Instructional Video10:43
Curated Video

CISSP®- Risk - Attackers and Types of Attacks - Part 2

Higher Ed
This is the second part of a two-part video that explains risk attackers and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Instructional Video24:23
The Wall Street Journal

The Year in Hacks

Higher Ed
Andy Ellis, chief security officer at Akamai and Siobhan Gorman, partner, Cybersecurity and Privacy at Brunswick Group, dissect some of the biggest hacks of the past year.
Instructional Video2:19
Next Animation Studio

Japanese court sentences Yakuza boss to death

12th - Higher Ed
After the sentencing, Yakuza boss Satoru Nomura told the judge: ‘You will regret this for the rest of your life.’
Instructional Video2:31
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Grey-Box Adversarial with Example

Higher Ed
From the section: Testing Image Classification.In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one category of...
Instructional Video6:19
Curated Video

Bug Bounty Program Certification 10.4: Components of the Android App Bug Bounty Program

Higher Ed
In this video, you will get Information about Android app components. • Learn about various components of Android app bug bounty program • Explore various vulnerabilities in android machines • Learn about reward on the basis of level of...
Instructional Video2:33
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : White-Box Adversarial with Example

Higher Ed
From the section: Testing Image Classification.In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one category of...
Instructional Video3:52
Packt

Explain the negative impacts of artificial intelligence systems on society : Adversarial Attacks Metrics and White-Box Adversarial Attacks

Higher Ed
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Instructional Video11:19
Weird History

The Matawan Maneater

12th - Higher Ed
The Jersey Shore shark attacks of 1916 were so unexpected, sudden, and violent that they stuck in the public's mind even up to the point that the movie hit theaters. The "Matawan man-eater," as the shark was called, took down at least...
Instructional Video10:19
Weird History

What Is It Like In A Presidential Nuclear Bunker

12th - Higher Ed
The US government seems to know far too much about its citizens, so it's disturbing to realize how little citizens know about the governing body. Learning what happens inside presidential bunkers and where the president would go during a...
Instructional Video9:19
Curated Video

CISSP®- Risk - Attackers and Types of Attacks - Part 1

Higher Ed
This is the first part of the two-part video that explains risk attackers and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Instructional Video20:48
The Wall Street Journal

What Cyber Chiefs Can Learn from the Ukraine War

Higher Ed
Hear what Russia’s invasion of Ukraine is teaching us about the risks to energy production and infrastructure, as well as important takeaways for cyber chiefs on how they should respond to the war.
Instructional Video13:32
The Wall Street Journal

Cyber State of the Nation

Higher Ed
WSJ Pro's Research Senior Manager David Breg shares insights from a study measuring cybersecurity preparedness across the business community.
Instructional Video2:32
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Black-Box Adversarial with Example

Higher Ed
From the section: Testing Image Classification.In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one category of...
Instructional Video2:28
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 10 Exam Question Review

Higher Ed
IT systems are greatly affected by physical security. This episode presents a scenario in which only some security controls effectively mitigate a security problem. This clip is from the chapter "Physical Security" of the series "CompTIA...
Instructional Video28:03
The Wall Street Journal

When Hackers Strike What Do I Do?

Higher Ed
What actions can a business be taking once they suffer a data breach?
Instructional Video1:05
Barcroft Media

Lion Attacks Elephant: Brutal Kill Caught On Camera

Higher Ed
HWANGE NATIONAL PARK, ZIMBABWE - UNDATED: THIS is the moment a powerful lion took down an African elephant - by itself. The juvenile male, estimated to be seven years old, was caught alone as it quenched its thirst at a watering hole....
Instructional Video14:38
IDG TECHtalk

How Russia’s invasion of Ukraine affected the cyber threat landscape

Higher Ed
Since Russia’s invasion of Ukraine last month and consequential sanctions against the Kremlin, the threat of cyberattacks in the United States and abroad has been looming. While the threat of attacks on critical infrastructure has...
Instructional Video8:52
Catalyst University

👂 Ménière’s Disease | Presentation, Pathophysiology, Diagnosis & Treatment

Higher Ed
In this video, we explore Ménière’s Disease: its prevalence, pathophysiology, progression, diagnosis, and treatment.
Instructional Video4:29
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Warfare, terrorism, sabotage, and ransomware

Higher Ed
CISM Domain 1: Information Security Governance: Warfare, terrorism, sabotage, and ransomware This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security...
Instructional Video3:33
Jabzy

Cuban Revolution - 3 Minute History

12th - Higher Ed
In this video, Jabzy brings us historical tidbits and unknown facts about the Cuban Revolution
Instructional Video11:21
Weird History

The Matawan Maneater | The Inspiration for Jaws

12th - Higher Ed
There's no denying that the movie Jaws definitely made some beach-goers scared to go into the water. However, the story that inspired Jaws was what really had people scared to have a day at the beach. The Jersey Shore shark attacks of...
Instructional Video3:40
IDG TECHtalk

How to set up Edge Chromium security options

Higher Ed
Edge Chromium can provide more protection for organizations that use older versions of Windows.
Instructional Video10:38
Weird History

The Worst Shark Attach In History

12th - Higher Ed
If you've seen Jaws, then you know the basics about the tragic descent of the USS Indianapolis. Considered one of the most grievous disasters in the history of the American Navy, it saw the sinking of a US heavy cruiser towards the end...
Instructional Video18:05
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Hacking Terminology

Higher Ed
This video teaches you the terminology used in hacking. This clip is from the chapter "Networking Tools and Essential Terminology" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn...