Instructional Video5:25
IDG TECHtalk

Microsoft’s Windows, Office 365 advice for secure elections

Higher Ed
Microsoft has issued guidance and offered resources to help election officials and candidate campaigns to better protect their Windows and Office 365 systems.
Instructional Video5:22
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Other Layer 2 Attacks

Higher Ed
Layer 2 of the OSI model (Data Link layer) accessing network media and addressing using MAC addresses. MAC address flooding attacks and broadcast storms can be mitigated with network switches configuring with BPDU and STP. This clip is...
Instructional Video4:49
IDG TECHtalk

Security considerations for remote workers

Higher Ed
Companies that are scrambling to support remote workers in the wake of the COVID-19 crisis need to address these security concerns.
Instructional Video4:56
IDG TECHtalk

How to mitigate risk from nation-state attacks

Higher Ed
The recent SolarWinds attack underscores the danger many companies face from nation-state actors. Here’s how to prepare your Windows networks from the threat.
Instructional Video13:01
IDG TECHtalk

What do recent public SAP exploits mean for enterprises? | TECH(talk)

Higher Ed
Recently released public SAP exploits (dubbed 10KBLAZE) could pose a security risk for thousands of businesses. Computerworld executive editor Ken Mingis and CSO Online's Lucian Constantin discuss the fallout of 10KBLAZE, and how...
Instructional Video5:32
IDG TECHtalk

How to mitigate the Microsoft MSHTML remote code execution zero-day

Higher Ed
A new zero-day vulnerability allows attackers to gain network access through Microsoft 365 documents. Here’s how to stop it.
Instructional Video6:38
IDG TECHtalk

New Windows vulnerabilities underscore importance of network segmentation

Higher Ed
The risk from two newly discovered Windows vulnerabilities could be mitigated if you’ve properly segmented your network. Here’s what you need to know.
Instructional Video6:00
IDG TECHtalk

How attackers exploit the COVID crisis to compromise your network

Higher Ed
Targeted phishing attempts and updated malware are creating havoc for Windows admins in a hard time. Here are some tips to minimize the damage.
Instructional Video5:09
IDG TECHtalk

How to prevent data loss on your network

Higher Ed
Use these tools and techniques to protect important data from being exfiltrated from your Windows network.
Instructional Video5:25
Curated Video

The Plight of Sharks: Misconceptions and Conservation Efforts

Pre-K - Higher Ed
This video explores the negative perception of sharks and highlights the misconceptions surrounding them. It discusses the rarity of shark attacks on humans and the detrimental effects of shark fishing, particularly for shark fin soup....
Instructional Video11:56
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - The CIA triad

Higher Ed
CISM Domain 1: Information Security Governance: The CIA triad This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security Governance Video Boot Camp...
Instructional Video3:49
IDG TECHtalk

How to defend Office 365 from spear-phishing attacks

Higher Ed
Configure Office 365 to detect email-delivered malware.
Instructional Video5:18
Curated Video

Crocodilian Interaction with Ancient and Modern Humans

Pre-K - Higher Ed
This video explores the fascinating history and mythology surrounding crocodilians, shedding light on their cultural significance and the misconceptions that have surrounded them. It also delves into the threats they face today,...
Instructional Video4:58
IDG TECHtalk

How to fight scripting attacks

Higher Ed
Most phishing campaigns use links to malicious scripts that infect users’ devices. Here’s how to spot and prevent them from doing damage.
Instructional Video4:53
IDG TECHtalk

How an attacker can target phishing attacks

Higher Ed
There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you can...
Instructional Video4:43
ACDC Leadership

Deadweight Loss- Key Graphs of Microeconomics

12th - Higher Ed
My explanation of deadweight loss (aka. efficiency loss). Watch the bonus round to see multiple examples of dead weight loss. Please keep in mind that these clips are not designed to teach you the key concepts. These videos are a review...
Instructional Video4:21
IDG TECHtalk

Tips for finding signs of SolarWinds-type attacks in Active Directory

Higher Ed
The SolarWinds attackers used sophisticated techniques to steal admin credentials. Here’s what to look for in AD.
Instructional Video2:59
IDG TECHtalk

Top vulnerabilities used in attacks on Windows networks in 2020

Higher Ed
COVID has changed tactics that attackers use to compromise Windows networks. These are the vulnerabilities they now favor.
Instructional Video1:03
Next Animation Studio

Five dead in Norway after bow and arrow attack

12th - Higher Ed
A 37-year-old Danish man has been arrested in the Norwegian town of Kongsberg after killing five people and injuring two more using a bow and arrow, according to the BBC.
Instructional Video4:40
IDG TECHtalk

How to protect your network from OAuth-enabled cloud-based attacks

Higher Ed
Check your OAuth third-party authentication privileges in Microsoft 365 and Azure to prevent unauthorized access.
Instructional Video11:35
Curated Video

Bug Bounty Program Certification 13.3: Certification Exam Practice Questions – Part 2

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video8:35
Curated Video

Bug Bounty Program Certification 9.1: Find Bugs in Websites for Frontend Penetration

Higher Ed
In this video, you will learn about frontend vulnerability scanning using Acunetix. • Explore example of cross site scripting attack • Understand vulnerability Listing in Acunetix • Explore report generation using Acunetix
Instructional Video7:01
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Man In The Middle Attack - Ettercap Basics

Higher Ed
In this video, you'll learn the basics of the man in the middle attack. This clip is from the chapter "MITM Attacks (Man in the Middle)" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll...
Instructional Video2:56
Kult America

Ukrainian Parliament Altercations

Higher Ed
Have you ever noticed how many fist fights happen in the parliament of Ukraine? I was curious about the story behind them so here you have it - top 4 Ukrainian fist fights!