The Wall Street Journal
Technology's Darker Side
How much are cyber and other technology related threats growing? How can companies get ahead of them and react when they strike? Do companies face stricter regulation on privacy and data use?
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Cryptosystems
In this episode, Mike describes encrypting and decrypting data with the same key. He also covers how symmetric algorithms can either be block or streaming and use various types of ciphers depending on which one is used. This clip is from...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Block Modes
Symmetric block algorithms have limitations depending on which kind of cipher is used. This episode explores the different block modes. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601:...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Information Security Governance: Policies, Procedures, Guidelines, and Frameworks
This video focuses on policies, procedures, guidelines, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Blockchain Central
What Is Hashing in Blockchain?
This week on Blockchain Central: we’re going to try and break down the hash and hash functions, as well as explain how it brings blockchain ecosystem to life.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Asymmetric Cryptosystems
In this episode, Mike describes encrypting and decrypting data with different keys and the magic that happens when key pairs are generated. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Methods
This episode introduces various methods used to protect the critical keys in cryptography that keep communication secure. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total...
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- AWS Key Management Service (KMS) and CloudHSM
In this video, we'll learn about AWS Key Management Service (KMS) and CloudHSM. This clip is from the chapter "Security" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".You will learn about security here. It...
IDG TECHtalk
Is end-to-end encryption for videoconferencing important?
More people are relying on videoconferencing software to do their jobs and chat with friends and family. This uptick in use highlighted some security concerns like “Zoombombing” and the lack of end-to-end encryption in popular...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Introduction to Cryptography
CISSP Domain 3: System Architecture and Engineering: Introduction to Cryptography. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture...
Next Animation Studio
Apple's iCloud to store user data in state-run servers in China
Apple has announced state-owned China Telecom will now store iCloud user data in China.
The Wall Street Journal
Quantum Leap
The head of IBM's cloud and cognitive software unit discusses the promise of the cloud, AI and quantum computers to transform everything from the way scientists discover new drugs to the way companies optimize their supply chains.
IDG TECHtalk
How to safely erase data under Windows
See how to save a data frame from R to Excel – with styling or multiple tabs. If you have a request for a future episode of Do More With R, leave a comment below.
Next Animation Studio
FBI tricked international cartels into using ‘encrypted’ phones
The huge surveillance operation started years ago, when a convicted drug smuggler offered the ‘back door’ of his special new gangster phone to the FBI.
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Attacks on our cryptography
CISSP Domain 3: System Architecture and Engineering: Attacks on our cryptography. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Curated Video
Bug Bounty Program Certification 11.4: Find Bugs in Coding Files and Break Algorithm
This video will help you find algorithm and complete the task. • Analyze source code to find algorithm used • Find out encryption key • Complete the task to encrypt the string
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - The history of cryptography
CISSP Domain 7: Security Operations: The history of cryptography. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
Curated Video
CISSP®- Information Security Governance: Policies, Procedures, Guidelines, and Frameworks
This video focuses on policies, procedures, guidelines, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - What Else Can You Do to Protect Yourself Part II
In part II of this recap module, you will continue to be shown even more cool tips ‘n’ tricks on how to protect yourself when using computers, smartphones, and the Internet. And we will wrap up the training with information on how...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Encryption Standards
Securing Wi-Fi networks is crucial since physical access is not required to gain network access. In this video Wi-Fi security standards such as WEP, WPA, and WPS are discussed. This clip is from the chapter "Securing Wireless LANs" of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Discovery and Attacks
Is your Wi-Fi network completely invisible if you disable SSID broadcasting? No! Periodic beacon frames are still sent wirelessly with the WLAN name field excluded. Freely available tools can be used to discover and crack WEP and WPA...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - IPSec and PGP
CISSP Domain 3: System Architecture and Engineering: IPSec and PGP. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
Packt
Kafka Security
This video explains the concept of Kafka security. This clip is from the chapter "Kafka in the Enterprise for Admins" of the series "Apache Kafka Series - Learn Apache Kafka for Beginners".In this section, you will work on Kafka...
Curated Video
Bug Bounty Program Certification 13.4: Certification Exam Practice Questions – Part 3
Exam questions. • Practice questions • Solutions • Explanation of answer