Instructional Video10:16
SciShow

5 Devastating Security Flaws You've Never Heard Of

12th - Higher Ed
Devastating vulnerabilities are hiding in the technology in programs, protocols, and hardware all around us. Most of the time, you can find ways to protect yourself.
Instructional Video17:22
TED Talks

TED: Everyday cybercrime -- and what you can do about it | James Lyne

12th - Higher Ed
* Viewer discretion advised. This video includes discussion of mature topics and may be inappropriate for some audiences. How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank...
Instructional Video5:39
SciShow

Why Was the WannaCry Attack Such a Big Deal?

12th - Higher Ed
On Friday, May 12th, 2017, the ransomware program WannaCry started spreading to computers all over the world at an alarming rate. A couple days later, it was basically completely contained with very little damage done. So what happened?
Instructional Video10:17
SciShow

5 More Computer Viruses You Really Don't Want to Get

12th - Higher Ed
From taking your files ransom to foiling uranium enrichment, here are five more computer viruses that you really want to avoid.
Instructional Video10:15
SciShow

5 Devastating Security Flaws You've Never Heard Of

12th - Higher Ed
Devastating vulnerabilities are hiding in the technology in programs, protocols, and hardware all around us. Most of the time, you can find ways to protect yourself.
Instructional Video6:01
SciShow

How Meltdown and Spectre Make Your Computer Vulnerable

12th - Higher Ed
Another year, another security breach that could expose all of your information. Installing updates might be a good New Year's resolution.
Instructional Video11:57
Crash Course

Cybersecurity: Crash Course Computer Science

12th - Higher Ed
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use...
Instructional Video1:06
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Conclusion

Higher Ed
New ReviewThis video concludes with a recapitulation of the course and a brief refreshing of the concepts learned.
Instructional Video2:32
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - The Sony Hack

Higher Ed
New ReviewLet's talk about the greatest cyber-attacks against a company.
Instructional Video4:35
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - The Colonial Pipeline Attack

Higher Ed
New ReviewIn this lesson, we will look at the colonial pipeline attack that happened on April 29, 2021, when the gas line was shut down, causing a gas shortage in the US.
Instructional Video3:28
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Stuxnet and the Attack Against Iran

Higher Ed
New ReviewHere, we talk about the arguably most potent attack on a country's infrastructure, the Stuxnet attack in 2010 against Iran.
Instructional Video6:30
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - The Attack Against Estonia

Higher Ed
New ReviewThis video elaborates on the first-ever cyber-attack performed over a country's infrastructure in 2006.
Instructional Video2:25
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Introduction to Cyber Warfare

Higher Ed
New ReviewThis brief video outlines cyber warfare, how it is a reality in this era, and how it can damage systems and networks in an organization and harm companies.
Instructional Video2:02
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - The Weakest Link and the Disgruntled Employee

Higher Ed
New ReviewIn this lesson, we will look at the factors that can cause a cyber-attack, including the weakest link and the disgruntled employee in any organization, that could harm cyber security.
Instructional Video3:08
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Security Versus Ease of Access Paradox

Higher Ed
New ReviewHere, you will learn about striking a balance between ease of access and security to work on the systems and how well-protected a computer or network is.
Instructional Video6:16
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - A Sample BYOD Policy

Higher Ed
New ReviewIn this video, we will examine a sample "bring your own device" policy used in an organization, the company's consent, and employees.
Instructional Video3:06
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - BYOD Management

Higher Ed
New ReviewThis lesson discusses in detail "bring your own device" to your workplace to minimize cyber-attacks with the security system installed in your system per your liking.
Instructional Video3:47
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Cyber Security Policies

Higher Ed
New ReviewIn this video, we will determine various cyber security policies available at a workplace and the ones that best suit an organization based on the processes involved.
Instructional Video10:39
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Password Management

Higher Ed
New ReviewIn this video, we will talk about the oldest system of safety, called passwords. We will discuss how to create passwords that are difficult to crack easily. We will look at a passphrase and how it is used to create passwords.
Instructional Video7:13
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Ransomware

Higher Ed
New ReviewThis video will look at the worst kind of malware, ransomware a type of malicious software that encrypts a victim's data, rendering it inaccessible until a ransom is paid to the attackers.
Instructional Video4:49
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Trojans

Higher Ed
New ReviewIn this video, you will learn about the malicious software called trojans and how they operate. We will also look at how to eradicate trojans.
Instructional Video4:52
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Viruses and Worms

Higher Ed
New ReviewThis video will look at the first kind of malicious code or malware, viruses, and worms that can attack computer and network systems.
Instructional Video7:56
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Supply Chain Attacks

Higher Ed
New ReviewWe will look at the concept of supply chain attacks, delving into their methods of compromise and potential consequences, preventive measures to enhance cybersecurity and safeguard against such attacks.
Instructional Video6:04
Curated Video

The Absolute Beginners Guide to Cyber Security 2023 - Part 1 - Phishing - Part 2

Higher Ed
New ReviewIn this video, the author explains the concept of Phishing in more detail with live examples and demonstrations.