Instructional Video9:19
Bedtime History

The Great Wall of China For Kids

K - 12th
Learn about the construction and history of the Great Wall of China featuring Bedtime History narration designed especially for kids.
Instructional Video4:46
Wonderscape

The Rise and Fall of Freedmen's Towns and the Red Summer

K - 5th
Discover the history of all-Black towns established after the Civil War, offering hope and refuge for newly freed Black Americans. Explore how events like D.W. Griffith's "The Birth of a Nation" and the Red Summer of 1919 led to a...
Instructional Video2:04
Curated Video

Fundamentals of Secure Software - RASP (Runtime Application Self-Protection)

Higher Ed
This video talks about RASP (Runtime Application Self-Protection).
Instructional Video7:44
Curated Video

Fundamentals of Secure Software - Running a ZAP Scan

Higher Ed
In this video, we will run a ZAP scan.
Instructional Video3:06
Curated Video

Fundamentals of Secure Software - Server-Side Request Forgery

Higher Ed
This video demonstrates server-side request forgery.
Instructional Video3:56
Curated Video

Fundamentals of Secure Software - Identification and Authentication Failures

Higher Ed
This video explains identification and authentication failures.
Instructional Video9:02
Curated Video

Fundamentals of Secure Software - Injection

Higher Ed
This video explains Injection.
Instructional Video2:26
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Case Studies of Award-Winning Race Condition Attacks

Higher Ed
This video explains some case studies of award-winning race condition attacks. This clip is from the chapter "Exploiting Race Conditions with OWASP ZAP" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".null
Instructional Video1:47
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-What is Covered in This Course?

Higher Ed
This video provides an introduction to the section. This clip is from the chapter "Exploiting Race Conditions with OWASP ZAP" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".null
Instructional Video4:40
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - The Basics of Sqlmap Demo

Higher Ed
This is a demo video of the basics of Sqlmap. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on how...
Instructional Video1:18
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Full-Stack Attacks on Modern Web Applications

Higher Ed
This video introduces the section. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".null
Instructional Video2:25
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Case Studies of Award-Winning Race Condition Attacks

Higher Ed
This video explains some case studies of award-winning race condition attacks. This clip is from the chapter "Exploiting Race Conditions in Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section...
Instructional Video1:55
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Exploiting Race Conditions in Web Applications

Higher Ed
This video introduces the section. This clip is from the chapter "Exploiting Race Conditions in Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on exploiting race conditions in...
Instructional Video3:36
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Hacking AngularJS Applications

Higher Ed
This video introduces the section. This clip is from the chapter "Hacking AngularJS Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking AngularJS applications.
Instructional Video1:31
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Hacking Web Applications via PDFs, Images, and Links

Higher Ed
This video introduces the section. This clip is from the chapter "Hacking Web Applications through PDFs, Images, and Links" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on hacking web...
Instructional Video1:50
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction to the Section-Bypassing Content Security Policy in Modern Web Applications

Higher Ed
This video introduces the section. This clip is from the chapter "Bypassing Content Security Policy in Modern Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section focuses on bypassing Content...
Instructional Video2:04
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Introduction

Higher Ed
This clip is from the chapter "Introduction to the Course" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section introduces the course.
Instructional Video6:13
Curated Video

Reducing Food Waste with Historical and Modern Techniques

6th - Higher Ed
Explore practical ways to combat food waste as Mac Lesggy takes us on a journey from medieval preservation methods to today's refrigeration techniques. Learn how to better use your fridge to extend the life of meats, fruits, and...
Instructional Video9:33
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Threats

Higher Ed
You can't protect your networks unless you understand the threats they face. Using the concept of security shells makes it easier to categorize and mitigate threats. This clip is from the chapter "Securing Computers" of the series...
Instructional Video5:44
Curated Video

CISSP Crash Course - Cryptanalytic Attacks

Higher Ed
This video explains cryptographic attacks and malware attacks such as Ransomware. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture...
Instructional Video1:33
Curated Video

Hamlet 3.4 Dig Deeper: Prostitution in Elizabethan England

6th - Higher Ed
This video analyzes Hamlet's fierce criticism of Gertrude's marriage to Claudius in Act 3, likening her actions to prostitution—a common metaphor in Shakespeare's time for moral degradation. It contextualizes the symbolism within the...
Instructional Video10:50
PBS

The Original Urban Legend: Spring-heeled Jack

9th - Higher Ed
19th century London and the hunting ground of Spring-Heeled Jack. The fire-breathing, wall-leaping, claw-wielding devil attacked women in their homes and in the streets, terrorizing England for more than 50 years. Learn how Spring-Heeled...
Instructional Video6:24
PBS

El Chupacabras, a Modern Mystery

9th - Higher Ed
Did you know there are two different types of chupacabras? Or that these bloodsucking monsters only starting popping up 25 years ago? Sightings of el chupacabras, the “goatsucker,” began in Puerto Rico in 1994 for a very real reason—the...
Instructional Video4:26
Brainwaves Video Anthology

Kevin Kumashiro - Diversity, Equity and Inclusion

Higher Ed
In this video, Dr. Kevin Kumashiro, interim dean of the School of Education at Hofstra University, addresses concerns surrounding attacks on education and efforts to silence discussions on diversity, equity, and inclusion (DEI). He...