Instructional Video4:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Trust Models

Higher Ed
Web of trust is a mostly outdated method of proving identities, however it is helpful to understand as the predecessor of Public Key Infrastructure (PKI) which is widely used today. This clip is from the chapter "Cryptography" of the...
Instructional Video3:24
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 11 Exam Question Review

Higher Ed
Connecting to any Internet resource commonly uses DNS to resolve host names to IP addresses. In this episode, the viewer is presented with a DNS scenario and must determine which type of attack has occurred. This clip is from the chapter...
Instructional Video4:57
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Request Forgery Attacks

Higher Ed
Hijacked authenticated user sessions can result in Cross-Site Request Forgery (CSRF) attacks. This episode explains how these attacks occur and how they can be mitigated. This clip is from the chapter "Securing Dedicated Systems" of the...
Instructional Video9:21
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - General Data Protection Regulation (GDPR)

Higher Ed
This video focuses on GDPR. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and Risk Management...
Instructional Video4:50
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Life after passing the CISM certification and being endorsed

Higher Ed
The exam and life after it: Life after passing the CISM certification and being endorsed This clip is from the chapter "The exam and life after it" of the series "CISM Certification Domain 1: Information Security Governance Video Boot...
Instructional Video1:10
The Business Professor

Securities Act of 1933 - Explained

Higher Ed
In this video, we delve into the Securities Act of 1933, the first major federal securities law in the United States. Join us as we explore the purpose, scope, and key provisions of this landmark legislation.
Instructional Video4:05
IDG TECHtalk

How to use Microsoft’s Sysmon and Azure Sentinel logging tools

Higher Ed
Sysmon and the cloud-based Sentinel log events to help detect when and how attackers compromised your network.
Instructional Video4:35
IDG TECHtalk

Tips to prep Windows networks for proper incident forensics

Higher Ed
If a security incident occurs on your Windows network, are you prepared to do a thorough investigation? These tips and tools will help.
Instructional Video5:25
IDG TECHtalk

Microsoft’s Windows, Office 365 advice for secure elections

Higher Ed
Microsoft has issued guidance and offered resources to help election officials and candidate campaigns to better protect their Windows and Office 365 systems.
Instructional Video6:51
IDG TECHtalk

How to safely erase data under Windows

Higher Ed
See how to save a data frame from R to Excel – with styling or multiple tabs. If you have a request for a future episode of Do More With R, leave a comment below.
Instructional Video11:25
Curated Video

CISSP®- Governance, Management, Standards, and Frameworks

Higher Ed
This video focuses on governance, management, standards, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Instructional Video4:15
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- Amazon Shared Security Model

Higher Ed
In this video, we'll learn about the Amazon shared security model. This clip is from the chapter "Security" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".You will learn about security here. It includes...
Instructional Video3:09
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Designing security into our software

Higher Ed
CISM Domain 1: Information Security Governance: Designing security into our software This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security...
Instructional Video4:22
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Why you should want to get CISM certified.

Higher Ed
Introduction: Why you should want to get CISM certified. This clip is from the chapter "Introduction" of the series "CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019".In this section, learn why you want...
Instructional Video5:22
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Other Layer 2 Attacks

Higher Ed
Layer 2 of the OSI model (Data Link layer) accessing network media and addressing using MAC addresses. MAC address flooding attacks and broadcast storms can be mitigated with network switches configuring with BPDU and STP. This clip is...
Instructional Video16:23
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Windows Command-Line Tools

Higher Ed
Security technicians must be comfortable with Windows commands for standard maintenance and security tasks using commands such as ping, netstat, and icalcs. This clip is from the chapter "Tools of the Trade" of the series "CompTIA...
Instructional Video11:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Linux Shells

Higher Ed
A Linux shell is a case-sensitive command line environment that supports scripting and comes in various flavors including Bash, Korn, and C shells. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+...
Instructional Video19:23
The Wall Street Journal

Shifting Alliances

Higher Ed
When a longtime U.S. ally starts looking toward China, what lessons can be drawn, and what does it say about U.S. influence regionally?
Instructional Video20:47
The Wall Street Journal

Cloud: How To Manage The Risks

Higher Ed
Sameer Malhotra, CEO and Founder, TrueFort Inc. and Patty Smith, VP and CISO, Cox Automotive look at how companies who rely on the cloud can strengthen their cybersecurity.
Instructional Video4:09
The Business Professor

Automatic Stay of Proceedings in Bankruptcy

Higher Ed
This video explains the stay of proceeding power granted to debtors in possession under Section 362 of the Bankruptcy Code. The teacher also discusses the criteria for seeking relief from the stay and exceptions for certain types of...
Instructional Video5:54
IDG TECHtalk

How to and why you should disable LLMNR with Windows Server

Higher Ed
Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.
Instructional Video9:10
Curated Video

CISSP®- Information Security Governance: Values, Vision, Mission, and Plans

Higher Ed
This video focuses on values, vision, mission, and plans. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
Instructional Video24:35
IDG TECHtalk

What's ahead for cybersecurity in 2019: TECH(talk)

Higher Ed
J.M. Porup, senior writer at CSO online, joins Juliet on this week's episode of TECH(talk) to discuss trends in ransomware, IoT security and enterprise cybersecurity roles.
Instructional Video4:23
IDG TECHtalk

How to securely prepare for Adobe Flash end of life on Windows 10

Higher Ed
Microsoft will soon discontinue support for Adobe Flash. Here’s how to transition to secure alternatives while blocking unsafe use of Flash.