Instructional Video3:48
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - Smartphones and Mobile Apps Part I

Higher Ed
New ReviewIn Part I of this module, you will learn the general differences in security between iPhones and Androids, and why Androids can have some serious security issues that need to be addressed.
Instructional Video5:10
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - Apple Part II

Higher Ed
New ReviewYou will be presented with some of the main ways in which Apple protects you from evilness on the Internet, as well as some general things you can do to protect yourself whilst using a Mac computer.
Instructional Video4:14
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - Apple Part I

Higher Ed
New ReviewYou will learn about the general security around Apple computers. You will also learn why Apple operating systems can be very secure most of the time but can sometimes be just as insecure as other computers. In addition, you will be...
Instructional Video5:16
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - Vishing

Higher Ed
New ReviewIn this entertaining module, you will learn how scammers are social engineering us by spoofing caller ID numbers, and calling us on our phones, asking for money, personal information, or access to our computers. You will be played...
Instructional Video4:08
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - Smishing

Higher Ed
New ReviewIn this video module, you will learn about the sneaky art of social engineering using SMS text messaging on your mobile device. You will be shown examples of Smishing, and we will discuss the red flags that can be easily spotted in these...
Instructional Video2:52
Curated Video

U.S. Treasury says Chinese hackers accessed employee workstations, stole documents

9th - Higher Ed
The U.S. Treasury is accusing Chinese state-sponsored hackers of accessing several department workstations and unclassified documents after compromising a third-party software service provider. The department did not provide details on...
Instructional Video2:45
Seven Dimensions

Protecting Data and Sensitive Information at Work

Higher Ed
An organization’s data is a valuable asset that needs to be protected from unauthorized access by competitors, cybercriminals, or any unverified third party. It is important to have strict policies around sensitive information. Know who...
Instructional Video2:13
Curated Video

QR Code Attacks

Higher Ed
Delve into the world of QR code attacks in this revelatory video. Gain valuable insights into the potential risks and vulnerabilities associated with QR codes, and learn how cybercriminals exploit these seemingly harmless codes to...
Instructional Video2:14
Curated Video

Web Shoppers Beware: The SCOB Virus and the Threat to Online Security

Pre-K - Higher Ed
This video discusses the SCOB virus, a recent web virus that has infected numerous computers and servers. The virus spreads through banner ads, pictures, and logos on trusted websites like eBay and Yahoo. Unlike traditional viruses, SCOB...
Instructional Video4:25
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Patching and Updates

Higher Ed
This video demonstrates how applying Windows safety patches and updates is essential in constantly keeping the system safe and how to use these patches and updates.
Instructional Video1:12
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The World of Electronic Mails – Dangers, Attacks, and Protection

Higher Ed
This section focuses on emails, the dangers of not protecting the emails or opening dangerous emails, how hackers attack using emails, and how to protect yourself from being hacked by emails.
Instructional Video8:18
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Reconnaissance Methods

Higher Ed
In this lesson, you will learn about footprinting, or the art of collecting information about a person or object of interest, called reconnaissance.
Instructional Video4:41
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - What are Privacy, Anonymity, and Pseudonymity

Higher Ed
In this video, you will learn more about privacy, anonymity, and pseudonymity concepts.
Instructional Video5:03
Curated Video

Practical Cyber Hacking Skills for Beginners - Target Reconnaissance

Higher Ed
In this video, you will learn how to perform reconnaissance based on a specific target, usually, a location, understand the groundwork and infrastructure involved, and the possibilities of being able to hack.
Instructional Video12:43
Curated Video

Practical Cyber Hacking Skills for Beginners - Firewall and IDS Evasion Techniques

Higher Ed
In this video, we will understand a firewall and the intrusion detecting system in NMAP for a packet or probe coming specifically from NMAP.
Instructional Video4:11
Curated Video

Practical Cyber Hacking Skills for Beginners - Phishing Notes

Higher Ed
This continuation of the previous video explains phishing emails in detail and how to avoid phishing attacks.
Instructional Video4:40
Curated Video

Practical Cyber Hacking Skills for Beginners - NMAP Scripting

Higher Ed
In this video, we will look at the different scripts used in NMAP, programs, or codes used to check the vulnerability of networks and other functional availabilities.
Instructional Video3:35
Curated Video

Flaws in the Internet's Border Gateway Protocol

12th - Higher Ed
The White House recently unveiled a plan to deal with networking weaknesses in the Border Gateway Protocol. In the past, the BGP has been exploited or misconfigured to cause massive disruptions on the Internet. Topics Covered: Biggest...
Instructional Video3:27
Science ABC

How Are Computer Games ‘Cracked’?

Pre-K - Higher Ed
Game cracking involves bypassing security checks implemented by gaming companies. Hackers use tools such as kernel-mode debuggers, disassemblers, and hex-editors, which allow manipulation of the game's code. In this video, we will...
Instructional Video2:52
Curated Video

JavaScript Mastery from Zero to Hero - Prepare for Coding Interviews - Exercise - Virus Detection Algorithm with Asymmetric Arrays

Higher Ed
This is an exercise video where you will work on a virus detection algorithm with the help of asymmetric arrays. This clip is from the chapter "Algorithms and Data Structures - Intermediate to Advanced" of the series "JavaScript Mastery...
Instructional Video6:46
Curated Video

A Detailed Guide to the OWASP Top 10 - API9:2023 Improper Inventory Management

Higher Ed
In this session, we will address the challenges of Improper Inventory Management in API ecosystems and propose solutions for better management.
Instructional Video7:18
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - You Have Been HACKED - Now What?

Higher Ed
In this video, you will look at steps to take after you have been hacked and how exactly you would respond. This clip is from the chapter "Conclusion" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This...
Instructional Video12:25
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Identify Legit Apps

Higher Ed
In this video, the author shares a few tips on how to successfully navigate Google Play Store and download the right kind of application to help you identify legit apps and spot the fake apps out there. This clip is from the chapter...
Instructional Video17:06
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Personal Cybersecurity - What I Do

Higher Ed
In this video, the author talks about the necessary steps that he takes to keep himself and his data safe from malware and hackers. This clip is from the chapter "Introduction" of the series "The Absolute Beginners Guide to Cybersecurity...