Instructional Video0:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Defining a Public Server

Higher Ed
Public servers offer services to internet users. These servers should be hardened and placed on an isolated network such as a screened subnet or DMZ so that in the case of compromise, lateral movement by the attacker will not allow...
Instructional Video6:09
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - hping3 Forged Packet Lab

Higher Ed
The hping3 tool provides many services, including the creation of network packets based on command-line parameters. This episode demonstrates craft packets using the hping3 tool. This clip is from the chapter "Testing Infrastructure" of...
Instructional Video1:20
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 7 Ask Me Anything (AMA)

Higher Ed
Some wireless networking attacks involve deception. In this episode, Mike describes how there are variations of Evil Twin attacks including through DNS. This clip is from the chapter "Securing Wireless LANs" of the series "CompTIA...
Instructional Video1:54
Curated Video

SSL Complete Guide 2021: HTTP to HTTPS - Elliptic Curve Cryptography Overview

Higher Ed
In this video, we'll learn about elliptic curve cryptography. This clip is from the chapter "SSL, TLS, and HTTPS" of the series "SSL Complete Guide 2021: HTTP to HTTPS".In this section, we'll learn about SSL, TLS, and HTTPS.
Instructional Video8:25
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Hypervisors and Virtual Machines

Higher Ed
Hypervisors are servers configured to host virtual machine guests. This episode will discuss Type 1 and Type 2 hypervisors as well as hardening. This clip is from the chapter "Securing Public Servers" of the series "CompTIA Security+...
Instructional Video7:40
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Threat Analysis and Mitigating Actions

Higher Ed
Stepping through how attackers manage to compromise a system or exfiltrate data helps harden environments to prevent future incidents. This episode covers the Cyber Kill Chain, the Mitre ATT&CK Framework, the Diamond Model of Intrusion...
Instructional Video5:58
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Social Engineering

Higher Ed
Tricking people into doing something or divulging sensitive information – this is social engineering. This episode discusses a pretext, or believable story, that often goes along with this type of activity. This clip is from the chapter...
Instructional Video9:46
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Data Backup

Higher Ed
Backing data up provides availability in the event of data deletion, corruption, or encryption through ransomware. This episode discusses backup settings such as compression and encryption, as well as full, differential, and incremental...
Instructional Video4:47
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - International Agreements and Guidelines

Higher Ed
This video highlights the international agreements and guidelines. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Instructional Video13:00
Zach Star

The Mathematics of Cryptography

12th - Higher Ed
The Mathematics of Cryptography
Instructional Video9:53
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Physical Security

Higher Ed
This episode covers physical security controls such as door lock types and bollards, as well as encryption of data at rest. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video19:13
Zach Star

This completely changed the way I see numbers - Modular Arithmetic Visually Explained

12th - Higher Ed
This completely changed the way I see numbers - Modular Arithmetic Visually Explained
Instructional Video12:47
Zach Star

Computer Science Careers and Subfields

12th - Higher Ed
This video will cover computer science careers and as well as different areas within computer science you can dive into. Computer science is a very broad and diverse field that includes software development, cryptography, cyber security,...
News Clip1:57
Curated Video

Monaco Has 'a Lot to Prove' After Buying Crypto.com

9th - Higher Ed
The Swiss start-up paid $12 million to obtain the domain name, Cheddar has learned. Previous owner Matt Blaze, a cryptology researcher and professor at the University of Pennsylvania, originally registered the domain in 1993. Cheddar’s...
News Clip5:11
Bloomberg

How EY's Paul Brody Thinks Business Should Use Ethereum

Higher Ed
Paul Brody, EY global blockchain leader, talks about the importance of establishing rules for Crypto and how he says businesses can use Ethereum. He's on "Bloomberg Crypto." Follow Bloomberg for business news & analysis,...
News Clip5:02
Bloomberg

Nobel Laureate Romer on Cryptography, Innovation in Future of Money

Higher Ed
Dec.17 -- Paul Romer, Nobel laureate and NYU Stern Professor of Economics, examines the role of cryptocurrencies in the future of money. He speaks on "Bloomberg Daybreak: Americas."
News Clip4:27
Bloomberg

China Escalates Crypto Crackdown, Bitcoin Tumbles

Higher Ed
Sep.24 -- Bitcoin, Ether and other digital tokens tumbled as China intensified its push to rein in crypto speculation and mining. Eddie van der Walt reports on "Bloomberg Surveillance Early Edition."
News Clip2:48
Bloomberg

MaiCoin's CEO: Want Taiwan to Be Known as the Republic of Cryptography

Higher Ed
Jan.30 -- The half a billion dollar theft in Japan on the Coincheck Exchange could be a cautionary tale for Taiwan, which has been looking to possibly fill the cryptocurrency void in Asia following the crackdowns in China and South...
News Clip1:45
Bloomberg

SEC's Gensler Signals No Interest in Crypto Ban

Higher Ed
Oct.05 -- Securities and Exchange Commission Chair Gary Gensler has had multiple dust-ups with crypto firms but even he says the U.S. won’t follow China’s lead in banning digital tokens. He spoke before a virtual House hearing.
News Clip1:52
Bloomberg

Billionaire Novogratz Says Tesla Feels Like Bitcoin

Higher Ed
Jan.30 -- Billionaire Bitcoin maven Mike Novogratz, Galaxy Investment Partners chief executive officer, explains why he is shorting Tesla Inc. He speaks during an interview with Bloomberg's Erik Schatzker on "Bloomberg Markets."
News Clip5:37
Curated Video

Saul Rubinek on 'Warehouse 13' Holiday special, his and Judd Hirsch's eyebrows

Higher Ed
Syfy No re-use/re-sale without clearance 1. Clip, 'Warehouse 13' AP Television New York, 30 November 2010 2. SOUNDBITE (English) Saul Rubinek, Actor: "The Christmas episode was really a warmly written, very funny episode, it's got, you...
News Clip2:31
Bloomberg

Novogratz Sees Stocks Going 'Parabolic,' Maybe 24% or Higher This Year

Higher Ed
Jan.30 -- Billionaire Bitcoin maven Mike Novogratz, Galaxy Investment Partners chief executive officer, discusses his bullish outlook for global stocks. He speaks during an interview with Bloomberg's Erik Schatzker on "Bloomberg Markets."
News Clip4:57
Bloomberg

The Privacy Concerns Surrounding Google's Chrome Update

Higher Ed
Sep.24 -- Matthew Green, Johns Hopkins University professor, explains why he is concerned about Google's recent update to its Chrome internet browser. He speaks with Bloomberg's Emily Chang and Brad Stone on "Bloomberg Technology."
News Clip8:02
Bloomberg

Billionaire Mike Novogratz Talks Tesla, Stocks and Bitcoin

Higher Ed
Jan.30 -- Billionaire Bitcoin maven Mike Novogratz, Galaxy Investment Partners chief executive officer, discusses his Tesla Inc. short, the outlook for global stocks and cryptocurrencies with Bloomberg's Erik Schatzker on "Bloomberg...