Instructional Video6:12
SciShow

The Infamous, Brain-Bending Birthday Problem

12th - Higher Ed
There's a rather famous problem in math of probability called the Birthday Paradox. Let's get into how it works, and how creative uses of this hypothetical problem have real-world applications!
Instructional Video10:12
SciShow

4 Algorithms We Borrowed from Nature

12th - Higher Ed
We use algorithms every day for things like image searches, predictive text, and securing sensitive data. Algorithms show up all over nature, too, in places like your immune system and schools of fish, and computer scientists...
Instructional Video4:57
Curated Video

Git and GitHub Masterclass - Fast track your Journey to Git! - Git Internals (All about Object Database) Part 2

Higher Ed
This video explains how Git stores the data inside an object database.
Instructional Video3:28
Instructional Video6:27
Curated Video

Complete Linux Training Course to Get Your Dream IT Job - Central Logger (rsyslog)

Higher Ed
Implement rsyslog for centralized logging, an essential practice for monitoring and troubleshooting system activities.
Instructional Video8:01
Curated Video

What is the Blockchain?

10th - Higher Ed
Blockchain is a technology for recording transactions. And, since its first use in 2008 for cryptocurrency, it is emerging as one of the must-have technologies in many industry sectors. Project managers will often be called upon to...
Instructional Video20:07
Curated Video

Java Multithreading and Parallel Programming Masterclass - Project - Parallel Text File Processing

Higher Ed
This is a project-based video on parallel text file processing.
Instructional Video7:37
Curated Video

Practical Cyber Hacking Skills for Beginners - Launching a Word List Attack

Higher Ed
This video illustrates the first attack type, the word list, which is by specifying the actual mode to Hashcat.
Instructional Video10:21
Curated Video

Practical Cyber Hacking Skills for Beginners - Calculating Hash Values with PowerShell

Higher Ed
In this video, you will learn about calculating the hash values of different types of files using Microsoft PowerShell.
Instructional Video9:10
Curated Video

Practical Cyber Hacking Skills for Beginners - Hashing

Higher Ed
In this video, we will look at hashing, which is the conversion of key/string/variable into a hash using an algorithm used in malware and antimalware products.
Instructional Video6:37
Curated Video

Practical Cyber Hacking Skills for Beginners - Hardening Networks

Higher Ed
Here, you will learn how to harden networks. What devices and protocols are available to harden a network from being hacked?
Instructional Video2:52
Curated Video

Harmful Drugs: Cannabis

6th - 12th
Cannabis is a controversial drug: there are debates around its production, legal status and use. What are the facts behind the use of this drug, and how safe or dangerous is it? Biology - Healthy Living - Cannabis is a mild sedative and...
Instructional Video5:57
Instructional Video36:47
Curated Video

Git and GitHub Masterclass - The Practical Bootcamp - Profile README

Higher Ed
This video explains the profile README file, which allows users to use a markdown file named README to write details about themselves such as their skills, interests, GitHub stats, and showcase it to the GitHub community.
<
br/>...
Instructional Video5:35
Curated Video

Hands-On Continuous Integration and Automation with Jenkins - What Is Blue Ocean?

Higher Ed
This video explains what Blue Ocean is, which advantages it brings, and its main features.
Instructional Video4:55
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - What Are Cryptographic Functions

Higher Ed
In this video, we will be discussing cryptographic functions in Solidity. Cryptographic functions play a critical role in securing smart contracts and ensuring that data transmitted over the blockchain is kept private and tamper-proof....
Instructional Video4:55
Curated Video

Learn Java from Scratch - A Beginner's Guide - Step 09 - Inheritance and Overriding with toString() Method

Higher Ed
In this video, you will learn about inheritance and overriding with the toString() method.
Instructional Video9:44
Curated Video

Express Framework Fundamentals - Secure Sign-Up with Auth0 and Node.js - Sign Up and Database Completion with Hashing and Salt

Higher Ed
In this video, we will work on sign up and database completion with Hashing and Salt.
<
br/>
This clip is from the chapter "Authenticating Username and Password with Express and Passport" of the series "Express Framework...
Instructional Video3:57
Curated Video

Fundamentals of Secure Software - Hashing Demo

Higher Ed
This is a demo video on hashing.
Instructional Video5:48
Curated Video

Fundamentals of Secure Software - Hashing Overview

Higher Ed
This video provides an introduction and overview of hashing.
Instructional Video2:51
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Publicly Exposed Backup Files

Higher Ed
This video talks about how to find publicly exposed backup files using Google Hacking.
<
br/>
This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by...
Instructional Video13:21
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Login

Higher Ed
In this video, we will implement the user login functionality using Passport.js authentication.
Instructional Video8:44
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Password Hashing with Bcrypt

Higher Ed
In this video, we will explore how to securely hash and store user passwords using Bcrypt.