Instructional Video11:29
Curated Video

Real-World DevOps Project From Start to Finish - iRedMail - Part 6

Higher Ed
In this video, we will explore advanced topics in iRedMail administration, including troubleshooting common issues, managing server backups, and implementing additional security measures. This clip is from the chapter "iRedMail" of the...
Instructional Video11:13
Curated Video

Real-World DevOps Project From Start to Finish - certbot, ACME protocol, wildcard TLS certificates

Higher Ed
This video will dive into certbot, the ACME protocol, and wildcard TLS certificates. You will learn to install and configure certbot, obtain TLS certificates for servers and applications, and automate the certificate renewal process. We...
Instructional Video1:30
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - S3 Encryption

Higher Ed
This video talks about S3 encryption. This clip is from the chapter "Key Management Service - Generate and Manage AWS Encryption Keys" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section focuses on...
Instructional Video2:03
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - EBS Volume Encryption

Higher Ed
This video explains EBS volume encryption. This clip is from the chapter "Key Management Service - Generate and Manage AWS Encryption Keys" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section...
Instructional Video5:18
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - KMS Architecture

Higher Ed
This video talks about the KMS architecture. This clip is from the chapter "Key Management Service - Generate and Manage AWS Encryption Keys" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section...
Instructional Video4:18
Curated Video

SkillSprints: Identity Theft

Pre-K - Higher Ed
Every day thousands of people have their identitiy stolen. Often, that theft occurs due to poor digital skills. In this video, learn what you can do to prevent online identity theft.
Instructional Video4:28
Curated Video

DKIM Email Security

Higher Ed
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Instructional Video6:02
Curated Video

Setup a Stealthy Command and Control Center Online

Higher Ed
This video will teach you how to setup a command and control center over the internet to start you actual attacks
Instructional Video3:56
Curated Video

Symetric and Assymetric Encryption

Higher Ed
This video will differentiate between the two main types of encryption
Instructional Video7:48
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - S3 Encryption (Reminder)

Higher Ed
This video explains the concept of encryption in Amazon Web Services (AWS). This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about...
Instructional Video5:58
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - S3 Encryption – Hands-On

Higher Ed
This video is a practical video where we will demonstrate S3 encryption. This clip is from the chapter "Domain 2: Storage" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about the...
Instructional Video6:50
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - S3 Encryption

Higher Ed
This video explains the concept of Amazon S3 encryption. This clip is from the chapter "Domain 2: Storage" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about the various AWS...
Instructional Video6:04
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - KMS Overview

Higher Ed
This video provides an overview of AWS KMS. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about Amazon Web Services (AWS)...
Instructional Video2:03
Curated Video

How to Protect Your Data

Higher Ed
This video introduces different techniques on how to protect your data
Instructional Video1:15
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - Kinesis Security

Higher Ed
This video explains the concept of security in Amazon Kinesis data streams. This clip is from the chapter "Domain 1: Collection" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn to...
Instructional Video5:26
Blockchain Central

Private and Public Keys Explained

Higher Ed
This week on Blockchain Central: we’ll talk about private and public keys, see how they are used, and why they matter in the world of crypto. We will also have a look at the level of safety that asymmetric encryption provides and how it...
Instructional Video5:26
Blockchain Central

Private and Public Keys Explained | Blockchain Central

Higher Ed
This week on Blockchain Central: we'll talk about private and public keys, see how they are used, and why they matter in the world of crypto. We will also have a look at the level of safety that asymmetric encryption provides and how it...
Instructional Video8:37
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Data Protection

Higher Ed
Data is not all the same. Whether data is at rest, in use, or in transit will affect how you can best secure it. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Instructional Video12:42
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Cryptosystems

Higher Ed
In this episode, Mike describes encrypting and decrypting data with the same key. He also covers how symmetric algorithms can either be block or streaming and use various types of ciphers depending on which one is used. This clip is from...
Instructional Video7:20
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Methods

Higher Ed
This episode introduces various methods used to protect the critical keys in cryptography that keep communication secure. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total...
Instructional Video5:39
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- Elastic Block Store (EBS)

Higher Ed
In this video, we'll learn about Elastic Block Store (EBS). This clip is from the chapter "AWS Compute Services" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is about AWS compute services in...
Instructional Video7:40
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Understanding Digital Certificates

Higher Ed
Digital certificates are used in many different places to verify the identity of a public key owner. They can also include verification from third parties for an added layer of security. This clip is from the chapter "Cryptography" of...
Instructional Video3:13
IDG TECHtalk

Setting up DLP features for email

Higher Ed
Network World contributing editor David Strom provides a roundup of how to enable data leak prevention features on three email security platforms.
Instructional Video8:35
Curated Video

Bug Bounty Program Certification 11.4: Find Bugs in Coding Files and Break Algorithm

Higher Ed
This video will help you find algorithm and complete the task. • Analyze source code to find algorithm used • Find out encryption key • Complete the task to encrypt the string