Instructional Video1:27
The Business Professor

What is a Security?

Higher Ed
What is a Security?
Instructional Video9:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations

Higher Ed
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
Instructional Video10:13
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Password Cracking

Higher Ed
Passwords are often stored in hash format but can still be susceptible to attacks. The various password attacks include brute force, dictionary, and rainbow table. Salting and key stretching add another layer of security to hashed...
Instructional Video11:11
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Standards and Frameworks

Higher Ed
This video focuses on standards and frameworks.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
Instructional Video20:54
IDG TECHtalk

What the Colonial Pipeline ransomware attack suggests about critical infrastructure security

Higher Ed
The largest fuel pipeline in the United States, Colonial Pipeline, halted operations because of a ransomware attack. The attack was carried out by the cybercriminal group DarkSide. Much of the pipeline remains offline, although the...
Instructional Video3:27
Financial Times

Italy's 'parallel currency' and why it's worrying the eurozone

Higher Ed
FT economics commentator Martin Sandbu looks into the controversy surrounding the 'mini-BOT', a proposed new type of Treasury bill, how it would work, and whether it threatens membership of the euro.
Instructional Video4:06
Blockchain Central

Why Criminals Love Monero?

Higher Ed
This week on Blockchain Central: we’ll take a closer look at Monero, a cryptocurrency which has one of the best security systems among others and has a potential to become your personal bank. However, it still has downsides, which we...
Instructional Video0:43
Next Animation Studio

Study finds airport security trays contains more viruses than toilets

12th - Higher Ed
A study published in the BioMed Central Infectious Diseases journal found that plastic airport security trays carry viruses that could cause respiratory infections.
Instructional Video20:30
The Wall Street Journal

Google's Senior Director Of Information Security On Cybersecurity

Higher Ed
Heather Adkins, Senior Director of Information Security at Google, discusses the role of the CIO as the leader in creating a more secure infrastructure within business.
Instructional Video27:32
The Wall Street Journal

Protecting Physical Assets from Cyberattacks

Higher Ed
Hear from Dragos' Director of Cyber Risk Jason Christopher on how organizations can protect factories, buildings and infrastructure such as transport systems and reservoirs.
Podcast27:10
NASA

‎NASA in Silicon Valley: Jerry Davis Talks About Cybersecurity and Information Sharing at NASA

Pre-K - Higher Ed
A conversation with Jerry Davis, the Chief Information Officer at NASA’s Ames Research Center in Silicon Valley.
Instructional Video1:06
Next Animation Studio

Colombian cartel boss captured by security forces

12th - Higher Ed
Colombian security forces have arrested the country’s most wanted drug lord, Dairo Antonio Usuga, head of the country’s largest drug cartel, near his jungle hideout.
Instructional Video4:37
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - The Windows Command Line

Higher Ed
The Windows command line is spawned by cmd.exe. Security technicians can automate tasks using batch file scripts containing commands such as whoami and ipconfig. Powershell.exe can be spawned from a Windows command prompt in order to...
Instructional Video15:57
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cryptography Basics

Higher Ed
Cryptography is the practice of disguising information in a way that looks random. This episode explores the history of cryptography and how it has evolved into the complex systems today.
r/>
This clip is from the chapter...
Instructional Video2:57
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Physical Security Lab

Higher Ed
A full IT security audit always includes physical security. In this episode, physical security considerations are presented.
r/>
This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification...
Instructional Video18:26
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Information Security Governance: Policies, Procedures, Guidelines, and Frameworks

Higher Ed
This video focuses on policies, procedures, guidelines, and frameworks.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Instructional Video10:43
Curated Video

CISSP®- Risk - Attackers and Types of Attacks - Part 2

Higher Ed
This is the second part of a two-part video that explains risk attackers and their types.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of...
Instructional Video12:43
Curated Video

Master Java Web Services and REST API with Spring Boot- Step 18 - Implementing Security for SOAP Web Services with WS Security

Higher Ed
SOAP Web Services with Spring and Spring Boot: Step 18 - Implementing Security for SOAP Web Services with WS Security
r/>
This clip is from the chapter "SOAP Web Services with Spring and Spring Boot" of the series "Master Java...
Instructional Video11:58
Seven Dimensions

Protecting Organizations: Preventing Crime and Violence at Work

Higher Ed
In this video, Colin McLaren, an expert in crime prevention, discusses the importance of proactive measures to protect organizations from crime and violence in the workplace. He emphasizes the need for strong policies and procedures, as...
Instructional Video25:29
The Wall Street Journal

What To Report

Higher Ed
Myrna Soto, Chief Operating Officer, Digital Hands tells us what a CISO should be reporting to the board, looking at what corporate stakeholders regard as the principles of reporting and the most useful information.
Instructional Video23:57
The Wall Street Journal

Force Multipliers

Higher Ed
How can technologies like edge and quantum computing and advanced automation be best deployed?
Instructional Video21:35
The Wall Street Journal

The 5G Sprint

Higher Ed
The ultrafast cellular networks that will enable autonomous vehicles and AI-driven applications are fast becoming a reality. Youngky Kim of Samsung Electronics and Simon Segars of ARM sit down with WSJ's Yun-Hee Kim.
Instructional Video6:08
Blockchain Central

5 Key Crypto Events of 2018 (Year Review)

Higher Ed
This week on Blockchain Central: we will have a look back at the most important crypto events from 2018, that have changed the entire course of the industry
Instructional Video19:50
The Wall Street Journal

Aparna Bawa On Zoom's Unpredictable Rise

Higher Ed
At WSJ Tech Live, Zoom's Chief Operating Officer Aparna Bawa discusses how the health crisis has reshaped Zoom's strategy to meet explosive demand.