Instructional Video6:23
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing Network Access

Higher Ed
Securing networks restricts access to the network while securing services on the network. 802.1x network edge devices can limit network access. Rogue DHCP servers can be mitigated with DHCP snooping configurations. Secure remote server...
Instructional Video8:02
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Protocol Analyzers

Higher Ed
Network traffic can be captured, saved, and analyzed using a properly placed hardware or software network protocol analyzer such as the free Wireshark tool. Capture analysis can result in identifying indicators of compromise or the use...
Instructional Video5:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Wiping Disks with the dd Command Lab

Higher Ed
When storage media has reached the end of its useful life, data must be wiped from it in a secure manner which can include using some built-in operating system tools. Linux administrators can use the dd command to wipe disk partitions...
Instructional Video13:52
IDG TECHtalk

Is end-to-end encryption for videoconferencing important?

Higher Ed
More people are relying on videoconferencing software to do their jobs and chat with friends and family. This uptick in use highlighted some security concerns like “Zoombombing” and the lack of end-to-end encryption in popular...
Instructional Video3:33
IDG TECHtalk

Reviewing software risks on your Windows network

Higher Ed
Set aside some time to inventory and analyze the software and settings on your network to identify risks.
Instructional Video6:28
IDG TECHtalk

Most common cyberattack techniques of 2020

Higher Ed
Research on the most common techniques attackers used to breach systems provides insight on where to focus your defenses.
Instructional Video4:35
IDG TECHtalk

Tips for conducting effective phishing simulations

Higher Ed
Poorly executed phishing simulations can send the wrong message to employees. Here’s how to do it right.
Instructional Video4:19
IDG TECHtalk

How to manage and secure administrator accounts

Higher Ed
Administrator accounts have wide access to data and systems. Here’s how to protect them from abuse or compromise.
Instructional Video4:03
IDG TECHtalk

How to enable and configure Office 365 logging and auditing

Higher Ed
Make sure Microsoft Office 365 logging and auditing is set up properly so forensic data is available when needed.
Instructional Video2:45
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- Amazon Compliance Programs and AWS Artifact

Higher Ed
In this video, we'll learn about Amazon compliance programs and AWS Artifact.
r/>
This clip is from the chapter "Security" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".You will learn about...
Instructional Video17:55
IDG TECHtalk

Your best defense against insider threats | TECH(talk)

Higher Ed
When employees are your weakest link, companies must have programs in place to prevent them from accidentally or intentionally putting the organization at risk. Watch as TECHtalk hosts Ken Mingis and Juliet Beauchamp discuss various...
Instructional Video4:23
Sustainable Business Consulting

Physical Threats

Higher Ed
How to asses physical threats to your company from climate change and social unrest; how business sustainability can help reduce these threats
Instructional Video4:13
Curated Video

Learning ASP.NET Web API (Video 20)

Higher Ed
Revolutionary changes in the mobile world introduced various type of devices such as smart phones, tablets, and IoT devices, all connected to a network based on a HTTP protocol and HTML 5. This lead to a big push to build...
Instructional Video19:15
The Wall Street Journal

When Tech Meets the Surveillance State

Higher Ed
Human Rights Watch's Sophie Richardson discusses the dark side of China's use of cutting-edge surveillance technology with WSJ Editor Josh Chin.
Instructional Video32:44
IDG TECHtalk

How Pixel users can get the most out of Android 12, plus Android considerations for enterprise users

Higher Ed
By rolling out some Android 12 features exclusively to Pixel users, Google gave itself an opportunity to further differentiate its own devices from the rest of the Android pack. New updates, like the Material You interface, give Pixel...
Instructional Video28:57
IDG TECHtalk

What Windows 11 means for the enterprise

Higher Ed
Microsoft announced Windows 11 two weeks ago, and rollout is expected to begin later this year. This announcement came as a surprise, since Microsoft previously said Windows 10 would be the last version of Windows. While there's a...
Instructional Video4:17
IDG TECHtalk

How to find Windows security setup resources

Higher Ed
Find security scripts, compliance and other Windows resources.
Instructional Video2:16
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 4 Ask Me Anything (AMA)

Higher Ed
Malware is malicious software that comes in many different shapes and sizes. This episode tackles examples of malicious code and how it related to Visual Basic for Applications (VBA).
r/>
This clip is from the chapter "Tools of...
Instructional Video5:55
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Policies, procedures, guidelines, and frameworks

Higher Ed
CISM Domain 1: Information Security Governance: Policies, procedures, guidelines, and frameworks
r/>
This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1:...
Instructional Video1:47
Curated Video

5G and Wireless Communication for Beginners - Issues of 1G

Higher Ed
This video explains the issues with respect to 1G.
r/>
This clip is from the chapter "Introduction – 1G is Where All of it Began" of the series "5G and Wireless Communication for Beginners".This section provides an introduction...
Instructional Video3:55
Curated Video

Learning Python Web Penetration Testing (Video 30)

Higher Ed
With the huge growth in the number of web applications in the recent times, there has also been an upsurge in the need to make these applications secure. Web penetration testing is the use of tools and code to attack a website or...
Instructional Video6:24
Mediacorp

Women's Safety in Delhi: A Glimpse of Hope and the Cost of Change

12th - Higher Ed
This video transcript highlights the story of a brave woman in Delhi who works as a cab driver at night to ensure the safety of women traveling alone. It sheds light on the issue of women's security in India, particularly in the...
Instructional Video20:03
The Wall Street Journal

Case Study: Hong Kong and Carrie Lam

Higher Ed
Hong Kong chief executive discusses the future of business in Hong Kong and China's impact.
Instructional Video26:08
IDG TECHtalk

Windows 11 overview: Hardware requirements, security updates and upgrade confusion

Higher Ed
Microsoft will launch Windows 11 on October 5, but not every PC will be eligible for an immediate upgrade. Rollout will last well into 2022 for machines that meet the necessary hardware requirements, and Windows 10 will be supported...