Curated Video
AWS Tutorial AWS Solutions Architect and SysOps Administrator - Create EFS
This video helps you create EFS. This clip is from the chapter "EFS - Managed Network File Storage for EC2" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section focuses on EFS - managed network file...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Virtual Private Networks (VPNs)
This video explains the concept of VPN, which enables remote clients to connect to a local network. This clip is from the chapter "Advanced Networking Devices" of the series "CompTIA Network+ Certification N10-007: The Total Course".In...
Curated Video
SSL Complete Guide 2021: HTTP to HTTPS - How TLS Session is Established
In this video, we'll learn how TLS session is established. This clip is from the chapter "SSL, TLS, and HTTPS" of the series "SSL Complete Guide 2021: HTTP to HTTPS".In this section, we'll learn about SSL, TLS, and HTTPS.
Curated Video
SSL Complete Guide 2021: HTTP to HTTPS - Encryption Key Generation by the Web Browser
In this video, we'll learn about encryption key generation by the web browser. This clip is from the chapter "SSL, TLS, and HTTPS" of the series "SSL Complete Guide 2021: HTTP to HTTPS".In this section, we'll learn about SSL, TLS, and...
Curated Video
Why some Canadian health data may be handed over to the U.S.
Data privacy experts warn that Canadian electronic health records may be at risk of being accessed and used by foreign entities, and say data is often controlled by U.S. companies. Dr. Kumanan Wilson, chief scientific officer at the...
Massachusetts Institute of Technology
Mit: Blossoms: Fabulous Building Cryptosystems
As part of this introduction to cryptography, students will build three devices and learn how to encrypt and decrypt messages. Video is accompanied by a teacher's guide, transcript, and other handouts, as well as links for learning more...
Massachusetts Institute of Technology
Mit: Blossoms: Building Cryptosystems
This video module presents an introduction to cryptography - the method of sending messages in such a way that only the intended recipients can understand them. In this very interactive lesson, students will build three different devices...
Crash Course
Crash Course Computer Science #33: Cryptography
This episode discusses how to keep information secret using cryptography. From as early as Julius Caesar's Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587; there has long been a need to encrypt...
Khan Academy
Khan Academy: Rsa Encryption: Step 1
This video explains why RSA, the public-key cryptosystem that is used for safe data transmission, is needed. This video lesson from Khan Academy is intended for students who are taking an introductory computer science course.
Other
Code.org: The Internet: Encryption & Public Keys
Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This educational video explains 256-bit encryption, public and private keys, SSL & TLS...
Science Friday Initiative
Science Friday: Rap Nerdy to Me
MC Frontalot and Dr. Awkward rap about data encryption, video games and the nerd life.
Khan Academy
Khan Academy: Encryption and Public Keys
Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This video explains 256-bit encryption, public and private keys, SSL & TLS and HTTPS....
Khan Academy
Khan Academy: Packets, Routers, and Reliability
Spotify engineer Lynn Root and Vint Cerf, Father of the Internet, explain how information on the Internet is broken down into packets, and how to ensure that information is reliably received. [6:25]
Khan Academy
Khan Academy: What Is Cryptography?
What is Cryptography? A story which takes us from Caesar to Claude Shannon. [1:31]
Khan Academy
Khan Academy: Bitcoin: Digital Signatures
This video is a high-level explanation of digital signature schemes, which are a fundamental building block in many cryptographic protocols. [9:46]
Khan Academy
Khan Academy: Bitcoin: Cryptographic Hash Functions
This video discusses what cryptographic hash functions are and what properties are desired of them. [10:13]
Khan Academy
Khan Academy: Perfect Secrecy
Claude Shannon's idea of perfect secrecy: no amount of computational power can help improve your ability to break the one-time pad.
Khan Academy
Khan Academy: Rsa Encryption: Step 2
This video shows the second step in setting up a trap-door function for RSA, the public-key cryptosystem that is used for safe data transmission. This video lesson from Khan Academy is intended for students who are taking an introductory...
Khan Academy
Khan Academy: Rsa Encryption: Step 4
This video shows the last step in setting up a trap-door function for RSA, the public-key cryptosystem that is used for safe data transmission. This video lesson from Khan Academy is intended for students who are taking an introductory...
Khan Academy
Khan Academy: Rsa Encryption: Step 3
This video shows the third step in setting up a trap-door function for RSA, the public-key cryptosystem that is used for safe data transmission. This video lesson from Khan Academy is intended for students who are taking an introductory...
Khan Academy
Khan Academy: Encryption and Public Keys
Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This video explains 256-bit encryption, public and private keys, SSL & TLS and HTTPS....