Instructional Video9:13
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Encrypting Mass Storage

Higher Ed
Securing mass storage is a critical aspect of system security. Make sure you know the many ways a system's mass storage can be encrypted. This clip is from the chapter "Implementing Mass Storage" of the series "CompTIA A+ Certification...
Instructional Video10:26
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Wireless Encryption

Higher Ed
Everything on an unencrypted (open) wireless network is easily intercepted by anyone with the right capture tools. Over the years, 80 2.11 has developed three different encryption standards, each with its own idiosyncrasies, strengths,...
Instructional Video1:00
One Minute History

198 - Code Talkers - One Minute History

12th - Higher Ed
In the heat of battle, knowledge is power. Messages must be sent and received quickly, accurately and if you plan on winning, they need to be encoded. October 1918 (World War I) France - Native American men from Oklahoma organize a...
Instructional Video1:00
One Minute History

199 - Navajo Code Talkers - One Minute History

12th - Higher Ed
On the morning of May 4, 1942, twenty nine Navajo men boarded a bus at Ft. Defiance, Arizona bound for Marine Corps training camp. These men were tasked with creating a code based on the complex, unwritten Navajo language. The Navajo...
Instructional Video9:20
Curated Video

Learn Azure Serverless Functions in a Weekend - Deploy Azure Service Bus

Higher Ed
This video helps deploy Azure Service Bus. This clip is from the chapter "Azure Service Bus" of the series "Learn Azure Serverless Functions in a Weekend".This section focuses on Azure Service Bus.
Instructional Video9:13
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Encrypting Mass Storage

Higher Ed
Securing mass storage is a critical aspect of system security. Make sure you know the many ways a system's mass storage can be encrypted. This clip is from the chapter "Book Chapter 9 - Implementing Mass Storage" of the series "CompTIA...
Instructional Video4:04
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - It's a Huge Mesh

Higher Ed
Mesh networking is here and gaining in popularity daily. But what does mesh networking do for your 80 2.11 network? Where do you use it and how is it deployed? This clip is from the chapter "Book Chapter 20 - Wireless Networking" of the...
Instructional Video13:06
Curated Video

CISSP Crash Course - Secure Communication

Higher Ed
This video explains how to implement secure communication. This clip is from the chapter "Communication and Network Security" of the series "CISSP Crash Course".This section covers domain 4, which focuses on communication and network...
Instructional Video5:44
Curated Video

CISSP Crash Course - Cryptanalytic Attacks

Higher Ed
This video explains cryptographic attacks and malware attacks such as Ransomware. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture...
Instructional Video11:01
Curated Video

CISSP Crash Course - Cryptographic Solutions

Higher Ed
This video explains cryptographic systems—asymmetric encryption and RSA algorithm. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Instructional Video8:46
Curated Video

CISSP Crash Course - Asset Handling

Higher Ed
This video explains information, asset handling, and how to deal with data. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and...
Instructional Video11:59
Curated Video

CISSP Crash Course - Security Governance

Higher Ed
This video explains security policy and how to apply security governance. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Instructional Video8:39
Curated Video

CISSP Crash Course - Information Assets

Higher Ed
This video explains information assets and data classification. This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and ownership.
Instructional Video4:48
Curated Video

HashiCorp Certified - Vault Associate Course - Vault Initialization

Higher Ed
This video explains the process of initializing HashiCorp Vault, which is a one-time process that sets up the initial configuration and encryption key for Vault. You will need to initialize Vault when it is first provisioned, so this...
Instructional Video15:59
Curated Video

HashiCorp Certified - Vault Associate Course - Benefits and Use Cases of Vault

Higher Ed
This video outlines the benefits and various use cases of HashiCorp Vault. Learn all the cool things that Vault has to offer organizations that decide to use it to protect their secrets and other data. This clip is from the chapter...
Instructional Video3:14
Curated Video

Getting Started with HashiCorp Nomad - Demo - Secure Gossip Encryption

Higher Ed
We will continue securing our Nomad infrastructure in this demonstration by enabling gossip encryption on our servers. We will modify our configuration file, define the server configuration, and add the encrypt parameter. This clip is...
Instructional Video14:49
Curated Video

HashiCorp Certified - Vault Associate Course - Lab—Transit Secrets Engine

Higher Ed
This is a lab video on Transit Secrets Engine. This clip is from the chapter "Compare and Configure Secrets Engines" of the series "HashiCorp Certified - Vault Associate Course".null
Instructional Video20:21
Curated Video

HashiCorp Certified - Vault Associate Course - Using the Transit Secrets Engine

Higher Ed
This video will cover how to use the Transit Secrets Engine in Vault to securely encrypt and decrypt data at rest. This clip is from the chapter "Compare and Configure Secrets Engines" of the series "HashiCorp Certified - Vault Associate...
Instructional Video22:08
Curated Video

HashiCorp Certified - Vault Associate Course - Encrypting Data with the Transit Secrets Engine

Higher Ed
In this video, we will explore the Transit Secrets Engine in Vault, which provides a way to encrypt data in transit. We will also talk about its features and how to use it. This clip is from the chapter "Compare and Configure Secrets...
Instructional Video20:07
Curated Video

Oracle Database Administration from Zero to Hero - Using Oracle Data Pump (Part 3 of 3)

Higher Ed
In this video, we will continue our exploration of Oracle Data Pump. You will discover the essential parameters for importing data using Data Pump and learn how to implement parallelism to enhance the performance of your Data Pump...
Instructional Video3:21
Curated Video

How to Make Simple a Secret Decoder

Pre-K - 8th
People have been using codes throughout history to keep their messages private and my two little spies needed a way to sent their secret messages to each other too. So I came up with this simple paper plate decoder for them to have fun.
Instructional Video1:59
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - Secrets Manager Use Cases

Higher Ed
This video demonstrates Secrets Manager use cases. This clip is from the chapter "Secrets Manager - Rotate, Manage, and Retrieve Secrets Through Their Lifecycle" of the series "AWS Tutorial: AWS Solutions Architect and SysOps...
Instructional Video1:30
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - S3 Encryption

Higher Ed
This video talks about S3 encryption. This clip is from the chapter "Key Management Service - Generate and Manage AWS Encryption Keys" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section focuses on...
Instructional Video2:03
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - EBS Volume Encryption

Higher Ed
This video explains EBS volume encryption. This clip is from the chapter "Key Management Service - Generate and Manage AWS Encryption Keys" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section...