Brainwaves Video Anthology
Kevin Kumashiro - Anti-Asian Hate
In this video, Dr. Kevin Kumashiro, interim dean of the School of Education at Hofstra University, addresses the issue of anti-Asian hate in the United States, which has intensified amidst recent events. He identifies three key factors...
Curated Video
Remembering 9/11: The Day That Changed History
This video provides a detailed account of the September 11, 2001 terrorist attacks on the United States, commonly known as 9/11. It covers the events of that fateful day, as well as the heroic actions of passengers on the fourth hijacked...
Curated Video
Doolittle Raid: A Bold Strike to Boost American Morale
This video provides a detailed account of the Doolittle Raid, a pivotal event during World War II where American bombers launched a daring attack on the Japanese Empire in April 1942. It describes the planning and execution of the...
Curated Video
The Vietnam War: A Conflict of Ideologies and Consequences
This video provides a detailed overview of the Vietnam War, focusing on the events leading up to the conflict, key moments during the war, and its eventual conclusion. The video highlights significant military operations, such as the Tet...
Curated Video
Battle of Giurgiu: The Rise and Fall of Mihai the Brave
This video narrates the strategic maneuvers and battles led by Mihai Viteazul in his resistance against Ottoman occupation in Wallachia. Despite facing financial hardships and internal political challenges, Mihai orchestrates successful...
Curated Video
Battle of Pressburg: The Fall of the Bavarian Army and the Rise of Hungarian Power
This video describes the historical Battle of Pressburg in 900 AD, where the numerically superior Bavarian army, led by Lewitt Pole, suffered a devastating defeat at the hands of the Hungarian forces. Despite initial successes, the...
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Introduction to Firewalls
You will now learn the basics of firewalls. Firewalls use stateful filtering to keep track of all incoming and outgoing connections.
Curated Video
PHISH: Introduction and explanation of Phishing
Explore the foundations of phishing in this essential introduction. Learn what phishing is, why it's relevant to anyone using email and SAAS apps, and set the stage for recognizing and preventing these cyber threats.
Australian Children's Television Foundation
Meeting a Humpback Dolphin
Season 3, Humpback Whale part 3 Kamil brings Kayne to Tin Can Bay to meet humpback dolphins. They learn about their behaviour of the animals and the challenges they face, including shark attacks. The video highlights the rarity of these...
Australian Children's Television Foundation
How Dangerous Are Bull Sharks?
Season 3, Bull Shark part 1 Learn a few facts about bull sharks and their environment. Kamil and Kayne meet a scientist who is using sonar technology to track and evaluate bull sharks. This area in the Gold Coast is a popular swimming...
One Minute History
021 Great White Shark - One Minute History
The great white shark is believed to have evolved from the mako and megalodon around 16 million years ago. As the largest predatory fish, the great white has over 300 teeth and sensory organs capable of detecting the heartbeat of their...
Jabzy
The Leopard Men: Africa's Cannibal Secret Society | African Religions, History of Africa, Vodun
The Leopard Men: Africa's Cannibal Secret Society | African Religions, History of Africa, Vodun
Hip Hughes History
The 9/11 Attacks Explained: US History Review (2/2)
Part two of a twenty minute lecture highlighting the major issues related to 9/11. Geared for students of US History at a secondary education level.
Mythology & Fiction Explained
The Unidentified Monster that Terrorised 18th Century France - The Beast of Gevaudan
Dragons | The History & Origin Stories You Were Never Told
Religion for Breakfast
Who were the Sea Peoples? | The Bronze Age Collapse
Who were the Sea Peoples? | The Bronze Age Collapse
Curated Video
Web Applications Security Overview
This video will highlight the security concerns when it comes to web applications
Curated Video
The Powerful Armitage Tool
This video will demonstrate the powerful armitage tool, which is a GUI application for the metasploit framework
Curated Video
Master KALI Desktop Environment
Before crafting attacks, get familiar with the desktop environment of Kali linux
Curated Video
Types of Attackers and Cybersecurity Professionals
In the field of information security, there are three well-known categories of hackers: black hats, white hats, and grey hats. In an effort to set themselves apart from one another and distinguish the good hackers from the evil, hackers...
Curated Video
Post-Exploitation Terminologies
This video will teach you the jardong used when it comes to post exploiting a target
Curated Video
Security Playbooks Benefits
A cybersecurity playbook is a comprehensive, company-wide guideline that specifies exactly what steps to take in the event of data loss.
Curated Video
Execute a Phishing Attack
In this video, you will learn how to plan and execute a phishing attack using the SET tool
Curated Video
DOS and DDOS Attacks
By temporarily or permanently interrupting the services of a host connected to a network, a denial-of-service attack attempts to render a machine or network resource unavailable to its intended users.
Curated Video
Various Password Attacks
This video will show you the various techniques used in hacking passowrds