Curated Video
Republicans, Dems clash at Clinton email hearing
Republican and Democratic lawmakers clashed and three witnesses ordered to testify on Capitol Hill about Hillary Clinton's use of a private email server either did not appear, or refused to answer questions, invoking the Fifth Amendment....
Curated Video
GOP, Dems Clash at Clinton Email Hearing
Republican and Democratic lawmakers clashed and three witnesses ordered to testify on Capitol Hill about Hillary Clinton's use of a private email server either did not appear, or refused to answer questions, invoking the Fifth Amendment....
Curated Video
GOP, Dems Clash at Clinton Email Hearing
FOR CLEAN VERSION SEE STORY NUMBER: apus062939Republican and Democratic lawmakers clashed and three witnesses ordered to testify on Capitol Hill about Hillary Clinton's use of a private email server either did not appear, or refused to...
TED Talks
Peter Beck: Small rockets are the next space revolution
We're in the dawn of a new space revolution, says engineer Peter Beck: the revolution of the small. In a talk packed with insights into the state of the space industry, Beck shares his work building rockets capable of delivering small...
TED Talks
TED: Your phone company is watching | Malte Spitz
What kind of data is your cell phone company collecting? Malte Spitz wasn’t too worried when he asked his operator in Germany to share information stored about him. Multiple unanswered requests and a lawsuit later, Spitz received 35,830...
SciShow
5 of the Worst Computer Viruses Ever
Michael Aranda explains five of the worst computer viruses that have hit the net!
Bozeman Science
Cell Communication
Paul Andersen discusses cell communication. He begins by explaining how he communicates with other individuals using various forms of electronic communication. He them explains how cells communicate when the distance between them is big,...
SciShow
How the Internet Was Invented | The History of the Internet, Part 1
The Internet is older than you might think!
SciShow
What Happens to an Email After You Click "Send"?
Email is one of the most essential things to our life. But do you actually know what happens when you click the "send" button, and how it's sent to your friends?
Crash Course
The Secret to Business Writing: Crash Course Business - Soft Skills
In business, you need to know how to write. And that involves learning a bunch of things like knowing who you're writing to and what kind of thing you're writing. In this episode of Crash Course Business Soft Skills, Evelyn talks to us...
Curated Video
Increase Your Email Responses: How to Get People to Respond to Emails
Do you want to increase your email responses? I expect you do. After all, you take the trouble to craft your email. So why wouldn't you want people to respond to it? Project Management technology is changing fast. But it's a fair bet...
Curated Video
Let’s Communicate About Communication
Miss Palomine gives the student an overview of how communication and related devices have changed.
Curated Video
Using Communication Technology
Miss Palomine uses her cell phone to find her friend at an amusement park. This leads to a discussion of the benefits of current communication technologies, like the cell phone and email.
Curated Video
SkillSprints: Understanding and Preventing Phishing Emails
Phishing is a major cybersecurity problem. In this video you'll learn how to identify Phishing emails and properly dispose of them when you receive them.
Hip Hughes History
The Hatch Act Explained
Did James Comey violate the Hatch Act? What is the Hatch Act?
Curated Video
Business Email Compromise
The video explains the phishing attack of BEC, how it originates and what are the tricks used on employees
Curated Video
Other Phishing Techniques
The video explains the phishing attack techniques and how you can identify and avoid them
Curated Video
Hack Facebook, Twitter, and Gmail Accounts
We will use the SET tool to setup a phishing campaign in order to hack social media accounts
Curated Video
Dealing With Security Incidents
This video will advise you on how to deal with cyber security incidents once they happen, and whom to contact in order to get help
Curated Video
Who is Selling Your Email Addresses
This video will help you identify those companies you sign up to, who in return sell your email addresses to companies who will spam you. You can easily identify those now.
Curated Video
DKIM Email Security
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Curated Video
Execute a Phishing Attack
In this video, you will learn how to plan and execute a phishing attack using the SET tool