Instructional Video8:48
SciShow

How Encryption Keeps Your Data Safe

12th - Higher Ed
Keeping our data safe and secure is necessary in today's world, but a lot of the encryption we depend on has been in development for thousands of years!
Instructional Video6:01
SciShow

How Meltdown and Spectre Make Your Computer Vulnerable

12th - Higher Ed
Another year, another security breach that could expose all of your information. Installing updates might be a good New Year's resolution.
Instructional Video5:27
SciShow

How Worried Should You Be About Smart Home Security?

12th - Higher Ed
As we hurtle through the development of the digital world, it's important to keep in mind the security implications of the technology we use.
Instructional Video11:20
Crash Course

Hackers & Cyber Attacks: Crash Course Computer Science

12th - Higher Ed
Today we're going to talk about hackers and their strategies for breaking into computer systems. Now, not all hackers are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White...
Instructional Video11:57
Crash Course

Cybersecurity: Crash Course Computer Science

12th - Higher Ed
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use...
Instructional Video4:35
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - The Colonial Pipeline Attack

Higher Ed
New ReviewIn this lesson, we will look at the colonial pipeline attack that happened on April 29, 2021, when the gas line was shut down, causing a gas shortage in the US.
Instructional Video2:02
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - The Weakest Link and the Disgruntled Employee

Higher Ed
New ReviewIn this lesson, we will look at the factors that can cause a cyber-attack, including the weakest link and the disgruntled employee in any organization, that could harm cyber security.
Instructional Video7:58
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - 2-Factor Authentication Part I

Higher Ed
New ReviewIn this two-part eye-opening video module, you will learn all about wonderful two-factor authentication: an excellent solution for preventing hackers hijacking your account! The term '2FA' will be explained in simple terms, and then you...
Instructional Video2:56
Curated Video

SkillSprints: Creating Secure Passwords

Pre-K - Higher Ed
In this video you will learn to create secure passwords that are difficult to guess or hack.
Instructional Video3:35
Curated Video

SkillSprints: Virus Prevention

Pre-K - Higher Ed
Viruses are not just annoying-- They're annoying. Learn to prevent and effectively deal with computer viruses in this video.
Instructional Video2:14
Curated Video

Web Shoppers Beware: The SCOB Virus and the Threat to Online Security

Pre-K - Higher Ed
This video discusses the SCOB virus, a recent web virus that has infected numerous computers and servers. The virus spreads through banner ads, pictures, and logos on trusted websites like eBay and Yahoo. Unlike traditional viruses, SCOB...
Instructional Video1:44
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Meet Kevin Mitnick

Higher Ed
This video is an overview of a famous hacker, Kevin Mitnick, that highlights his hacking techniques.
Instructional Video6:30
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - HTTP, HTTPS, SSL, and TLS

Higher Ed
Here, you will learn about the hypertext transfer protocol, hypertext transfer protocol secure, secure sockets layer, and transport layer security, and how each one works.
Instructional Video3:48
Curated Video

Practical Cyber Hacking Skills for Beginners - Introduction to Hashcat

Higher Ed
This video introduces a tool that is an advanced password recovery tool and is available on various platforms.
Instructional Video3:45
Curated Video

Microsoft Project 2021 From Beginners to Advanced - Project Security

Higher Ed
Here, we will learn about project security and how to protect projects from unauthorized access or changes. Learn to set passwords, restrict user permissions, and encrypt project data. This clip is from the chapter "Saving Projects and...
Instructional Video3:15
Curated Video

Fundamentals of Secure Software - Password Demo

Higher Ed
This is a demo video on password management.
Instructional Video5:48
Curated Video

Fundamentals of Secure Software - Hashing Overview

Higher Ed
This video provides an introduction and overview of hashing.
Instructional Video5:10
Curated Video

Fundamentals of Secure Software - OpenID and OpenID Connect

Higher Ed
This video talks about OpenID and why it is used.
Instructional Video3:56
Curated Video

Fundamentals of Secure Software - Identification and Authentication Failures

Higher Ed
This video explains identification and authentication failures.
Instructional Video7:21
Curated Video

Fundamentals of Secure Software - Cryptographic Failures

Higher Ed
This video explains what sensitive data exposure is and talks about cryptographic failures.
Instructional Video6:33
Curated Video

A Detailed Guide to the OWASP Top 10 - API2:2023 Broken Authentication

Higher Ed
In this video, examine the critical security risk of Broken Authentication within APIs and discuss methods for securing authentication mechanisms.
Instructional Video2:48
Curated Video

A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures Prevention

Higher Ed
This video explains how to prevent identification and authentication failures.
Instructional Video10:04
Curated Video

A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures

Higher Ed
This video explains OWASP 07 - identification and authentication failures.
Instructional Video7:18
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - You Have Been HACKED - Now What?

Higher Ed
In this video, you will look at steps to take after you have been hacked and how exactly you would respond. This clip is from the chapter "Conclusion" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...