Instructional Video11:07
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Brute Force Attacks with BurpSuite

Higher Ed
In this video, you'll learn to perform brute force attacks with the BurpSuite tool. This clip is from the chapter "Web Application Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Instructional Video5:53
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Installing Extreme Cloud Administration Toolkit (xCAT) and Preventing Injection Attacks

Higher Ed
In this video, you'll learn how to install xCAT and how to prevent injection attacks. This clip is from the chapter "Web Application Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Instructional Video6:16
TLDR News

Havana Syndrome: New Sonic Weapon used Against American Diplomats in Europe - TLDR News

12th - Higher Ed
Texas' heartbeat law is a new controversial piece of legislation that cracks down hard on abortion access, making it virtually impossible. Biden's administration isn't exactly keen on that, and have blocked the bill thus far. So in this...
Instructional Video7:55
TLDR News

Truss Will Be the Next Prime Minister (probably)

12th - Higher Ed
Liz Truss now looks almost unstoppable in the Conservative Leadership Race, with recent polling showing her storming ahead once again. So in this video we outline why Truss is looking so strong, and why we think she's going to win.
Instructional Video8:13
TLDR News

DUP vs EU: How Brexit Broke Northern Ireland... Again - TLDR News

12th - Higher Ed
Yesterday Northern Ireland's First Minister Paul Givan resigned during the latest round of political chaos in Northern Ireland. This threw the countries politics into chaos once again as they struggle to deal with the knock-on effects of...
Instructional Video23:55
Globalive Media

Beyond Innovation: Episode 6

Higher Ed
An autonomous car finds its way around, video advertising that’s cheap and effective and an AI prices the cost of hacks. Plus, Michael and Anthony speak with a startup that wants to pay students for getting good grades. Hosted by venture...
Instructional Video2:27
Packt

Explain the privacy issues raised by artificial intelligence systems : Confidentiality, Availability, and Integrity Attacks

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. It’s important to know the main...
Instructional Video1:12
Next Animation Studio

China turns ‘Great Cannon’ on Hong Kong web forum

12th - Higher Ed
A Chinese cyberweapon dubbed the Great Cannon is launching DDoS attacks on a Hong Kong webform after years of silence, AT&T Cybersecurity reported on Wednesday.
Instructional Video2:05
ACDC Leadership

Micro Unit 6, Question 12- Tax Incidence (Excise Tax)

12th - Higher Ed
Join the hundreds of thousands of students that have used Mr. Clifford's videos and resources to ace your microeconomics course.
Instructional Video10:58
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Risk - Attackers and Types of Attacks - Part 2

Higher Ed
This is the second part of a two-part video that explains risk attackers and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Instructional Video12:00
JJ Medicine

Cluster Headaches | Risk Factors, Triggers, Signs & Symptoms, Diagnosis, Treatment

Higher Ed
Cluster Headaches | Risk Factors, Triggers, Signs & Symptoms, Diagnosis, Treatment Cluster Headaches (also known as Histamine Headaches) are a type of neurovascular headache disorder involving groups or “clusters” of headache episodes or...
Instructional Video1:23
Next Animation Studio

Hackers force shutdown of major U.S. pipeline

12th - Higher Ed
The hack on a 5,500-mile pipeline on the U.S. East Coast is being looked at as one of the most significant attacks on key national infrastructure in history.
Instructional Video3:17
Curated Video

CISSP®- Access Control Categories and Types

Higher Ed
This video explains the various access control categories and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Instructional Video9:01
Curated Video

Web Security: Common Vulnerabilities And Their Mitigation - Social Engineering

Higher Ed
Lot's Of Interesting Bits Of Information: Social Engineering This clip is from the chapter "Lot's Of Interesting Bits Of Information" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into...
Instructional Video5:57
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - IoT / Internet of Things

Higher Ed
In this easy-to-follow module, you will learn what we mean when we say IoT, and then you will be presented with an in-depth discussion of the major security issues involving these connected devices. You will also visually be guided,...
Instructional Video1:28
The March of Time

1942: DEBRIEFING REPRISAL: VS Air Force Airmen being asked, answering questions, how many seen, what kinds, how many 'kills', rockets, believe able to reload from inside.

12th - Higher Ed
MOT 1942: DEBRIEFING REPRISAL: VS Air Force Airmen being asked, answering questions, how many seen, what kinds, how many 'kills', rockets, believe able to reload from inside.
Instructional Video9:30
TLDR News

September 11th 2001: The 20th Anniversary of 9/11 - TLDR News

12th - Higher Ed
A list of charities committed to raising money and distributing support to the families of those killed or injured on September 11, 2001 and the first responders who were affected
Instructional Video5:02
Mr. Beat

The Lawrence Massacre (Story Time with Mr. Beat)

6th - 12th
Here's the story of the third time Lawrence, Kansas, was invaded- The Lawrence Massacre, also known as Quantrill's Raid.
Instructional Video3:04
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Attacks Against ML with Examples

Higher Ed
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools. It’s important to know how a typical attack on machine learning works and...
Instructional Video5:35
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Injection Attacks

Higher Ed
This video shows you how to perform injection attacks. This clip is from the chapter "Web Application Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn the...
Instructional Video7:01
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Exploiting Metasploitable2

Higher Ed
In this video, you'll learn to use Metasploitable2. This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn how to hack and...
Instructional Video13:56
Epic History TV

World War One: 1916

12th - Higher Ed
World War One: 1916' covers the great battles of Verdun and the Somme on the Western Front, as well as Russia's Brusilov Offensive on the Eastern Front. In the Middle East, British forces surrender at Kut, while the Arab Revolt begins in...
Instructional Video3:00
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Building an Image Classification Task and Its Peculiarities

Higher Ed
From the section: Testing Image Classification. In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one category of...
Instructional Video16:13
Global Health with Greg Martin

Conflict and Health - Health Care in Danger (and interview with the ICRC)

Higher Ed
This video talks about the dangers that both patients and professionals face when it comes to accessing and delivering healthcare in conflict zones. We are joined by Dr. Bruce Eshaya-Chauvin of the ICRC's "Health Care in Danger" project...