Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Trust Models
Web of trust is a mostly outdated method of proving identities, however it is helpful to understand as the predecessor of Public Key Infrastructure (PKI) which is widely used today. This clip is from the chapter "Cryptography" of the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 11 Exam Question Review
Connecting to any Internet resource commonly uses DNS to resolve host names to IP addresses. In this episode, the viewer is presented with a DNS scenario and must determine which type of attack has occurred. This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Request Forgery Attacks
Hijacked authenticated user sessions can result in Cross-Site Request Forgery (CSRF) attacks. This episode explains how these attacks occur and how they can be mitigated. This clip is from the chapter "Securing Dedicated Systems" of the...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - General Data Protection Regulation (GDPR)
This video focuses on GDPR. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and Risk Management...
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Life after passing the CISM certification and being endorsed
The exam and life after it: Life after passing the CISM certification and being endorsed This clip is from the chapter "The exam and life after it" of the series "CISM Certification Domain 1: Information Security Governance Video Boot...
The Business Professor
Securities Act of 1933 - Explained
In this video, we delve into the Securities Act of 1933, the first major federal securities law in the United States. Join us as we explore the purpose, scope, and key provisions of this landmark legislation.
IDG TECHtalk
How to use Microsoft’s Sysmon and Azure Sentinel logging tools
Sysmon and the cloud-based Sentinel log events to help detect when and how attackers compromised your network.
IDG TECHtalk
Tips to prep Windows networks for proper incident forensics
If a security incident occurs on your Windows network, are you prepared to do a thorough investigation? These tips and tools will help.
IDG TECHtalk
Microsoft’s Windows, Office 365 advice for secure elections
Microsoft has issued guidance and offered resources to help election officials and candidate campaigns to better protect their Windows and Office 365 systems.
IDG TECHtalk
How to safely erase data under Windows
See how to save a data frame from R to Excel – with styling or multiple tabs. If you have a request for a future episode of Do More With R, leave a comment below.
Curated Video
CISSP®- Governance, Management, Standards, and Frameworks
This video focuses on governance, management, standards, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- Amazon Shared Security Model
In this video, we'll learn about the Amazon shared security model. This clip is from the chapter "Security" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".You will learn about security here. It includes...
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Designing security into our software
CISM Domain 1: Information Security Governance: Designing security into our software This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security...
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Why you should want to get CISM certified.
Introduction: Why you should want to get CISM certified. This clip is from the chapter "Introduction" of the series "CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019".In this section, learn why you want...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Other Layer 2 Attacks
Layer 2 of the OSI model (Data Link layer) accessing network media and addressing using MAC addresses. MAC address flooding attacks and broadcast storms can be mitigated with network switches configuring with BPDU and STP. This clip is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Windows Command-Line Tools
Security technicians must be comfortable with Windows commands for standard maintenance and security tasks using commands such as ping, netstat, and icalcs. This clip is from the chapter "Tools of the Trade" of the series "CompTIA...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Linux Shells
A Linux shell is a case-sensitive command line environment that supports scripting and comes in various flavors including Bash, Korn, and C shells. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+...
The Wall Street Journal
Shifting Alliances
When a longtime U.S. ally starts looking toward China, what lessons can be drawn, and what does it say about U.S. influence regionally?
The Wall Street Journal
Cloud: How To Manage The Risks
Sameer Malhotra, CEO and Founder, TrueFort Inc. and Patty Smith, VP and CISO, Cox Automotive look at how companies who rely on the cloud can strengthen their cybersecurity.
The Business Professor
Automatic Stay of Proceedings in Bankruptcy
This video explains the stay of proceeding power granted to debtors in possession under Section 362 of the Bankruptcy Code. The teacher also discusses the criteria for seeking relief from the stay and exceptions for certain types of...
IDG TECHtalk
How to and why you should disable LLMNR with Windows Server
Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.
Curated Video
CISSP®- Information Security Governance: Values, Vision, Mission, and Plans
This video focuses on values, vision, mission, and plans. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
IDG TECHtalk
What's ahead for cybersecurity in 2019: TECH(talk)
J.M. Porup, senior writer at CSO online, joins Juliet on this week's episode of TECH(talk) to discuss trends in ransomware, IoT security and enterprise cybersecurity roles.
IDG TECHtalk
How to securely prepare for Adobe Flash end of life on Windows 10
Microsoft will soon discontinue support for Adobe Flash. Here’s how to transition to secure alternatives while blocking unsafe use of Flash.