Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing Endpoints
In the enterprise, endpoint detection and response solutions report to a centralized SIEM solution when abnormal activity, including malware, is detected on hosts and devices. Intrusion detection and prevention systems (IDS/IPS) are the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks
Staying up-to-date with the latest types of security attacks is form of attack mitigation. Keeping systems hardened helps protect against zero-day attacks. Software developers must adhere to secure coding practices to ensure deployed...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Linux Shell Script Lab
Shell scripts contain Linux command that can be invoked simply by calling upon the script name. In this demo, a simple utility menu loop is created in a bash shell script. This clip is from the chapter "Tools of the Trade" of the series...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Password Cracking Demo
Dan demonstrates how to use a password cracking tool to turn hashed passwords into cleartext. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 10 Ask Me Anything (AMA)
Some physical security controls protect physical property which includes hardware IT devices. In this episode, IP cameras and CCTV are discussed. This clip is from the chapter "Physical Security" of the series "CompTIA Security+...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Virtual Private Networks (VPNs)
VPNs provide an encrypted network tunnel over the Internet to provide secure access to a remote network. Client-to-site VPNs allow individual device access where site-to-site VPNs can securely link branch offices over the Internet or...
Curated Video
Learning Scala Web Development (Video 12)
The Scala programming language has gained a lot of traction in the last couple of years because of its functional orientation and conciseness. The industry has a strong interest in using Scala in modern production systems, and as such,...
Intelligence Squared
Rory Stewart - The perils of foreign involvement in Afghanistan
Rory Stewart will be speaking alongside David Aaronovitch at the IQ2 event. Rory Stewart - IQ2 highlights
Institute for New Economic Thinking
The Money View - Retirement Security
This video is an illustration for a post on the Money
IDG TECHtalk
How to set up Edge Chromium security options
Edge Chromium can provide more protection for organizations that use older versions of Windows.
IDG TECHtalk
How to keep attackers from using Active Directory against you
Criminals will try to change Windows Active Directory Group Policy security settings to enable attacks. Here’s how to stop them.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Proxy Servers
Forward proxies sit between internal user devices and the Internet and fetch Internet content on behalf of internal users. Reverse proxies map public network service IPs to private IPs; they route client requests for a network service to...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - SSH Public Key Authentication Lab
Multifactor authentication should always be used for administrative accounts. In this demo, SSH public key authentication is configured for a Linux host. This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - IOT (Internet Of Things)
CISSP Domain 3: System Architecture and Engineering: IOT (Internet Of Things). This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge)
Introduction: The 8 CISSP domains or CBKs (Common Bodies of Knowledge). This clip is from the chapter "Introduction" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp 2019".This section...
Curated Video
Active Directory with Windows Server 2016 - AD Advanced Deployments
In this video, you’ll first examine some of the design considerations and boundaries for setting up AD domains, forests, and OUs. Then you’ll learn about the issues involved with implementing changes or new domains. This clip is from the...
Curated Video
Learning PHP 7 (Video 16)
PHP is back and is faster and more lightweight than ever. The world of web technology is seamlessly evolving, and PHP 7's simplicity and prowess addresses the requirements of current and future web and mobile application development....
Curated Video
Learning PHP 7 (Video 9)
PHP is back and is faster and more lightweight than ever. The world of web technology is seamlessly evolving, and PHP 7's simplicity and prowess addresses the requirements of current and future web and mobile application development....
TLDR News
What Brexit Deal Do EU Countries Want? (Part Two) - Brexit Explained
We are running through what every country wants from a Brexit Deal. A few weeks ago we tackled the biggest countries by population, now we are going through what the smaller nations are looking for.
The Wall Street Journal
How to Measure the Role of Cybersecurity Awareness
Highmark Health CISO, Omar Khawaja, discusses how businesses can establish the value their human risk mitigation program brings.
IDG TECHtalk
Windows 11 release: First impressions, hardware requirements and Android app integration
Microsoft released its first update to Windows in six years on Tuesday. The newest edition of the operating system, Windows 11, introduces only a handful of new features. Those features include Teams integration, better security and a...
IDG TECHtalk
What you need to know about Microsoft Azure Security Benchmarks 2.0
Microsoft has provided new guidance in the form of benchmarks to make sure your Azure environment is secure.
IDG TECHtalk
How to get maximum protection from MFA in Office 365
Follow these steps to ensure your multi-factor authentication for Office 365 is effective.
IDG TECHtalk
How to harden web browsers against cyberattacks
Use these techniques to limit attackers’ ability to compromise systems and websites.