Instructional Video8:48
SciShow

How Encryption Keeps Your Data Safe

12th - Higher Ed
Keeping our data safe and secure is necessary in today's world, but a lot of the encryption we depend on has been in development for thousands of years!
Instructional Video6:01
SciShow

How Meltdown and Spectre Make Your Computer Vulnerable

12th - Higher Ed
Another year, another security breach that could expose all of your information. Installing updates might be a good New Year's resolution.
Instructional Video5:27
SciShow

How Worried Should You Be About Smart Home Security?

12th - Higher Ed
As we hurtle through the development of the digital world, it's important to keep in mind the security implications of the technology we use.
Instructional Video11:20
Crash Course

Hackers & Cyber Attacks: Crash Course Computer Science

12th - Higher Ed
Today we're going to talk about hackers and their strategies for breaking into computer systems. Now, not all hackers are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White...
Instructional Video11:57
Crash Course

Cybersecurity: Crash Course Computer Science

12th - Higher Ed
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use...
Instructional Video2:14
Curated Video

Web Shoppers Beware: The SCOB Virus and the Threat to Online Security

Pre-K - Higher Ed
This video discusses the SCOB virus, a recent web virus that has infected numerous computers and servers. The virus spreads through banner ads, pictures, and logos on trusted websites like eBay and Yahoo. Unlike traditional viruses, SCOB...
Instructional Video1:44
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Meet Kevin Mitnick

Higher Ed
This video is an overview of a famous hacker, Kevin Mitnick, that highlights his hacking techniques.
Instructional Video6:30
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - HTTP, HTTPS, SSL, and TLS

Higher Ed
Here, you will learn about the hypertext transfer protocol, hypertext transfer protocol secure, secure sockets layer, and transport layer security, and how each one works.
Instructional Video3:48
Curated Video

Practical Cyber Hacking Skills for Beginners - Introduction to Hashcat

Higher Ed
This video introduces a tool that is an advanced password recovery tool and is available on various platforms.
Instructional Video3:45
Curated Video

Microsoft Project 2021 From Beginners to Advanced - Project Security

Higher Ed
Here, we will learn about project security and how to protect projects from unauthorized access or changes. Learn to set passwords, restrict user permissions, and encrypt project data. This clip is from the chapter "Saving Projects and...
Instructional Video3:15
Curated Video

Fundamentals of Secure Software - Password Demo

Higher Ed
This is a demo video on password management.
Instructional Video5:48
Curated Video

Fundamentals of Secure Software - Hashing Overview

Higher Ed
This video provides an introduction and overview of hashing.
Instructional Video5:10
Curated Video

Fundamentals of Secure Software - OpenID and OpenID Connect

Higher Ed
This video talks about OpenID and why it is used.
Instructional Video3:56
Curated Video

Fundamentals of Secure Software - Identification and Authentication Failures

Higher Ed
This video explains identification and authentication failures.
Instructional Video7:21
Curated Video

Fundamentals of Secure Software - Cryptographic Failures

Higher Ed
This video explains what sensitive data exposure is and talks about cryptographic failures.
Instructional Video6:33
Curated Video

A Detailed Guide to the OWASP Top 10 - API2:2023 Broken Authentication

Higher Ed
In this video, examine the critical security risk of Broken Authentication within APIs and discuss methods for securing authentication mechanisms.
Instructional Video2:48
Curated Video

A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures Prevention

Higher Ed
This video explains how to prevent identification and authentication failures.
Instructional Video10:04
Curated Video

A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures

Higher Ed
This video explains OWASP 07 - identification and authentication failures.
Instructional Video7:18
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - You Have Been HACKED - Now What?

Higher Ed
In this video, you will look at steps to take after you have been hacked and how exactly you would respond. This clip is from the chapter "Conclusion" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
Instructional Video3:33
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Have I Been Pwned?

Higher Ed
In this video, the author introduces you to a web tool called “have I been pwnedâ€; this is a website where you can check whether your email address or password has been compromised. This clip is from the chapter "Personal Security" of...
Instructional Video4:25
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Introduction to Password Managers

Higher Ed
In this video, you will be introduced to password manager tools such as LastPass or dashlane. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section...
Instructional Video12:13
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Password Management

Higher Ed
In this video, you will learn about password management and the need for using strong passwords to keep your system safe. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023...
Instructional Video5:38
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Credential Rotation

Higher Ed
An additional factor is credential rotation. You will learn about this process and how to configure password rotation policies in this video.
Instructional Video8:52
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Password Policies

Higher Ed
With your user accounts, you will want to have strong passwords. AWS can help you with this through the implementation of password policies and you will learn how to use them in this video.