Instructional Video4:04
Curated Video

Ottawa bans TikTok's Canadian operations — but not the app

9th - Higher Ed
The federal government has ordered TikTok to shutter its Canadian operations, citing national security concerns, but users will still be able to access the popular video app.
Instructional Video14:50
Curated Video

Protecting networks from security threats

Pre-K - Higher Ed
Pupil outcome: I can compare threats to the security of a computer system and suggest protective actions to take. Key learning points: - Threats to security can be compared by likelihood and impact. - Protective measures are used to make...
Instructional Video8:00
Let's Tute

Consumer and Investor Protection and Ombudsman

9th - Higher Ed
Todays session is all about the consumer protection in financial services. In this session we will dicuss on following topics: 1] Consumer protection in financial services 2] Redressal Mechanisms to protect the consumer 3] Guidence for...
Instructional Video4:16
Curated Video

Get Hired: Military Transition

9th - Higher Ed
Whether you are just beginning your journey in the military career or are about to transition to the private sector, take a moment to watch this video offering experienced advice from alumni that have successfully navigated their own...
Instructional Video1:26
Curated Video

Lookalike Letters Phishing Attacks

Higher Ed
Uncover the threat of look-alike letters phishing attacks in this informative video. Explore how cybercriminals use devious tactics to mimic legitimate correspondence, luring unsuspecting victims into divulging sensitive information....
Instructional Video6:52
Curated Video

Risk Management for Cyber Security Managers - Standards

Higher Ed
This video provides an overview of the crucial role standards play in risk management, distinguishing between regulatory and non-regulatory standards, and introduces the main cybersecurity risk management frameworks from NIST and ISO.
Instructional Video1:49
Great Big Story

Meet mira modi, the teen turning passwords into art

12th - Higher Ed
Explore the creative world of Mira Modi, a young entrepreneur who crafts secure, hard-to-crack passwords using a dice-based system.
Instructional Video6:42
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Accessing the Dark Web with Tor

Higher Ed
This video talks about the dark web that conducts illegal activities with Tor. The author illustrates how to use the dark web.
Instructional Video5:08
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Welcome to the Course

Higher Ed
This video outlines an introduction about the author as he explains what you will learn as the course advances and the topics covered in general.
Instructional Video9:10
Curated Video

Practical Cyber Hacking Skills for Beginners - Hashing

Higher Ed
In this video, we will look at hashing, which is the conversion of key/string/variable into a hash using an algorithm used in malware and antimalware products.
Instructional Video2:12
Curated Video

Practical Cyber Hacking Skills for Beginners - Section Preview-5

Higher Ed
This video briefly outlines the section concepts, including a typical home network setup, DHCP and DNS, commands used in them, TCP versus UDP, and firewalls and hardening networks to prevent attacks.
Instructional Video6:01
Curated Video

Practical Cyber Hacking Skills for Beginners - Key Principles of Cybersecurity

Higher Ed
Let's look at the technological practices and critical principles of cybersecurity.
Instructional Video3:40
Curated Video

Practical Cyber Hacking Skills for Beginners - The CIA and DAD Triads

Higher Ed
This video will teach us more about confidentiality, integrity, availability, disclosure, alteration, and deniability.
Instructional Video0:40
Curated Video

Practical Cyber Hacking Skills for Beginners - Section Preview-1

Higher Ed
This brief outline video summarizes what you will learn from this section, including the CIA and DAD triads, cybersecurity principles, and CWE and CVE.
Instructional Video2:38
Curated Video

Practical Cyber Hacking Skills for Beginners - Introduction

Higher Ed
In this video, the author discusses cyber security as a career and the dangers of not having proper cyber security over systems and networks.
Instructional Video0:40
Curated Video

Practical Cyber Hacking Skills for Beginners - Conclusion

Higher Ed
This video is a thankful conclusion to the course by the author.
Instructional Video3:58
Curated Video

How Bad Code Broke a Billion Windows Machines

12th - Higher Ed
Cybersecurity firm Crowdstrike pushed an update that caused millions of Windows computers to enter recovery mode, triggering the blue screen of death. Learn how the Crowdstrike crash happened and its impact around the world. Topics...
Instructional Video9:19
Curated Video

The CISO Masterclass - STAR Methodology - Continued

Higher Ed
This video builds upon the previous one, providing additional tips and examples for utilizing the STAR methodology during CISO interviews.
Instructional Video4:31
Curated Video

The CISO Masterclass - What Is Cybersecurity Strategy?

Higher Ed
This video dives into the fundamentals of developing a robust cybersecurity strategy and its significance in protecting organizational assets.
Instructional Video4:56
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Leveling Up in Solidity

Higher Ed
This video helps you with leveling up in Solidity by learning new concepts. This clip is from the chapter "Solidity Patterns I - Cybersecurity" of the series "The Complete Solidity Course - Zero to Advanced for Blockchain and Smart...
Instructional Video3:46
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Welcome to the Course

Higher Ed
In this video, the author talks about what to expect from this course and explains why cybersecurity is important. This clip is from the chapter "Introduction" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part...
Instructional Video10:06
Curated Video

The Modern Spy: How Your Daily Devices Can Be Compromised

6th - Higher Ed
In an age where technology is intertwined with daily life, learn how easily your devices can be hacked and used for spying. From mobile phones to computers, discover the methods used by modern spies to infiltrate your privacy. Follow...
Instructional Video8:38
Curated Video

Modern Espionage: How Your Privacy is Being Compromised

6th - Higher Ed
Discover the surprising ways in which your privacy can be invaded in the modern world. From hidden cameras in everyday objects to sophisticated hacking techniques, learn how spies can access your Smartphone, computer, and even capture...
Instructional Video5:31
Curated Video

The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - How to Use NordVPN

Higher Ed
This video talks about the installation and usage of NordVPN, which is one of the best VPNs suitable for a mobile device. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to...