Instructional Video5:24
Curated Video

Balancing Act Part 2: Categorizing Tasks for Effective Time Management

6th - 8th
In part 2 of "Balancing Act," we continue our journey towards finding balance and reducing stress. We introduce the strategy of chunking, which involves categorizing tasks to make them more manageable. Similar to grocery shopping, where...
Instructional Video3:40
Vlogbrothers

My Physicalmental Illness

6th - 11th
In which John discusses labyrinthitis, OCD, categories, the body in thought, and the body in pain.
Instructional Video4:48
Vlogbrothers

Why is College So Expensive?

6th - 11th
College is a good deal, but it could be a much better deal. A combination of factors have driven the costs of higher education in America to increase extremely quickly, pricing some people out of an education and building over a trillion...
Instructional Video2:27
Curated Video

Web Applications Security Overview

Higher Ed
This video will highlight the security concerns when it comes to web applications
Instructional Video13:49
Curated Video

GDPR Data Protection Principles

Higher Ed
This section provides information that will help participants gain knowledge on the key concepts of the GDPR, the data protection principles, and the rights of the data subject.
Instructional Video3:30
Curated Video

R Programming for Statistics and Data Science - Categorical Data

Higher Ed
This video explains categorical data. This clip is from the chapter "Matrices" of the series "R Programming for Statistics and Data Science".This section explains matrices.
Instructional Video5:51
Curated Video

R Programming for Statistics and Data Science - Variables: Revisited

Higher Ed
This video explains variables. This clip is from the chapter "Visualizing Data" of the series "R Programming for Statistics and Data Science".This section explains visualizing data.
Instructional Video8:09
Curated Video

How to Analyze a Cyber Attack

Higher Ed
Traditional information security attack analysis focuses on malware and computer intrusions, in which an attacker utilizes technical prowess to exploit a vulnerability to gain access to or harm a system (or network).
Instructional Video10:27
Professor Dave Explains

The Roots of Logic in the Ancient World

12th - Higher Ed
I did promise that this playlist would include logic in addition to philosophy, so it's time to get rolling with that. How did logic emerge, and how did it evolve over time? Let's focus first on its origins and its status leading up to...
Instructional Video3:39
Curated Video

Mapping ISO 27001-2022 controls to NIST CSF subcategories

Higher Ed
In this video, we will explore the process of mapping ISO 27001-2022 controls to NIST CSF subcategories. ISO 27001-2022 is a widely recognized standard for information security management, while NIST CSF is a framework that provides...
Instructional Video5:27
Curated Video

Mapping ISO 27001- 2013 and ISO 27001- 2022 ANNEX A controls

Higher Ed
In this video, we will be discussing the process of mapping ISO 27001-2013 and ISO 27001-2022 ANNEX A controls. ISO 27001 is a globally recognized standard for information security management systems, and it provides a framework for...
Instructional Video1:56
Curated Video

What are the new requirements in ISO 27001:2022

Higher Ed
In this video, we will be discussing the new requirements in the upcoming ISO 27001:2022 standard. ISO 27001 is a globally recognized standard for information security management systems, and the new version is set to be released in...
Instructional Video1:18
Visual Learning Systems

Understanding the Classification System

9th - 12th
This video provides an overview of the classification system. The video uses the example of a house cat to illustrate this concept, showing how it is classified in various categories such as animals, cordates (animals with backbones),...
Instructional Video15:23
Curated Video

Apache Kafka - Real-time Stream Processing (Master Class) - Real-time Streaming - Use Cases

Higher Ed
In this lecture, you will learn about the categories of real-time stream processing use cases. This video aims to cement the idea and concrete your understanding of the application of real-time stream processing. You will learn about...
Instructional Video8:32
Mister Simplify

Vygotsky’s theory of Social Development - Simplest explanation ever

12th - Higher Ed
Vygotsky's Theory of Social Development is as much a benchmark as Piaget's theory in understanding child psychology and cognition. It was, and is still used to develop curriculum the world over. This video covers the important aspects of...
Instructional Video3:41
Global Health with Greg Martin

Careers in Global Health - identify your area of interest

Higher Ed
The first in a 4 part series that takes a look at what you need to do to get your career in global health off to a good start. In this video Greg Martin walks you through the process of identifying your area of interest.
Instructional Video4:32
Curated Video

Creating a Two-Way Table from a Venn Diagram

K - 5th
In this video, we learn how to create a two-way table from a Venn diagram. Examine the concept of a Venn diagram and how it represents the relationship between two categories. Understand how to transfer the information from the Venn...
Instructional Video8:20
Professor Dave Explains

Psychiatric Disorders Schizophrenia, Depression, Mania, and Anxiety

12th - Higher Ed
There are lots of ways that things can go wrong in the brain, and some of these things lead to psychiatric disorders. Some of the more common ones include schizophrenia, depression, mania, and anxiety. How are these diagnosed? What are...
Instructional Video9:23
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Security Controls

Higher Ed
Various security standards such as PCI DSS and the Cloud Controls Matrix (CCM) define what types of security controls to put in place to mitigate risk both on-premises and in the cloud. The specific type of attack vector determines...
Instructional Video5:06
Healthcare Triage

Where is the Waste in Health Spending?

Higher Ed
Up to 25% of health spending in the US is wasteful. Where is that money being lost? What can we do about it?
Instructional Video4:06
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Categories of ML Tasks and Attacks

Higher Ed
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools. The aim of this video is to demonstrate that all approaches to solving...
Instructional Video0:53
Visual Learning Systems

Introduction to the Six Kingdoms of Living Organisms

9th - 12th
In this video, the teacher discusses the classification of living things into six broad categories called kingdoms. This video is part of the 12-part series, Classifying Living Things.
Instructional Video6:35
Zach Star

How Much do Engineers and Scientists Make? Salary and Employment Statistics

12th - Higher Ed
Two common statistics that are helpful to know about any college major are: how much money you can expect to make, and the amount of job opportunities. Here I outline the statistics for many of the most majors and careers when it comes...
Instructional Video6:22
Catalyst University

Blood Pressure Categories + 5 Examples

Higher Ed
In this video, we define the measurement of blood pressure and explore the current classifications for blood pressure using 5 examples.