Instructional Video5:47
IDG TECHtalk

Best practices for secure work-from-home VPN connections

Higher Ed
As more employees work from home, it’s important to review your VPN settings and following the best guidance.
Instructional Video4:54
IDG TECHtalk

3 easy ways to make your Windows network harder to hack

Higher Ed
Start the new year off by eliminating common paths for attackers to breach your network.
Instructional Video2:02
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 8 Ask Me Anything (AMA)

Higher Ed
Virtual machines, often referred to as instances, are widely used both on-premises and in the cloud. This episode tackles issues related to being aware of deployed instances in the interest of reducing the attack surface. This clip is...
Instructional Video7:25
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Python Scripts

Higher Ed
Python is a multi-platform case-sensitive scripting language that requires a Python interpreter to be installed. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+ Certification SY0-601: The Total...
Instructional Video8:59
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Scanning with Nmap

Higher Ed
Nmap is the most commonly used network scanning tool. Scans can be saved as XML files. Nmap can be used at the command line, but it also has a frontend GUI named Zenmap. This clip is from the chapter "Tools of the Trade" of the series...
Instructional Video2:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 2 Exam Question Review

Higher Ed
Protecting sensitive data can be done using many techniques. In this episode, the viewer is tested on the best security control for a given scenario. This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Instructional Video5:24
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Attacks

Higher Ed
In this episode, Mike explains how encrypted information is at risk and explores ways to protect it. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section...
Instructional Video7:53
Curated Video

Apache Maven Beginner to Guru - Configuring Maven for Oracle Maven Repository

Higher Ed
This video explains how to configure Maven for the Oracle Maven repository. This clip is from the chapter "Maven Repositories" of the series "Apache Maven: Beginner to Guru".This section provides an explanation of Maven repositories.
Instructional Video2:32
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Values, vision, and mission

Higher Ed
CISM Domain 1: Information Security Governance: Values, vision, and mission This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security Governance Video...
Instructional Video1:39
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Introduction to this course!

Higher Ed
Introduction: Introduction to this course! This clip is from the chapter "Introduction" of the series "CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019".In this section, learn why you want to get your...
Instructional Video7:03
Curated Video

5G and Wireless Communication for Beginners - Picking up the Right Call Recipient

Higher Ed
This video demonstrates how the antenna discriminates between the intended recipient and other recipient who are covered in the range of antenna. This clip is from the chapter "Introduction – 1G is Where All of it Began" of the series...
Instructional Video3:11
Curated Video

Learning PHP 7 (Video 37)

Higher Ed
PHP is back and is faster and more lightweight than ever. The world of web technology is seamlessly evolving, and PHP 7's simplicity and prowess addresses the requirements of current and future web and mobile application development....
Instructional Video3:45
Curated Video

RESTful Web API Design with Node.js (Video 19)

Higher Ed
RESTful Web APIs allow developers to create unprecedented applications by leveraging the data on the Internet. Since JavaScript is the language of the web, building APIs using Node.js provides a seamless development experience on both...
Instructional Video5:32
IDG TECHtalk

How to mitigate the Microsoft MSHTML remote code execution zero-day

Higher Ed
A new zero-day vulnerability allows attackers to gain network access through Microsoft 365 documents. Here’s how to stop it.
Instructional Video6:38
IDG TECHtalk

New Windows vulnerabilities underscore importance of network segmentation

Higher Ed
The risk from two newly discovered Windows vulnerabilities could be mitigated if you’ve properly segmented your network. Here’s what you need to know.
Instructional Video6:05
IDG TECHtalk

How to protect your Windows network login credentials

Higher Ed
Recent hacks show that attackers will search for network login credentials in many ways. Make them harder to get.