Instructional Video7:48
Curated Video

AWS Certified Data Analytics Specialty 2021 - Hands-On! - S3 Encryption (Reminder)

Higher Ed
This video explains the concept of encryption in Amazon Web Services (AWS). This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty 2021 "Hands-On!".In this section, you will learn about...
Instructional Video1:15
Curated Video

AWS Certified Data Analytics Specialty 2021 - Hands-On! - Kinesis Security

Higher Ed
This video explains the concept of security in Amazon Kinesis data streams. This clip is from the chapter "Domain 1: Collection" of the series "AWS Certified Data Analytics Specialty 2021 "Hands-On!".In this section, you will learn to...
Instructional Video4:00
Curated Video

AWS Certified Data Analytics Specialty 2021 - Hands-On! - Encryption 101

Higher Ed
This video explains the concept of encryption in Amazon Web Services (AWS). This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty 2021 "Hands-On!".In this section, you will learn about...
Instructional Video6:04
Curated Video

AWS Certified Data Analytics Specialty 2021 - Hands-On! - Amazon Web Services Key Management Service (AWS KMS) Overview

Higher Ed
This video provides an overview of AWS KMS. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty 2021 "Hands-On!".In this section, you will learn about Amazon Web Services (AWS)...
Instructional Video8:37
Curated Video

AWS Certified Data Analytics Specialty 2021 - Hands-On! - Amazon Web Services AWS Security Features Deep Dive - Part 3

Higher Ed
This video is the third part of the three-part video that explains the AWS security features in detail. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty 2021 "Hands-On!".In this...
Instructional Video5:09
Curated Video

AWS Certified Data Analytics Specialty 2021 - Hands-On! - Amazon Web Services AWS Security Features Deep Dive - Part 2

Higher Ed
This video is the second part of the three-part video that explains the AWS security features in detail. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty 2021 "Hands-On!".In this...
Instructional Video5:49
Curated Video

AWS Certified Data Analytics Specialty 2021 - Hands-On! - Amazon Web Services AWS Security Features Deep Dive - Part 1

Higher Ed
This video is the first part of the three-part video that explains the AWS security features in detail. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty 2021 "Hands-On!".In this...
Instructional Video2:25
Curated Video

AWS Certified Data Analytics Specialty 2021 - Hands-On! - Amazon Web Services (AWS) CloudHSM Overview

Higher Ed
This video provides an overview of AWS CloudHSM. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty 2021 "Hands-On!".In this section, you will learn about Amazon Web Services (AWS)...
Instructional Video4:40
Archaia Historia

How did Ancient Greeks send Secret Messages?

12th - Higher Ed
In the art of espionage, subterfuge and military matters the necessity of secrecy is paramount. In the modern day most of our messages are encrypted and sent discreetly and instantly across the world. Of course, the ancients didn’t have...
Instructional Video10:04
Executive Finance

Introduction to Blockchain Technology and Its Characteristics

Higher Ed
This lesson provides an overview of the blockchain technology, its characteristics, and how it differs from cryptocurrencies like Bitcoin. It also explores the potential use cases of blockchain technology in creating open marketplaces...
Instructional Video4:25
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Ransomware

Higher Ed
You will be learning about all of the recent ransomware attacks you may have heard about in the news, and why they are so effective in forcing their victims to hand money over to the hackers. You will see various examples of what they...
Instructional Video3:56
The Economist

How will quantum computing change the world?

12th - Higher Ed
The potential for quantum computing to crack other countries’ encrypted networks has captured the attention of national governments. Which of the world's fundamental challenges could be solved by quantum computing?
Stock Footage0:15
Getty Images

Fingerprint Identification

Pre-K - Higher Ed
Fingerprint Identification
Stock Footage0:10
Getty Images

4K Fingerprint Identification

Pre-K - Higher Ed
4K Fingerprint Identification
Stock Footage0:20
Getty Images

Fingerprint scan

Pre-K - Higher Ed
Fingerprint scan
Stock Footage0:14
Getty Images

Social media and telecommunications

Pre-K - Higher Ed
Social media, communication and technology concept: user sending a text message online to another user using social networks
Stock Footage0:30
Getty Images

Eye Matrix Cube

Pre-K - Higher Ed
An animation with a rotating matrix cube and an Eye symbol
Stock Footage0:30
Getty Images

Padlock Matrix Cube

Pre-K - Higher Ed
An animation with a rotating matrix cube and a Padlock symbol.
Stock Footage0:19
Getty Images

Raining Random Data Codes

Pre-K - Higher Ed
Raining Random Data Codes
Stock Footage0:29
Getty Images

Computer hacking concept with a businesswoman and a pirate stealing data.

Pre-K - Higher Ed
Computer hacking concept with a businesswoman and a pirate stealing data.
Stock Footage0:26
Getty Images

Internet pirate using the computer.

Pre-K - Higher Ed
Internet pirate using the computer.
Stock Footage0:29
Getty Images

HD: Combination Lock on Safe

Pre-K - Higher Ed
HD: Combination Lock on Safe
Stock Footage0:29
Getty Images

Cryptography Terms

Pre-K - Higher Ed
Cryptography Terms
Stock Footage0:30
Getty Images

Cryptography Terms

Pre-K - Higher Ed
Cryptography Terms