SciShow
How Encryption Keeps Your Data Safe
Keeping our data safe and secure is necessary in today's world, but a lot of the encryption we depend on has been in development for thousands of years!
SciShow
How Meltdown and Spectre Make Your Computer Vulnerable
Another year, another security breach that could expose all of your information. Installing updates might be a good New Year's resolution.
SciShow
How Worried Should You Be About Smart Home Security?
As we hurtle through the development of the digital world, it's important to keep in mind the security implications of the technology we use.
Crash Course
Hackers & Cyber Attacks: Crash Course Computer Science
Today we're going to talk about hackers and their strategies for breaking into computer systems. Now, not all hackers are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White...
Crash Course
Cybersecurity: Crash Course Computer Science
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use...
Curated Video
Web Shoppers Beware: The SCOB Virus and the Threat to Online Security
This video discusses the SCOB virus, a recent web virus that has infected numerous computers and servers. The virus spreads through banner ads, pictures, and logos on trusted websites like eBay and Yahoo. Unlike traditional viruses, SCOB...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Meet Kevin Mitnick
This video is an overview of a famous hacker, Kevin Mitnick, that highlights his hacking techniques.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - HTTP, HTTPS, SSL, and TLS
Here, you will learn about the hypertext transfer protocol, hypertext transfer protocol secure, secure sockets layer, and transport layer security, and how each one works.
Curated Video
Practical Cyber Hacking Skills for Beginners - Introduction to Hashcat
This video introduces a tool that is an advanced password recovery tool and is available on various platforms.
Curated Video
Microsoft Project 2021 From Beginners to Advanced - Project Security
Here, we will learn about project security and how to protect projects from unauthorized access or changes. Learn to set passwords, restrict user permissions, and encrypt project data. This clip is from the chapter "Saving Projects and...
Curated Video
Fundamentals of Secure Software - Password Demo
This is a demo video on password management.
Curated Video
Fundamentals of Secure Software - Hashing Overview
This video provides an introduction and overview of hashing.
Curated Video
Fundamentals of Secure Software - OpenID and OpenID Connect
This video talks about OpenID and why it is used.
Curated Video
Fundamentals of Secure Software - Identification and Authentication Failures
This video explains identification and authentication failures.
Curated Video
Fundamentals of Secure Software - Cryptographic Failures
This video explains what sensitive data exposure is and talks about cryptographic failures.
Curated Video
A Detailed Guide to the OWASP Top 10 - API2:2023 Broken Authentication
In this video, examine the critical security risk of Broken Authentication within APIs and discuss methods for securing authentication mechanisms.
Curated Video
A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures Prevention
This video explains how to prevent identification and authentication failures.
Curated Video
A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures
This video explains OWASP 07 - identification and authentication failures.
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - You Have Been HACKED - Now What?
In this video, you will look at steps to take after you have been hacked and how exactly you would respond. This clip is from the chapter "Conclusion" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Have I Been Pwned?
In this video, the author introduces you to a web tool called “have I been pwnedâ€; this is a website where you can check whether your email address or password has been compromised. This clip is from the chapter "Personal Security" of...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Introduction to Password Managers
In this video, you will be introduced to password manager tools such as LastPass or dashlane. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Password Management
In this video, you will learn about password management and the need for using strong passwords to keep your system safe. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023...
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Credential Rotation
An additional factor is credential rotation. You will learn about this process and how to configure password rotation policies in this video.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Password Policies
With your user accounts, you will want to have strong passwords. AWS can help you with this through the implementation of password policies and you will learn how to use them in this video.