Instructional Video6:25
Brainwaves Video Anthology

Kevin Kumashiro - Anti-Asian Hate

Higher Ed
In this video, Dr. Kevin Kumashiro, interim dean of the School of Education at Hofstra University, addresses the issue of anti-Asian hate in the United States, which has intensified amidst recent events. He identifies three key factors...
Instructional Video4:47
Curated Video

Remembering 9/11: The Day That Changed History

Pre-K - Higher Ed
This video provides a detailed account of the September 11, 2001 terrorist attacks on the United States, commonly known as 9/11. It covers the events of that fateful day, as well as the heroic actions of passengers on the fourth hijacked...
Instructional Video5:05
Curated Video

Doolittle Raid: A Bold Strike to Boost American Morale

Pre-K - Higher Ed
This video provides a detailed account of the Doolittle Raid, a pivotal event during World War II where American bombers launched a daring attack on the Japanese Empire in April 1942. It describes the planning and execution of the...
Instructional Video5:04
Curated Video

The Vietnam War: A Conflict of Ideologies and Consequences

Pre-K - Higher Ed
This video provides a detailed overview of the Vietnam War, focusing on the events leading up to the conflict, key moments during the war, and its eventual conclusion. The video highlights significant military operations, such as the Tet...
Instructional Video18:58
Curated Video

Battle of Giurgiu: The Rise and Fall of Mihai the Brave

6th - Higher Ed
This video narrates the strategic maneuvers and battles led by Mihai Viteazul in his resistance against Ottoman occupation in Wallachia. Despite facing financial hardships and internal political challenges, Mihai orchestrates successful...
Instructional Video16:55
Curated Video

Battle of Pressburg: The Fall of the Bavarian Army and the Rise of Hungarian Power

6th - Higher Ed
This video describes the historical Battle of Pressburg in 900 AD, where the numerically superior Bavarian army, led by Lewitt Pole, suffered a devastating defeat at the hands of the Hungarian forces. Despite initial successes, the...
Instructional Video3:15
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - Introduction to Firewalls

Higher Ed
You will now learn the basics of firewalls. Firewalls use stateful filtering to keep track of all incoming and outgoing connections.
Instructional Video1:23
Curated Video

PHISH: Introduction and explanation of Phishing

Pre-K - Higher Ed
Explore the foundations of phishing in this essential introduction. Learn what phishing is, why it's relevant to anyone using email and SAAS apps, and set the stage for recognizing and preventing these cyber threats.
Instructional Video2:45
Australian Children's Television Foundation

Meeting a Humpback Dolphin

9th - 12th
Season 3, Humpback Whale part 3 Kamil brings Kayne to Tin Can Bay to meet humpback dolphins. They learn about their behaviour of the animals and the challenges they face, including shark attacks. The video highlights the rarity of these...
Instructional Video8:28
Australian Children's Television Foundation

How Dangerous Are Bull Sharks?

9th - 12th
Season 3, Bull Shark part 1 Learn a few facts about bull sharks and their environment. Kamil and Kayne meet a scientist who is using sonar technology to track and evaluate bull sharks. This area in the Gold Coast is a popular swimming...
Instructional Video1:00
One Minute History

021 Great White Shark - One Minute History

12th - Higher Ed
The great white shark is believed to have evolved from the mako and megalodon around 16 million years ago. As the largest predatory fish, the great white has over 300 teeth and sensory organs capable of detecting the heartbeat of their...
Instructional Video12:12
Jabzy

The Leopard Men: Africa's Cannibal Secret Society | African Religions, History of Africa, Vodun

12th - Higher Ed
The Leopard Men: Africa's Cannibal Secret Society | African Religions, History of Africa, Vodun
Instructional Video9:59
Hip Hughes History

The 9/11 Attacks Explained: US History Review (2/2)

6th - 12th
Part two of a twenty minute lecture highlighting the major issues related to 9/11. Geared for students of US History at a secondary education level.
Instructional Video10:43
Mythology & Fiction Explained

The Unidentified Monster that Terrorised 18th Century France - The Beast of Gevaudan

12th - Higher Ed
Dragons | The History & Origin Stories You Were Never Told
Instructional Video15:55
Religion for Breakfast

Who were the Sea Peoples? | The Bronze Age Collapse

12th - Higher Ed
Who were the Sea Peoples? | The Bronze Age Collapse
Instructional Video2:27
Curated Video

Web Applications Security Overview

Higher Ed
This video will highlight the security concerns when it comes to web applications
Instructional Video8:07
Curated Video

The Powerful Armitage Tool

Higher Ed
This video will demonstrate the powerful armitage tool, which is a GUI application for the metasploit framework
Instructional Video2:01
Curated Video

Master KALI Desktop Environment

Higher Ed
Before crafting attacks, get familiar with the desktop environment of Kali linux
Instructional Video4:40
Curated Video

Types of Attackers and Cybersecurity Professionals

Higher Ed
In the field of information security, there are three well-known categories of hackers: black hats, white hats, and grey hats. In an effort to set themselves apart from one another and distinguish the good hackers from the evil, hackers...
Instructional Video3:41
Curated Video

Post-Exploitation Terminologies

Higher Ed
This video will teach you the jardong used when it comes to post exploiting a target
Instructional Video2:30
Curated Video

Security Playbooks Benefits

Higher Ed
A cybersecurity playbook is a comprehensive, company-wide guideline that specifies exactly what steps to take in the event of data loss.
Instructional Video4:49
Curated Video

Execute a Phishing Attack

Higher Ed
In this video, you will learn how to plan and execute a phishing attack using the SET tool
Instructional Video2:15
Curated Video

DOS and DDOS Attacks

Higher Ed
By temporarily or permanently interrupting the services of a host connected to a network, a denial-of-service attack attempts to render a machine or network resource unavailable to its intended users.
Instructional Video3:35
Curated Video

Various Password Attacks

Higher Ed
This video will show you the various techniques used in hacking passowrds