Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - VPN Myths Debunked
In this video, the author debunks the significant myths about VPN use and several reasons for using a paid VPN.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - NordVPN
In this video, the author illustrates more about NordVPN and the benefits and cons of the VPN.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Types of VPNs
In this video, the author discusses the various kinds of VPNs used and the benefits and disadvantages of the VPNs
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to Proxy Servers
Let's discuss the first anonymizer, the proxy server, and how it can provide a proxy IP address to hide your activity.
Curated Video
Practical Cyber Hacking Skills for Beginners - Introduction to NAT
This video is a detailed introduction to Network Address Translation, allowing computers to share the same public IP address.
Curated Video
Practical Cyber Hacking Skills for Beginners - Section Preview-5
This video briefly outlines the section concepts, including a typical home network setup, DHCP and DNS, commands used in them, TCP versus UDP, and firewalls and hardening networks to prevent attacks.
Curated Video
Practical Cyber Hacking Skills for Beginners - Key Principles of Cybersecurity
Let's look at the technological practices and critical principles of cybersecurity.
Curated Video
Practical Cyber Hacking Skills for Beginners - Incident Response Plan
We will look at the policies and procedures used to identify, contain, and eliminate cyber-attacks.
Curated Video
What If Our Clothes Could Disrupt Surveillance Cameras?
What do you get when you combine mass surveillance with A.I.? It’s a dystopia that’s already a reality in places across the world. Fashion designers are pushing back, crafting clothing and accessories that trick facial recognition...
Science ABC
How Are Computer Games ‘Cracked’?
Game cracking involves bypassing security checks implemented by gaming companies. Hackers use tools such as kernel-mode debuggers, disassemblers, and hex-editors, which allow manipulation of the game's code. In this video, we will...
Curated Video
The Prime Number Code
Why prime numbers are the building blocks of encryption, used for information security, in cash machines and to hide your identity online. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Curated Video
How Algorithms Change the World
What are algorithms, and how do they dictate human behaviour? Helpful and often life-saving functions, algorithms are shaping our lives more and more as they become increasingly complex. Maths - Algebra A Twig Math Film. Reinforce and...
Weird History
How the Altamont Free Concert Ended the Summer of Love
Lambasted by Rolling Stone magazine as "rock and roll's all-time worst day — a day when everything went perfectly wrong," the 1969 music festival at Altamont Speedway in Northern California was a concert unlike any other. Immortalized in...
Curated Video
Big Ideas - Episode 7 - Thermal Imaging
The need to see in the dark; to observe weather patterns from outer space; or to conduct security surveillance at night, lead to the Big Idea of Night Vision, and Thermal Imaging. FLIR, or Forward Looking Infra Red, is a continuation of...
Curated Video
Unique Offerings of an IT Solutions Consulting Company
Jason is the President of CNWR, an located in Toledo, Ohio. With a background in network engineering, Jason became the president of CNWR after being with the company for almost 10 years. Under Jason's leadership, the company continues to...
Curated Video
Differentiating Between Good and Great in the IT Consulting Field
Drive and hunger are important elements of knowledge. The president of an IT solutions consulting company explains how how truly great professionals understand the interconnectedness of various concepts and components, enabling them to...
Curated Video
The Value of a Well-Rounded Learning Experience
In this video, the president of an IT solutions consulting company reflects on his unconventional path to obtaining a degree in a rapidly evolving field like AI, where many professionals do not necessarily hold formal degrees. He...
Curated Video
Career Advice for Aspiring Tech Professionals
Jason, President of an IT solutions consulting company, explains why he likes to hire graduates from the college of engineering, particularly those with backgrounds in computer science, engineering technology, or IT. He highlights the...
Curated Video
Embracing Technical and Hiring Challenges in the IT Industry
Jason, a passionate and experienced IT professional is dedicated to using technical skills to help businesses overcome unique challenges and enhance their cybersecurity measures. He specializes in helping companies improve their...
Curated Video
A Day in the Life of a Tech CEO
Jason is the President of CNWR, an IT solutions consulting company located in Toledo, Ohio. With 25 years of experience, CNWR offers IT services to small and medium businesses in Toledo, along with high-end security and enterprise E...
Curated Video
Burp Suite Unfiltered - Go from a Beginner to Advanced - How to Use Sequencer Tab
This video explains how to use the sequencer tab.
Curated Video
The CISO Masterclass - Ask Questions
In this video, discover the importance of asking insightful questions during interviews and how it can demonstrate your curiosity and strategic thinking as a CISO.
Curated Video
The CISO Masterclass - DevSecOps and the Role of CISO
This video highlights the growing importance of DevSecOps and the pivotal role that CISOs play in integrating security into the development process.
Curated Video
The CISO Masterclass - Security Metrics
This video provides an in-depth understanding of security metrics and their role in measuring the effectiveness of cybersecurity initiatives.