IDG TECHtalk
Best practices for secure work-from-home VPN connections
As more employees work from home, it’s important to review your VPN settings and following the best guidance.
IDG TECHtalk
3 easy ways to make your Windows network harder to hack
Start the new year off by eliminating common paths for attackers to breach your network.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 8 Ask Me Anything (AMA)
Virtual machines, often referred to as instances, are widely used both on-premises and in the cloud. This episode tackles issues related to being aware of deployed instances in the interest of reducing the attack surface. This clip is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Python Scripts
Python is a multi-platform case-sensitive scripting language that requires a Python interpreter to be installed. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+ Certification SY0-601: The Total...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Scanning with Nmap
Nmap is the most commonly used network scanning tool. Scans can be saved as XML files. Nmap can be used at the command line, but it also has a frontend GUI named Zenmap. This clip is from the chapter "Tools of the Trade" of the series...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 2 Exam Question Review
Protecting sensitive data can be done using many techniques. In this episode, the viewer is tested on the best security control for a given scenario. This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Attacks
In this episode, Mike explains how encrypted information is at risk and explores ways to protect it. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section...
Curated Video
Apache Maven Beginner to Guru - Configuring Maven for Oracle Maven Repository
This video explains how to configure Maven for the Oracle Maven repository. This clip is from the chapter "Maven Repositories" of the series "Apache Maven: Beginner to Guru".This section provides an explanation of Maven repositories.
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Values, vision, and mission
CISM Domain 1: Information Security Governance: Values, vision, and mission This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security Governance Video...
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Introduction to this course!
Introduction: Introduction to this course! This clip is from the chapter "Introduction" of the series "CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019".In this section, learn why you want to get your...
Curated Video
5G and Wireless Communication for Beginners - Picking up the Right Call Recipient
This video demonstrates how the antenna discriminates between the intended recipient and other recipient who are covered in the range of antenna. This clip is from the chapter "Introduction – 1G is Where All of it Began" of the series...
Curated Video
Learning PHP 7 (Video 37)
PHP is back and is faster and more lightweight than ever. The world of web technology is seamlessly evolving, and PHP 7's simplicity and prowess addresses the requirements of current and future web and mobile application development....
Curated Video
RESTful Web API Design with Node.js (Video 19)
RESTful Web APIs allow developers to create unprecedented applications by leveraging the data on the Internet. Since JavaScript is the language of the web, building APIs using Node.js provides a seamless development experience on both...
IDG TECHtalk
How to mitigate the Microsoft MSHTML remote code execution zero-day
A new zero-day vulnerability allows attackers to gain network access through Microsoft 365 documents. Here’s how to stop it.
IDG TECHtalk
New Windows vulnerabilities underscore importance of network segmentation
The risk from two newly discovered Windows vulnerabilities could be mitigated if you’ve properly segmented your network. Here’s what you need to know.
IDG TECHtalk
How to protect your Windows network login credentials
Recent hacks show that attackers will search for network login credentials in many ways. Make them harder to get.