Instructional Video26:32
The Wall Street Journal

Technology's Darker Side

Higher Ed
How much are cyber and other technology related threats growing? How can companies get ahead of them and react when they strike? Do companies face stricter regulation on privacy and data use?
Instructional Video12:42
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Cryptosystems

Higher Ed
In this episode, Mike describes encrypting and decrypting data with the same key. He also covers how symmetric algorithms can either be block or streaming and use various types of ciphers depending on which one is used. This clip is from...
Instructional Video8:16
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Block Modes

Higher Ed
Symmetric block algorithms have limitations depending on which kind of cipher is used. This episode explores the different block modes. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601:...
Instructional Video18:26
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Information Security Governance: Policies, Procedures, Guidelines, and Frameworks

Higher Ed
This video focuses on policies, procedures, guidelines, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Instructional Video5:11
Blockchain Central

What Is Hashing in Blockchain?

Higher Ed
This week on Blockchain Central: we’re going to try and break down the hash and hash functions, as well as explain how it brings blockchain ecosystem to life.
Instructional Video12:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Asymmetric Cryptosystems

Higher Ed
In this episode, Mike describes encrypting and decrypting data with different keys and the magic that happens when key pairs are generated. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification...
Instructional Video7:20
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Methods

Higher Ed
This episode introduces various methods used to protect the critical keys in cryptography that keep communication secure. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total...
Instructional Video4:57
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- AWS Key Management Service (KMS) and CloudHSM

Higher Ed
In this video, we'll learn about AWS Key Management Service (KMS) and CloudHSM. This clip is from the chapter "Security" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".You will learn about security here. It...
Instructional Video13:52
IDG TECHtalk

Is end-to-end encryption for videoconferencing important?

Higher Ed
More people are relying on videoconferencing software to do their jobs and chat with friends and family. This uptick in use highlighted some security concerns like “Zoombombing” and the lack of end-to-end encryption in popular...
Instructional Video7:05
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Introduction to Cryptography

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Introduction to Cryptography. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture...
Instructional Video0:32
Next Animation Studio

Apple's iCloud to store user data in state-run servers in China

12th - Higher Ed
Apple has announced state-owned China Telecom will now store iCloud user data in China.
Instructional Video19:47
The Wall Street Journal

Quantum Leap

Higher Ed
The head of IBM's cloud and cognitive software unit discusses the promise of the cloud, AI and quantum computers to transform everything from the way scientists discover new drugs to the way companies optimize their supply chains.
Instructional Video6:51
IDG TECHtalk

How to safely erase data under Windows

Higher Ed
See how to save a data frame from R to Excel – with styling or multiple tabs. If you have a request for a future episode of Do More With R, leave a comment below.
Instructional Video1:14
Next Animation Studio

FBI tricked international cartels into using ‘encrypted’ phones

12th - Higher Ed
The huge surveillance operation started years ago, when a convicted drug smuggler offered the ‘back door’ of his special new gangster phone to the FBI.
Instructional Video8:33
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Attacks on our cryptography

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Attacks on our cryptography. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Instructional Video8:35
Curated Video

Bug Bounty Program Certification 11.4: Find Bugs in Coding Files and Break Algorithm

Higher Ed
This video will help you find algorithm and complete the task. • Analyze source code to find algorithm used • Find out encryption key • Complete the task to encrypt the string
Instructional Video8:03
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - The history of cryptography

Higher Ed
CISSP Domain 7: Security Operations: The history of cryptography. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
Instructional Video14:31
Curated Video

CISSP®- Information Security Governance: Policies, Procedures, Guidelines, and Frameworks

Higher Ed
This video focuses on policies, procedures, guidelines, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Instructional Video5:51
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - What Else Can You Do to Protect Yourself Part II

Higher Ed
In part II of this recap module, you will continue to be shown even more cool tips ‘n’ tricks on how to protect yourself when using computers, smartphones, and the Internet. And we will wrap up the training with information on how...
Instructional Video9:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Encryption Standards

Higher Ed
Securing Wi-Fi networks is crucial since physical access is not required to gain network access. In this video Wi-Fi security standards such as WEP, WPA, and WPS are discussed. This clip is from the chapter "Securing Wireless LANs" of...
Instructional Video12:11
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Discovery and Attacks

Higher Ed
Is your Wi-Fi network completely invisible if you disable SSID broadcasting? No! Periodic beacon frames are still sent wirelessly with the WLAN name field excluded. Freely available tools can be used to discover and crack WEP and WPA...
Instructional Video4:20
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - IPSec and PGP

Higher Ed
CISSP Domain 3: System Architecture and Engineering: IPSec and PGP. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
Instructional Video5:02
Packt

Kafka Security

Higher Ed
This video explains the concept of Kafka security. This clip is from the chapter "Kafka in the Enterprise for Admins" of the series "Apache Kafka Series - Learn Apache Kafka for Beginners".In this section, you will work on Kafka...
Instructional Video7:29
Curated Video

Bug Bounty Program Certification 13.4: Certification Exam Practice Questions – Part 3

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer