Instructional Video8:22
SciShow

How Hackers Hack, and How To Stop Them

12th - Higher Ed
Hacking is tough, but stopping hackers can be even tougher.
Instructional Video5:44
Curated Video

Cisco CCNA 200-301: The Complete Guide to Getting Certified - A (Very) Basic Introduction to Networking

Higher Ed
New ReviewIn this video, get an overview of basic networking principles, laying the groundwork for more advanced topics.
Instructional Video14:10
Curated Video

Cisco CCNA 200-301: The Complete Guide to Getting Certified - Virtualizing Network Devices

Higher Ed
New ReviewIn this video, learn about virtualizing network devices, such as firewalls and routers, to enhance flexibility and reduce hardware costs.
Instructional Video5:17
Curated Video

Cisco CCNA 200-301: The Complete Guide to Getting Certified - Remote Access VPN Virtual Private Networks

Higher Ed
New ReviewIn this video, explore remote access VPNs, allowing individual users to securely connect to a private network.
Instructional Video5:57
Curated Video

Becoming a Cyber Security Professional - A Beginner's Career Guide - Soft Skills – Part 2

Higher Ed
New ReviewThis video continues from where we left off in the previous and talks about how to communicate effectively and why it is so important to be able to communicate effectively.
Instructional Video5:20
Curated Video

Complete Linux Training Course to Get Your Dream IT Job - Difference Between CentOS/RHEL 7 and 8

Higher Ed
New ReviewStay current with the new features and differences between CentOS/RHEL 7 and 8, preparing for the future of Linux administration.
Instructional Video6:02
Curated Video

Deus Ex: Human Revolution Walkthrough Part 2 - Introduction

9th - Higher Ed
Howcast - Check out part 2 of this walkthrough for this action RPG Deus Ex: Human Revolution and beat the introduction with this online demo.
Instructional Video1:26
Curated Video

What Is Port Forwarding?

9th - Higher Ed
Howcast - Learn what port forwarding is from computer expert Yoav Erez in this Howcast video about wireless network technology.
Instructional Video1:40
Curated Video

How to Get a VPN Connection

9th - Higher Ed
Especially for small businesses with remote employees, setting up a virtual private network (VPN) connection can protect your sensitive communications against cyber-security threats.
Instructional Video14:50
Curated Video

Protecting networks from security threats

Pre-K - Higher Ed
Pupil outcome: I can compare threats to the security of a computer system and suggest protective actions to take. Key learning points: - Threats to security can be compared by likelihood and impact. - Protective measures are used to make...
Instructional Video8:53
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Anatomy of a Social Engineering Attack

Higher Ed
This video will examine hackers' process of creating an attack using the social engineering technique.
Instructional Video8:37
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Choosing the Right Antivirus Software

Higher Ed
This video explains the various kinds of antiviruses available with examples available in the market and lets you decide what is best for your system.
Instructional Video0:57
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Conclusion

Higher Ed
Here, we will hear from the author about his thoughts on completing this course and a cursory outline of what you have learned.
Instructional Video2:10
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Hardening - Randomizing the MAC Address

Higher Ed
Another step of hardening the Windows 10 OS is randomizing the MAC address, which is usually a unique number for each PC.
Instructional Video2:43
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Hardening - Enabling the Smart Screen Filter

Higher Ed
Here, we will look at the next step in hardening the Windows 10 OS using smart screen filtering to enhance the protection of your OS.
Instructional Video2:25
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Hardening - The Windows 10 Firewall

Higher Ed
Here, we will understand a firewall, how it works, and how it can protect the Windows 10 OS.
Instructional Video3:46
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Peer Updates

Higher Ed
This video illustrates how the privacy of Windows 10 OS can be improved by turning off the peer updates features from other computers, especially where the internet is unreliable.
Instructional Video3:16
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Location Tracking

Higher Ed
Here, we will look at how location tracking works on our systems and networks and how we can prevent systems from knowing our location to prevent being hacked.
Instructional Video3:26
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Restricting Cortana

Higher Ed
In this video, we will understand how Cortana works and how to limit the amount of information it collects, to prevent the data from being shared through trackers.
Instructional Video2:33
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Ad Tracking

Higher Ed
This video illustrates a few tricks and tips to improve the privacy of the Windows 10 operating system. You will learn how to turn off ad tracking and prevent being tracked.
Instructional Video4:25
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Patching and Updates

Higher Ed
This video demonstrates how applying Windows safety patches and updates is essential in constantly keeping the system safe and how to use these patches and updates.
Instructional Video7:28
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Scam Email Live Example

Higher Ed
In this video, we will look at the various examples of scam emails that bombard your inbox from time to time and how they can be dangerous if the information is passed on to unknown people.
Instructional Video5:16
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Phishing Attacks

Higher Ed
Here, we will understand the concepts of phishing, how the attack is performed, the dangers of opening phishing emails, and how to prevent them.
Instructional Video4:15
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introducing Proton Email

Higher Ed
This video illustrates the Proton email and its features and advantages, safety, and disadvantages.