Instructional Video3:51
Vlogbrothers

Do I Have ADHD?

6th - 11th
Just something I've been thinking about for a while.
Instructional Video4:59
Science Buddies

Identify Road Signs with Google's Teachable Machine

K - 5th
Train a machine learning model to identify different road signs in this fun STEM activity! No computer programming is required - you will use a free online tool called Teachable Machine by Google. Written instructions are available on...
Instructional Video4:53
Science Buddies

How to Use an Arduino

K - 5th
Learning how to use an Arduino is a great way to get started with electronics and programming. This video series will guide you through setting up an Arduino, programming it, and building circuits so you have all the knowledge you need...
Instructional Video7:11
All In One Social Media

Repurpose Your Live Stream into Reels and TikToks SUPER EASY

Higher Ed
Reels and Tiktok are the fastest growing ways to grow and get engagement on social media. In this video, I will show you how to repurpose your live streams into Reels or Tiktoks for more reach.
Instructional Video6:21
Curated Video

Cracking WPA and WPA2 new 2

Higher Ed
This video will explain the difference between two famous wireless protocols, and will show you a technique on cracking the passwords by deauthenticating users connected to a specific SSID
Instructional Video13:24
Curated Video

How to Program Quantum Computer?

9th - Higher Ed
In this part we build three quantum computers that can process simple commands by manipulating the Energy Operators in Schrodinger Equation. Solving NOT gate by quantum computing, Solving Controlled NOT gate by quantum computing
Instructional Video3:41
Curated Video

Post-Exploitation Terminologies

Higher Ed
This video will teach you the jardong used when it comes to post exploiting a target
Instructional Video10:09
Curated Video

Create a $3 Rubber Ducky Key-logger

Higher Ed
Rubber ducky is the most famous key logger, but it is expensive. In this video you will learn how to create a similar device by buying an Arduino hardware from AliExpress at a cheap price
Instructional Video4:49
Curated Video

Execute a Phishing Attack

Higher Ed
In this video, you will learn how to plan and execute a phishing attack using the SET tool
Instructional Video3:41
Curated Video

Firewalls and Security Appliances

Higher Ed
Any type of server appliance intended to safeguard computer networks from unauthorized traffic is referred to as a security appliance.
Instructional Video1:20
Curated Video

Remote Work Security

Higher Ed
The video provides you with tips on how to safely work remotely (home, cafe, any place)
Instructional Video6:32
Curated Video

Pass the Hash with Mimikatz on Windows

Higher Ed
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Instructional Video3:56
Curated Video

Wi-Fi Security

Higher Ed
You will learn how to protect your home WiFi and be vigilant when you are using public Wifi
Instructional Video6:13
Curated Video

Install a Backdoor

Higher Ed
In this video, you will learn how to maintain a permanent access to a compromised machine by installing a backdoor. Use this approach ethically !!!
Instructional Video10:09
Curated Video

Create a $3 Undetectable Bad USB

Higher Ed
In this tutorial, you will learn how to mimic a Rubber Ducky USB and how to upload your payload in order to execute various types of attacks.
Instructional Video6:21
Curated Video

Hack WPA2 Wireless Networks

Higher Ed
In this tutorial, you will learn how to crack into WPA and WPA2 wireless networks using various tools like aircrack-ng.
Instructional Video8:35
Curated Video

Execute Man-in-the-Middle Attacks

Higher Ed
Learn how to execute MITM attacks using Ettercap tool, a very powerful application in Kali
Instructional Video5:11
Curated Video

Explore Main Services and Install Necessary Programs

Higher Ed
This video will help you get started in setting up your lab
Instructional Video7:01
Curated Video

Importance of Cyber Security

Higher Ed
The video explains the importance of cyber security in a connected world
Instructional Video17:44
Curated Video

Introduction to IT and Cybersecurity: Information Protection

Higher Ed
Part 14/16 of Introduction to IT and Cybersecurity series: In this video, the presenter discusses the various approaches and controls that can be implemented to protect information. The video explains how an organization's internal...
Instructional Video3:20
Curated Video

Publish Your Weapons Online

Higher Ed
This video will teach you how to prepare your lab for a real world attack
Instructional Video1:14
Curated Video

How to Exploit Vulnerabilities

Higher Ed
Vulnerabilities are weaknesses in a computer system that reduce its overall security. Vulnerabilities might be flaws in the hardware itself or the software that uses it.
Instructional Video1:13
Curated Video

Port Scanning

Higher Ed
An application called a port scanner scans a server or host for open ports. Administrators may use such an application to check the network security policies, and attackers may use it to discover network services operating on a host and...
Instructional Video3:56
Curated Video

Symetric and Assymetric Encryption

Higher Ed
This video will differentiate between the two main types of encryption