Instructional Video9:26
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting with Veracrypt

Higher Ed
After learning about encryption, we will look at encrypting a computer using Veracrypt software.
Instructional Video4:27
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Disk Encryption

Higher Ed
Here, you will learn about encryption and decryption, the two technologies applied to a hard drive.
Instructional Video6:45
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - VPN Myths Debunked

Higher Ed
In this video, the author debunks the significant myths about VPN use and several reasons for using a paid VPN.
Instructional Video6:30
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - HTTP, HTTPS, SSL, and TLS

Higher Ed
Here, you will learn about the hypertext transfer protocol, hypertext transfer protocol secure, secure sockets layer, and transport layer security, and how each one works.
Instructional Video9:10
Curated Video

Practical Cyber Hacking Skills for Beginners - Hashing

Higher Ed
In this video, we will look at hashing, which is the conversion of key/string/variable into a hash using an algorithm used in malware and antimalware products.
Instructional Video3:15
Curated Video

Binary: The Alien Language

6th - 12th
In the 1970s, launched aboard a space probe was what is considered one of the most important scientific diagrams ever created. If found by extraterrestrial life, the plaque explains details about the human race and where we are in the...
Instructional Video3:14
Curated Video

The Prime Number Code

6th - 12th
Why prime numbers are the building blocks of encryption, used for information security, in cash machines and to hide your identity online. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Instructional Video3:07
Curated Video

Binary: What Is Binary?

6th - 12th
Learn how the binary base system works, and how to symbolise any number using just two digits. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum. Twig’s context films show abstract concepts in...
Instructional Video3:28
Curated Video

Algorithms: Turing

6th - 12th
Why Turing devoted his life to the quest of what we now know as artificial intelligence, and invented the first algorithms that now form the basis of all programmed computers. Maths - History Of Maths A Twig Math Film. Reinforce and...
Instructional Video2:45
Curated Video

Binary: The Computer Language

6th - 12th
We use binary every day – although we might not know it. Find out how this number system is used in computers to store large amounts of data. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Instructional Video12:30
Curated Video

Fundamentals of Secure Software - Conclusion

Higher Ed
This video reviews a few of the important concepts learned throughout the course.
Instructional Video10:57
Curated Video

Fundamentals of Secure Software - Encryption Use Cases

Higher Ed
This video focuses on various use cases for encryption.
Instructional Video15:01
Curated Video

Fundamentals of Secure Software - Risk Rating Demo

Higher Ed
This video helps in performing a risk rating.
Instructional Video5:34
Curated Video

Fundamentals of Secure Software - SCA (Software Composition Analysis)

Higher Ed
This video talks about the SCA (Software Composition Analysis).
Instructional Video2:12
Curated Video

Fundamentals of Secure Software - Penetration Testing

Higher Ed
This video explains penetration testing.
Instructional Video3:31
Curated Video

Fundamentals of Secure Software - WAF (Web Application Firewall)

Higher Ed
This video Introduces you to WAF (Web Application Firewall).
Instructional Video2:04
Curated Video

Fundamentals of Secure Software - RASP (Runtime Application Self-Protection)

Higher Ed
This video talks about RASP (Runtime Application Self-Protection).
Instructional Video1:52
Curated Video

Fundamentals of Secure Software - IAST (Interactive Application Security Testing)

Higher Ed
This video demonstrates IAST (Interactive Application Security Testing).
Instructional Video1:57
Curated Video

Fundamentals of Secure Software - DAST (Dynamic Application Security Testing)

Higher Ed
This video demonstrates DAST (Dynamic Application Security Testing).
Instructional Video5:33
Curated Video

Fundamentals of Secure Software - SAST (Static Application Security Testing)

Higher Ed
This video provides an introduction to SAST (Static Application Security Testing).
Instructional Video3:03
Curated Video

Fundamentals of Secure Software - Use, Abuse, and Misuse cases

Higher Ed
This video focuses on the use, abuse, and misuse cases.
Instructional Video5:34
Curated Video

Fundamentals of Secure Software - DevSecOps

Higher Ed
This video explains the concept of DevSecOps.
Instructional Video4:01
Curated Video

Fundamentals of Secure Software - DevOps

Higher Ed
This talks about DevOps in detail.
Instructional Video2:50
Curated Video

Fundamentals of Secure Software - PCI DSS (Payment Card Industry Data Security Standard)

Higher Ed
This video explains the PCI DSS (Payment Card Industry Data Security Standard) and its purpose.