Instructional Video1:06
Next Animation Studio

Colombian cartel boss captured by security forces

12th - Higher Ed
Colombian security forces have arrested the country’s most wanted drug lord, Dairo Antonio Usuga, head of the country’s largest drug cartel, near his jungle hideout.
Instructional Video4:37
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - The Windows Command Line

Higher Ed
The Windows command line is spawned by cmd.exe. Security technicians can automate tasks using batch file scripts containing commands such as whoami and ipconfig. Powershell.exe can be spawned from a Windows command prompt in order to use...
Instructional Video15:57
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cryptography Basics

Higher Ed
Cryptography is the practice of disguising information in a way that looks random. This episode explores the history of cryptography and how it has evolved into the complex systems today. This clip is from the chapter "Cryptography" of...
Instructional Video2:57
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Physical Security Lab

Higher Ed
A full IT security audit always includes physical security. In this episode, physical security considerations are presented. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video18:26
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Information Security Governance: Policies, Procedures, Guidelines, and Frameworks

Higher Ed
This video focuses on policies, procedures, guidelines, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Instructional Video10:43
Curated Video

CISSP®- Risk - Attackers and Types of Attacks - Part 2

Higher Ed
This is the second part of a two-part video that explains risk attackers and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Instructional Video12:43
Curated Video

Master Java Web Services and REST API with Spring Boot- Step 18 - Implementing Security for SOAP Web Services with WS Security

Higher Ed
SOAP Web Services with Spring and Spring Boot: Step 18 - Implementing Security for SOAP Web Services with WS Security This clip is from the chapter "SOAP Web Services with Spring and Spring Boot" of the series "Master Java Web Services...
Instructional Video11:58
Seven Dimensions

Protecting Organizations: Preventing Crime and Violence at Work

Higher Ed
In this video, Colin McLaren, an expert in crime prevention, discusses the importance of proactive measures to protect organizations from crime and violence in the workplace. He emphasizes the need for strong policies and procedures, as...
Instructional Video25:29
The Wall Street Journal

What To Report

Higher Ed
Myrna Soto, Chief Operating Officer, Digital Hands tells us what a CISO should be reporting to the board, looking at what corporate stakeholders regard as the principles of reporting and the most useful information.
Instructional Video23:57
The Wall Street Journal

Force Multipliers

Higher Ed
How can technologies like edge and quantum computing and advanced automation be best deployed?
Instructional Video21:35
The Wall Street Journal

The 5G Sprint

Higher Ed
The ultrafast cellular networks that will enable autonomous vehicles and AI-driven applications are fast becoming a reality. Youngky Kim of Samsung Electronics and Simon Segars of ARM sit down with WSJ's Yun-Hee Kim.
Instructional Video6:08
Blockchain Central

5 Key Crypto Events of 2018 (Year Review)

Higher Ed
This week on Blockchain Central: we will have a look back at the most important crypto events from 2018, that have changed the entire course of the industry
Instructional Video19:50
The Wall Street Journal

Aparna Bawa On Zoom's Unpredictable Rise

Higher Ed
At WSJ Tech Live, Zoom's Chief Operating Officer Aparna Bawa discusses how the health crisis has reshaped Zoom's strategy to meet explosive demand.
Instructional Video16:43
IDG TECHtalk

What is a deepfake? How to prepare for and respond to this cyber attack

Higher Ed
As cyber criminals deploy more complex methods of hacking, using deepfakes to spread misinformation and “hack reality” have become more popular. This video, audio and/or text-based content is AI-generated and may be hard to discern from...
Instructional Video50:57
SWPictures

BATTLE FOR THE GULF - The 19th Province

12th - Higher Ed
The U.N. imposed sanctions and called on Saddam to withdraw from Kuwait. Instead he sent in over 300,000 soldiers. Kuwait's wealth was systematically plundered by the looting of houses to the ransacking of the Kuwait Central Bank. Some...
Instructional Video29:25
The Wall Street Journal

How Multinational Companies Run Global Cybersecurity Programs

Higher Ed
Michael McNeil of McKesson and Kevin Tierney of General Motors discuss how to manage global cybersecurity programs, and share their insights on the best ways to organize for security.
Instructional Video5:40
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Load Balancing

Higher Ed
Active/active and active/passive load balancing can efficiently route client application requests to backend servers. Load balancing improves application performance and resiliency to a single application server failure. This clip is...
Instructional Video11:39
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Security Assessment Tools

Higher Ed
Open-source and proprietary (paid) security assessment tools are used by security analysts and malicious actors; what differs is the reason they are being used. The scanless tool uses web sites to perform port scans while the hping3 tool...
Instructional Video9:39
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Business Continuity Planning - Part 1

Higher Ed
This is the first part of a two-part video that explains business continuity planning. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Instructional Video7:22
Curated Video

Active Directory with Windows Server 2016 - Introduction to Groups

Higher Ed
Walk through the processes to set up users in groups, and learn about the logical and physical considerations you’ll want to consider. You’ll work with groups for security management considerations and maintenance. This clip is from the...
Instructional Video19:34
The Wall Street Journal

Goodbye Passwords?

Higher Ed
New standards for authentication are emerging to take the place of passwords, with the promise of more security and less complexity. Explore how these will change interactions with customers and security access for employees.
Instructional Video21:32
The Wall Street Journal

The Cyber War Room

Higher Ed
CrowdStrike co-founder and CEO George Kurtz and Cloudflare co-founder and CEO Matthew Prince discuss the latest trends and threats in cybersecurity with WSJ Business Editor Jamie Heller at the WSJ D.Live conference in Laguna Beach, Calif.
Instructional Video33:14
The Wall Street Journal

Alphabet's Look Ahead with Company CEO, Sundar Pichai

Higher Ed
CEO of Google's parent Alphabet Inc., Sundar Pichai on technology regulation, looming antitrust challenges, cutting-edge technology bets and his views on hybrid work and the return to the physical office.
Instructional Video32:07
The Wall Street Journal

How Covid-19 Has Changed Cybersecurity

Higher Ed
Rockwell Automation's Dawn Cappelli and Mastercard's Anne Marie Zettlemoyer discuss how Covid-19 affected their own company's cybersecurity operations and the long-term effects of these changes.