Instructional Video16:43
IDG TECHtalk

What is a deepfake? How to prepare for and respond to this cyber attack

Higher Ed
As cyber criminals deploy more complex methods of hacking, using deepfakes to spread misinformation and “hack reality” have become more popular. This video, audio and/or text-based content is AI-generated and may be hard to discern from...
Instructional Video50:57
SWPictures

BATTLE FOR THE GULF - The 19th Province

12th - Higher Ed
The U.N. imposed sanctions and called on Saddam to withdraw from Kuwait. Instead he sent in over 300,000 soldiers. Kuwait's wealth was systematically plundered by the looting of houses to the ransacking of the Kuwait Central Bank. Some...
Instructional Video29:25
The Wall Street Journal

How Multinational Companies Run Global Cybersecurity Programs

Higher Ed
Michael McNeil of McKesson and Kevin Tierney of General Motors discuss how to manage global cybersecurity programs, and share their insights on the best ways to organize for security.
Instructional Video5:40
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Load Balancing

Higher Ed
Active/active and active/passive load balancing can efficiently route client application requests to backend servers. Load balancing improves application performance and resiliency to a single application server failure.
r/>
...
Instructional Video11:39
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Security Assessment Tools

Higher Ed
Open-source and proprietary (paid) security assessment tools are used by security analysts and malicious actors; what differs is the reason they are being used. The scanless tool uses web sites to perform port scans while the hping3...
Instructional Video9:39
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Business Continuity Planning - Part 1

Higher Ed
This is the first part of a two-part video that explains business continuity planning.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the...
Instructional Video7:22
Curated Video

Active Directory with Windows Server 2016 - Introduction to Groups

Higher Ed
Walk through the processes to set up users in groups, and learn about the logical and physical considerations you’ll want to consider. You’ll work with groups for security management considerations and maintenance.
r/>
This...
Instructional Video19:34
The Wall Street Journal

Goodbye Passwords?

Higher Ed
New standards for authentication are emerging to take the place of passwords, with the promise of more security and less complexity. Explore how these will change interactions with customers and security access for employees.
Instructional Video21:32
The Wall Street Journal

The Cyber War Room

Higher Ed
CrowdStrike co-founder and CEO George Kurtz and Cloudflare co-founder and CEO Matthew Prince discuss the latest trends and threats in cybersecurity with WSJ Business Editor Jamie Heller at the WSJ D.Live conference in Laguna Beach,...
Instructional Video33:14
The Wall Street Journal

Alphabet's Look Ahead with Company CEO, Sundar Pichai

Higher Ed
CEO of Google's parent Alphabet Inc., Sundar Pichai on technology regulation, looming antitrust challenges, cutting-edge technology bets and his views on hybrid work and the return to the physical office.
Instructional Video32:07
The Wall Street Journal

How Covid-19 Has Changed Cybersecurity

Higher Ed
Rockwell Automation's Dawn Cappelli and Mastercard's Anne Marie Zettlemoyer discuss how Covid-19 affected their own company's cybersecurity operations and the long-term effects of these changes.
Instructional Video29:02
The Wall Street Journal

Reinforcing the Supply Chain

Higher Ed
High-profile incidents have shown companies that they are vulnerable to attacks on technology supply chains. Cyber leaders from NYSE and Foley & Lardner show companies what they can do to improve security and the response to attacks.
Instructional Video18:52
Let's Tute

Consignment Accounting Problem Solving: Accounting for Consignment Sales with Commission and Security Money

9th - Higher Ed
This video discusses the consignment of goods by rail to Sahil for sale, including Sahil's commission and security money. It also covers the calculation of commission, closing stock, and profit, as well as the adjustment of security...
Instructional Video25:17
IDG TECHtalk

Enterprise networking in 2022: Applying remote work lessons as employees return to the office

Higher Ed
As employees return to the office, IT can apply lessons learned from supporting remote workers to transform their networks. Cloud architectures such as SD-WAN and SASE could continue to be useful. Network as a Service, or NaaS, is still...
Instructional Video5:40
IDG TECHtalk

Microsoft Defender for Business | What security admins need to know

Higher Ed
The new Microsoft Defender for Business makes important Windows security features more available to small businesses.
Instructional Video6:09
Blockchain Central

Cardano - The Third Generation of Blockchain | Blockchain Central

Higher Ed
This week on Blockchain Central: we'll take a closer look at the blockchain technology called Cardano, what are the features of the third generation blockchains and how can it revolutionize the industry. Make sure to watch till the end...
Instructional Video12:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Asymmetric Cryptosystems

Higher Ed
In this episode, Mike describes encrypting and decrypting data with different keys and the magic that happens when key pairs are generated.
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Instructional Video7:20
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Methods

Higher Ed
This episode introduces various methods used to protect the critical keys in cryptography that keep communication secure.
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601:...
Instructional Video8:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Touring Certificates

Higher Ed
Mike tours various certificates in this episode.<br/<br/>>

This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces you to cryptography.
Instructional Video1:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 12 Ask Me Anything (AMA)

Higher Ed
One aspect of security testing is determining if internal employees have an awareness of common security problems. In this episode, Mike discusses phishing and whaling.
r/>
This clip is from the chapter "Testing Infrastructure"...
Instructional Video25:18
The Wall Street Journal

10 Years Out

Higher Ed
A discussion of how cybersecurity will influence public acceptance of emerging technology and how hackers could seek to subvert world-changing innovations.
Instructional Video31:04
The Wall Street Journal

What To Report

Higher Ed
What should a CISO report to the executive team and board, and what do board members want to know? We'll look at what corporate stakeholders regard as the principles of reporting and the most useful information.
Instructional Video20:50
The Wall Street Journal

Are We Winning?

Higher Ed
High-profile breaches continue, from DNC and Equifax to Facebook and Under Armour. Malware and ransomware grind businesses to a halt, and vulnerabilities face utilities and other infrastructure. What's the score in the battle over...
Instructional Video2:04
The Business Professor

Disclosure Documents in Securities Issuance - Explained

Higher Ed
Disclosure Documents in Securities Issuance - Explained