Instructional Video4:49
IDG TECHtalk

Security considerations for remote workers

Higher Ed
Companies that are scrambling to support remote workers in the wake of the COVID-19 crisis need to address these security concerns.
Instructional Video32:06
IDG TECHtalk

Mars Perseverance rover landing: How IT supports NASA and JPL’s Mars 2020 mission

Higher Ed
Last month, the Perseverance rover successfully landed on Mars following a six-and-half-month journey from Earth through space. Over the next Martian year (or, over 600 days here on Earth), the rover will search for signs of ancient...
Instructional Video2:17
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 9 Ask Me Anything (AMA)

Higher Ed
Some IT solutions are dedicated to serving specific functions. In this episode, Mike discusses the security aspect of using Zigbee devices. This clip is from the chapter "Securing Dedicated Systems" of the series "CompTIA Security+...
Instructional Video10:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Hardening

Higher Ed
There are many options for securing Wi-Fi networks. Disabling items such as WLAN name broadcast, DHCP, and public network management are the first consideration. Using WPA3 enterprise mode and changing default settings also help harden...
Instructional Video3:39
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Public Key Infrastructure

Higher Ed
In this episode, Mike discusses Public Key Infrastructure (PKI), used to enable commerce and other secure activities over the Internet. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601:...
Instructional Video2:03
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 11 Ask Me Anything (AMA)

Higher Ed
Securing web applications involves not only IT administrators but also software developers. In this episode, Mike provides a distinction between input validation and input sanitization. This clip is from the chapter "Securing Dedicated...
Instructional Video9:26
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Physical security part 2

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Physical security part 2. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Instructional Video10:53
Curated Video

Active Directory with Windows Server 2016 - Managing Groups

Higher Ed
This video teaches you how to manage group creation and maintenance using Active Directory Users and Computers, and the alternative PowerShell commands. You’ll then tour the settings to manage users within a group. This clip is from the...
Instructional Video14:02
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Virtualization

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Virtualization. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
Instructional Video3:33
Curated Video

Learning PHP 7 (Video 25)

Higher Ed
PHP is back and is faster and more lightweight than ever. The world of web technology is seamlessly evolving, and PHP 7's simplicity and prowess addresses the requirements of current and future web and mobile application development....
Instructional Video4:01
Curated Video

Learning PHP 7 (Video 22)

Higher Ed
PHP is back and is faster and more lightweight than ever. The world of web technology is seamlessly evolving, and PHP 7's simplicity and prowess addresses the requirements of current and future web and mobile application development....
Instructional Video5:23
Blockchain Central

What Is a DAO?

Higher Ed
This week on Blockchain Central: we will take a look at decentralized autonomous organizations, their benefits, downsides and security issues.
Instructional Video4:16
Curated Video

Learning PHP 7 (Video 19)

Higher Ed
PHP is back and is faster and more lightweight than ever. The world of web technology is seamlessly evolving, and PHP 7's simplicity and prowess addresses the requirements of current and future web and mobile application development....
Instructional Video2:00
Seven Dimensions

Navigating Workplace Harassment: Setting Boundaries and Reporting Incidents

Higher Ed
#MeToo abuses are still occurring every day. Retired police detective Colin McLaren and Eve Ash discuss the importance of having strong safety policies, as well as reducing vulnerability through refusing and reporting unwanted advances.
Instructional Video25:18
The Wall Street Journal

Securing The Communications Frontier

Higher Ed
The Internet of Things is becoming a reality as goods ranging from cars to refrigerators are brought online. Now 5G promises to accelerate our smart lives, bringing with it new security capabilities but also risks.
Instructional Video10:10
The Wall Street Journal

Demo: Where Everybody Knows Your Face

Higher Ed
The latest facial recognition technology can predict your age and gender. But how accurate is it? WSJ Personal Technology Columnist Joanna Stern puts it to the test, with the help of Megvii Corporate Finance Director Tianyu Jiang, at the...
Instructional Video10:40
TLDR News

What is the EU's Ideal Brexit Deal? - Brexit Explained

12th - Higher Ed
A week ago the EU rejected Theresa May's plan for Brexit, the Chequers Deal. So now we ponder, what does the EU actually want in the Brexit deal? What kind of deal would they approve?
Instructional Video2:04
The Business Professor

Rule 506c - Securities Exemption

Higher Ed
Rule 506c - Securities Exemption
Instructional Video1:01
Curated Video

Section Intro: API Authentication and Security

Higher Ed
API Authentication and Security (Task App): Section Intro: API Authentication and Security This clip is from the chapter "API Authentication and Security (Task App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In...
Instructional Video5:08
IDG TECHtalk

Minimum vs. best Windows network security practices

Higher Ed
Before you worry about implementing the “best” security practices, make sure you’re doing these minimum practices.
Instructional Video3:07
IDG TECHtalk

What is edge computing?

Higher Ed
Edge computing is what it sounds like: computing that takes place at the edge of corporate networks, with “the edge” being defined as the place where end devices access the rest of the network – things like phones, laptops, industrial...
Instructional Video4:56
IDG TECHtalk

How to mitigate risk from nation-state attacks

Higher Ed
The recent SolarWinds attack underscores the danger many companies face from nation-state actors. Here’s how to prepare your Windows networks from the threat.
Instructional Video3:48
IDG TECHtalk

How to better manage your domain passwords

Higher Ed
Follow this advice to help prevent domain password compromise or lateral movement should your password be compromised.
Instructional Video5:12
IDG TECHtalk

How to use Attack Surface Reduction Rules in Windows 10

Higher Ed
These new rules, part of Windows Defender, can help prevent damage from phishing and other attacks.