Instructional Video9:03
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing Endpoints

Higher Ed
In the enterprise, endpoint detection and response solutions report to a centralized SIEM solution when abnormal activity, including malware, is detected on hosts and devices. Intrusion detection and prevention systems (IDS/IPS) are the...
Instructional Video9:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks

Higher Ed
Staying up-to-date with the latest types of security attacks is form of attack mitigation. Keeping systems hardened helps protect against zero-day attacks. Software developers must adhere to secure coding practices to ensure deployed...
Instructional Video7:13
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Linux Shell Script Lab

Higher Ed
Shell scripts contain Linux command that can be invoked simply by calling upon the script name. In this demo, a simple utility menu loop is created in a bash shell script. This clip is from the chapter "Tools of the Trade" of the series...
Instructional Video6:09
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Password Cracking Demo

Higher Ed
Dan demonstrates how to use a password cracking tool to turn hashed passwords into cleartext. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces...
Instructional Video2:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 10 Ask Me Anything (AMA)

Higher Ed
Some physical security controls protect physical property which includes hardware IT devices. In this episode, IP cameras and CCTV are discussed. This clip is from the chapter "Physical Security" of the series "CompTIA Security+...
Instructional Video10:07
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Virtual Private Networks (VPNs)

Higher Ed
VPNs provide an encrypted network tunnel over the Internet to provide secure access to a remote network. Client-to-site VPNs allow individual device access where site-to-site VPNs can securely link branch offices over the Internet or...
Instructional Video5:58
Curated Video

Learning Scala Web Development (Video 12)

Higher Ed
The Scala programming language has gained a lot of traction in the last couple of years because of its functional orientation and conciseness. The industry has a strong interest in using Scala in modern production systems, and as such,...
Instructional Video4:58
Intelligence Squared

Rory Stewart - The perils of foreign involvement in Afghanistan

Higher Ed
Rory Stewart will be speaking alongside David Aaronovitch at the IQ2 event. Rory Stewart - IQ2 highlights
Instructional Video1:39
Institute for New Economic Thinking

The Money View - Retirement Security

Higher Ed
This video is an illustration for a post on the Money
Instructional Video3:40
IDG TECHtalk

How to set up Edge Chromium security options

Higher Ed
Edge Chromium can provide more protection for organizations that use older versions of Windows.
Instructional Video6:40
IDG TECHtalk

How to keep attackers from using Active Directory against you

Higher Ed
Criminals will try to change Windows Active Directory Group Policy security settings to enable attacks. Here’s how to stop them.
Instructional Video6:16
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Proxy Servers

Higher Ed
Forward proxies sit between internal user devices and the Internet and fetch Internet content on behalf of internal users. Reverse proxies map public network service IPs to private IPs; they route client requests for a network service to...
Instructional Video9:06
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - SSH Public Key Authentication Lab

Higher Ed
Multifactor authentication should always be used for administrative accounts. In this demo, SSH public key authentication is configured for a Linux host. This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Instructional Video1:47
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - IOT (Internet Of Things)

Higher Ed
CISSP Domain 3: System Architecture and Engineering: IOT (Internet Of Things). This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Instructional Video9:39
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge)

Higher Ed
Introduction: The 8 CISSP domains or CBKs (Common Bodies of Knowledge). This clip is from the chapter "Introduction" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp 2019".This section...
Instructional Video7:00
Curated Video

Active Directory with Windows Server 2016 - AD Advanced Deployments

Higher Ed
In this video, you’ll first examine some of the design considerations and boundaries for setting up AD domains, forests, and OUs. Then you’ll learn about the issues involved with implementing changes or new domains. This clip is from the...
Instructional Video3:28
Curated Video

Learning PHP 7 (Video 16)

Higher Ed
PHP is back and is faster and more lightweight than ever. The world of web technology is seamlessly evolving, and PHP 7's simplicity and prowess addresses the requirements of current and future web and mobile application development....
Instructional Video4:09
Curated Video

Learning PHP 7 (Video 9)

Higher Ed
PHP is back and is faster and more lightweight than ever. The world of web technology is seamlessly evolving, and PHP 7's simplicity and prowess addresses the requirements of current and future web and mobile application development....
Instructional Video15:17
TLDR News

What Brexit Deal Do EU Countries Want? (Part Two) - Brexit Explained

12th - Higher Ed
We are running through what every country wants from a Brexit Deal. A few weeks ago we tackled the biggest countries by population, now we are going through what the smaller nations are looking for.
Instructional Video14:50
The Wall Street Journal

How to Measure the Role of Cybersecurity Awareness

Higher Ed
Highmark Health CISO, Omar Khawaja, discusses how businesses can establish the value their human risk mitigation program brings.
Instructional Video15:07
IDG TECHtalk

Windows 11 release: First impressions, hardware requirements and Android app integration

Higher Ed
Microsoft released its first update to Windows in six years on Tuesday. The newest edition of the operating system, Windows 11, introduces only a handful of new features. Those features include Teams integration, better security and a...
Instructional Video7:35
IDG TECHtalk

What you need to know about Microsoft Azure Security Benchmarks 2.0

Higher Ed
Microsoft has provided new guidance in the form of benchmarks to make sure your Azure environment is secure.
Instructional Video7:48
IDG TECHtalk

How to get maximum protection from MFA in Office 365

Higher Ed
Follow these steps to ensure your multi-factor authentication for Office 365 is effective.
Instructional Video5:56
IDG TECHtalk

How to harden web browsers against cyberattacks

Higher Ed
Use these techniques to limit attackers’ ability to compromise systems and websites.