Instructional Video3:48
Curated Video

Web API Development with Flask (Video 21)

Higher Ed
Whether working in the enterprise, building for web or mobile, you will need to build (if you haven't already) RESTful APIs to serve data between different client applications and endpoints. This course delivers the fundamental knowledge...
Instructional Video38:25
The Wall Street Journal

The Hot Seat

Higher Ed
Cybersecurity incidents demand quick thinking and decisive responses. In this exercise scenario, a fictional company is faced with some tough choices when their security is compromised.
Instructional Video5:08
IDG TECHtalk

Minimum vs. best Windows network security practices

Higher Ed
Before you worry about implementing the “best” security practices, make sure you’re doing these minimum practices.
Instructional Video3:48
IDG TECHtalk

How to better manage your domain passwords

Higher Ed
Follow this advice to help prevent domain password compromise or lateral movement should your password be compromised.
Instructional Video5:47
IDG TECHtalk

How to set up multi-factor authentication in Microsoft Office 365

Higher Ed
Follow these steps to enable multi-factor authentication in Office 365 for more secure log-ins.
Instructional Video8:33
Curated Video

Bug Bounty Program Certification 6.5: Gather Machine User Login Credentials

Higher Ed
In this video, you will gather information about Windows and Kali Linux password files. • Learn about Kali Linux shadow file • Use john the Ripper to crack password file • Gather information about Windows SAM file
Instructional Video4:56
Curated Video

Learning Python Web Penetration Testing (Video 18)

Higher Ed
With the huge growth in the number of web applications in the recent times, there has also been an upsurge in the need to make these applications secure. Web penetration testing is the use of tools and code to attack a website or web app...
Instructional Video7:19
IDG TECHtalk

7 dumb ways to be a ransomware victim, and how to avoid the embarrassment

Higher Ed
Ransomware perpetrators count on Windows security admins to make these common mistakes. Here’s how to find and fix them.
Instructional Video1:44
Seven Dimensions

Social Media Safety: Protecting Your Personal Information

Higher Ed
In this video, the speaker highlights the dangers of oversharing personal information on social media and the potential risks it poses, particularly for vulnerable individuals.
Instructional Video4:53
IDG TECHtalk

How an attacker can target phishing attacks

Higher Ed
There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you can...
Instructional Video6:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - WPA2 Cracking Lab

Higher Ed
Wi-Fi Protected Access (WPA) protects Wi-Fi network communications. This episode demonstrates how there are ways to crack a WPA2 using offline attack methods. This clip is from the chapter "Securing Wireless LANs" of the series "CompTIA...
Instructional Video6:33
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Hashing

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Hashing. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering Video...
Instructional Video3:12
Curated Video

AZ-204 Developing for Microsoft Azure Exam Prep - Introduction to Azure Active Directory (AD)

Higher Ed
This video provides an introduction to Azure AD. This clip is from the chapter "AZ-204 Azure Authentication" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section focuses on AZ-204 Azure authentication.
Instructional Video3:39
IDG TECHtalk

How to better control access to your Windows network

Higher Ed
Take stock of how people and devices access your network and block potential avenues of attack.
Instructional Video9:46
Curated Video

Django3- Error Handling

Higher Ed
In this video, we will look at error handling. This clip is from the chapter "Site 3 - Todo Woo" of the series "Django 3 - Full Stack Websites with Python Web Development".In this section, we will be working on our project site 3 - Todo...
Instructional Video3:54
IDG TECHtalk

Eliminate compromised and weak passwords

Higher Ed
A single compromised password allowed attackers access to Colonial Pipeline’s network. Chaos ensued. This advice will help you avoid that fate.
Instructional Video3:06
Curated Video

Web Security: Common Vulnerabilities And Their Mitigation - Broken authentication and session management

Higher Ed
Credentials Management: Broken authentication and session management This clip is from the chapter "Credentials Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, very common source of...
Instructional Video4:38
Curated Video

Learning Python Web Penetration Testing (Video 19)

Higher Ed
With the huge growth in the number of web applications in the recent times, there has also been an upsurge in the need to make these applications secure. Web penetration testing is the use of tools and code to attack a website or web app...
Instructional Video6:33
IDG TECHtalk

Building a toy social network with Python, Part 3: Logins and user tokens

Higher Ed
In Part 3 of this ongoing series, we create the components needed to allow users to log in and be identified by the system, and show how to save passwords in the system by one-way hashing them, not storing them as insecure plaintext.
Instructional Video6:16
IDG TECHtalk

How to disable basic or legacy authentication to set up MFA in Office 365

Higher Ed
Microsoft recommends setting up multi-factor authentication in Windows 10 for better security, but you have to disable basic or legacy authentication first.
Instructional Video5:00
Packt

CompTIA Network+ Certification N10-007: The Total Course - Authenticating, Authorizing, and Accounting (AAA)

Higher Ed
This video explains how RADIUS and TACACS+ protocol is used to provide network AAA. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA Network+ Certification N10-007:...
Instructional Video4:21
Packt

CompTIA Network+ Certification N10-007: The Total Course - Access Control "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)"

Higher Ed
This video dives into access control lists, describing the three levels of control commonly used in computing. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA...
Instructional Video10:27
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - SQL Basics

Higher Ed
In this video, you'll learn the basics of SQL needed for SQL injection. This clip is from the chapter "Web Application Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
Instructional Video11:31
Curated Video

Mastering MEAN Web Development Expert Full Stack JavaScript (Video 21)

Higher Ed
Web development is moving fast and to keep up to mark, you need a technology stack that is . The MEAN stack includes MongoDb, Express, Angular, and Node.js. These tools provide a rich environment to build advanced web applications in a...