Instructional Video1:44
FuseSchool

Be safe online - the virtual school - IT for teachers in Africa

6th - Higher Ed
Learn how to protect yourself and your computer system when using the Internet.
Instructional Video8:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - ARP Cache Poisoning

Higher Ed
ARP is used to resolve an IP address to a 48-bit hexadecimal hardware MAC address. Attackers with network access can fraudulently send ARP updates to hosts in order to force network traffic through the attacker station.
r/>
...
Instructional Video6:35
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Diffie-Hellman

Higher Ed
Learn the Diffie-Hellman key exchange agreement and methods in this very complex algorithm.
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section...
Instructional Video1:49
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 12 Exam Question Review

Higher Ed
Penetration testing provides insight as to how secure an organization's physical and IT infrastructure really is. In this episode, a pen testing scenario is provided.
r/>
This clip is from the chapter "Testing Infrastructure"...
Instructional Video0:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Promo

Higher Ed
This video introduces you to the course and what it covers.
r/>
This clip is from the chapter "Risk Management" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces you to the course...
Instructional Video6:03
Packt

CompTIA Network+ Certification N10-007: The Total Course - What is Risk Management?

Higher Ed
This video explains the concept of risk management. This clip is from the chapter "Managing Risk" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn to work with risk management,...
Instructional Video1:11
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Domain 3 - What we covered

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Domain 3 - What we covered.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
Instructional Video4:38
The Business Professor

Securities Law - Explained

Higher Ed
US law regulates the purchase and sale of securities. These laws are generally enforced by the Securities and Exchange Commission. This video explains what are US Securities Laws and how do they work?
Instructional Video14:44
The Wall Street Journal

Pro-Perspective: Better Hiring And Awareness

Higher Ed
Christine Izuakor, Senior Manager, Global Strategy and Awareness, United Airlines gives a presentation on the challenges facing companies trying to make cybersecurity jobs attractive.
Instructional Video15:11
The Wall Street Journal

Cutting Through The Hype

Higher Ed
We are bombarded with new technologies touted as the next big thing in cyber. How do venture capitalists identify innovations with real promise?
Instructional Video20:21
IDG TECHtalk

5G, IoT, AI/ML and Wi-Fi 6: 2020 networking predictions

Higher Ed
IDC analyst and networking expert Brandon Butler joins Ken and Juliet to discuss networking trends, Wi-Fi versus 5G and how artificial intelligence and machine learning can simplify network management. They also discuss how enterprises...
Instructional Video25:21
IDG TECHtalk

What is shadow IT? And how to keep workers in the fold while working remotely

Higher Ed
IT admins have a hard enough time keeping employees on the technology straight-and-narrow in the best of times. It's even harder when a pandemic hits and everyone in the office scatters to work from home. IT strategist Ryan Faas joins...
Instructional Video14:09
IDG TECHtalk

Why new remote work policies attract hackers

Higher Ed
With widespread mandated work from home policies due to the coronavirus, many employees are working remotely for the first time. In some cases, employers had never intended their employees to be remote-only, and they may lack key work...
Instructional Video14:59
IDG TECHtalk

Apple pushes further into financial services with its card | TECH(talk)

Higher Ed
It already had the Apple Wallet, then Apple Pay. And coming this summer is the Apple Card, a credit card that could help Apple tie itself even tighter to the financial services industry – and to its customers.
Instructional Video3:38
IDG TECHtalk

How to tweak Windows logs to better investigate attacks

Higher Ed
Default Windows event log settings won’t give you all the information you need to investigate security incidents. Here’s how to get the info you need.
Instructional Video3:30
IDG TECHtalk

How to set up security in Office 365 to CIS recommendations

Higher Ed
Following the Center for Internet Security’s benchmarks and checklists, here’s how to configure Microsoft Office 365 for the security level you need.
Instructional Video1:43
The Business Professor

Damages Available per Rule 10b5 Action

Higher Ed
Damages Available per Rule 10b5 Action
Instructional Video27:25
The Wall Street Journal

How to Protect Open Source Software

Higher Ed
Hear from Mike Hanley, chief security officer at GitHub, on how cyber professionals can protect their organizations from the Log4j vulnerability in open-source software.
Instructional Video2:34
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Smartphone Hardening Lab

Higher Ed
Smartphones are small computers that almost everybody carries around with them. Many standard desktop computers hardening techniques can be applied to smartphones. This clip is from the chapter "Securing Dedicated Systems" of the series...
Instructional Video6:02
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Honeypots

Higher Ed
How can malicious attacker and malware activity be monitored without allowing the compromise of production systems? Honeypots are fake decoy systems designed to attract malicious activity for the purpose of logging and tracing...
Instructional Video9:00
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Vulnerability Assessments

Higher Ed
This episode discusses how to use tools to identify security flaws on hosts or for a specific application. Topics include credential vs non-credential scans and keeping the vulnerability database up to date.
r/>
This clip is...
Instructional Video2:28
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 10 Exam Question Review

Higher Ed
IT systems are greatly affected by physical security. This episode presents a scenario in which only some security controls effectively mitigate a security problem.
r/>
This clip is from the chapter "Physical Security" of the...
Instructional Video2:00
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Domain 3 - What we will be covering

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Domain 7 - What we will be covering.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3:...
Instructional Video4:43
Curated Video

AWS Certified Solutions Architect Associate (SAA-C02) Exam Prep Course - Advantages of the Multi-Tier Design

Higher Ed
This video introduces you to the advantages of multi-tier design.
r/>
This clip is from the chapter "Resilient Architectures" of the series "AWS Certified Solutions Architect Associate (SAA-C02) Exam Prep Course".This section...