Cybersecurity series: In this video, the presenter discusses the various approaches and controls that can be implemented to protect information. The video explains how an organization's internal...
Instructional Video13:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Malware

Higher Ed
Malicious software is referred to as malware and includes various types including ransomware, fileless viruses, worms, keyloggers, and trojan horses. Infected computers that periodically contact command and control servers are called...
Instructional Video6:50
Amor Sciendi

Misinterpretations: Laocoon and His Sons | AmorSciendi

12th - Higher Ed
Have you seen this sculpture? I came across it many years ago in the Vatican Museum, and it's one of those that stays with you. I never pursued my interest in the sculpture, though, until I came across a reference to it while reading...
Instructional Video3:41
Curated Video

Describe the different types of malware that could affect a computer system or network : Understand the types of malware

Higher Ed
From the section: What are the threats?. This section includes threats, types of malware and lot more. This video gives an overview of malware and threats. It shows how to recognize malware, types of malware and how devices get them.
Instructional Video6:50
Amor Sciendi

Misinterpretations Laocoon and His Sons

12th - Higher Ed
Misinterpretations Laocoon and His Sons
Instructional Video10:12
Packt

CompTIA Network+ Certification N10-007: The Total Course - Malware

Higher Ed
This video explains the types of malware and what they do. This clip is from the chapter "Protecting Your Network" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn how to protect...
Instructional Video4:12
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Deeper Dive Look at IT Vulnerabilities

Higher Ed
This video explains a deeper dive look at IT vulnerabilities. This clip is from the chapter "Why We Need Risk Management" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the need for...
Stock Footage0:13
Getty Images

Virus

Pre-K - Higher Ed
A conceptual footage representing someone implementing a virus in a code
Stock Footage0:10
Getty Images

Angry at your Compter?

Pre-K - Higher Ed
Angry at your Compter?
News Clip0:27
Sherman Grinberg Film Library

Irish Sweepstakes Parade

Higher Ed
VS large replica of Wooden Horse of Troy parades through city, street lined with large crowd / young women in tunics ride atop wooden horse, tilt down, large boxes under its feet / young women in tunic costumes watch horse / dozens of...
Stock Footage4:12
Bridgeman Arts

Montage of books, different lessons, and children in classrooms at the Lycee Henri IV in Paris, 1951

Pre-K - Higher Ed
Clip 3 from the 1951 French film 'Le Lycee Sur La Colline', following a student of the 1950s from his entry at Lycee Henri IV (Paris) to his final graduation. Close up of books: Method of Romance language (Methode de langue latine),...