Instructional Video4:59
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - Create EFS

Higher Ed
This video helps you create EFS. This clip is from the chapter "EFS - Managed Network File Storage for EC2" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section focuses on EFS - managed network file...
Instructional Video12:45
Packt

CompTIA Network+ Certification N10-007: The Total Course - Virtual Private Networks (VPNs)

Higher Ed
This video explains the concept of VPN, which enables remote clients to connect to a local network. This clip is from the chapter "Advanced Networking Devices" of the series "CompTIA Network+ Certification N10-007: The Total Course".In...
Instructional Video4:36
Curated Video

SSL Complete Guide 2021: HTTP to HTTPS - How TLS Session is Established

Higher Ed
In this video, we'll learn how TLS session is established. This clip is from the chapter "SSL, TLS, and HTTPS" of the series "SSL Complete Guide 2021: HTTP to HTTPS".In this section, we'll learn about SSL, TLS, and HTTPS.
Instructional Video4:15
Curated Video

SSL Complete Guide 2021: HTTP to HTTPS - Encryption Key Generation by the Web Browser

Higher Ed
In this video, we'll learn about encryption key generation by the web browser. This clip is from the chapter "SSL, TLS, and HTTPS" of the series "SSL Complete Guide 2021: HTTP to HTTPS".In this section, we'll learn about SSL, TLS, and...
News Clip6:54
Curated Video

Why some Canadian health data may be handed over to the U.S.

9th - Higher Ed
Data privacy experts warn that Canadian electronic health records may be at risk of being accessed and used by foreign entities, and say data is often controlled by U.S. companies. Dr. Kumanan Wilson, chief scientific officer at the...
Instructional Video
Massachusetts Institute of Technology

Mit: Blossoms: Fabulous Building Cryptosystems

9th - 10th
As part of this introduction to cryptography, students will build three devices and learn how to encrypt and decrypt messages. Video is accompanied by a teacher's guide, transcript, and other handouts, as well as links for learning more...
Instructional Video
Massachusetts Institute of Technology

Mit: Blossoms: Building Cryptosystems

9th - 10th
This video module presents an introduction to cryptography - the method of sending messages in such a way that only the intended recipients can understand them. In this very interactive lesson, students will build three different devices...
Instructional Video
Crash Course

Crash Course Computer Science #33: Cryptography

9th - 10th
This episode discusses how to keep information secret using cryptography. From as early as Julius Caesar's Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587; there has long been a need to encrypt...
Instructional Video
Khan Academy

Khan Academy: Rsa Encryption: Step 1

9th - 10th
This video explains why RSA, the public-key cryptosystem that is used for safe data transmission, is needed. This video lesson from Khan Academy is intended for students who are taking an introductory computer science course.
Instructional Video
Other

Code.org: The Internet: Encryption & Public Keys

9th - 10th
Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This educational video explains 256-bit encryption, public and private keys, SSL & TLS...
Instructional Video
Science Friday Initiative

Science Friday: Rap Nerdy to Me

9th - 10th
MC Frontalot and Dr. Awkward rap about data encryption, video games and the nerd life.
Instructional Video
Khan Academy

Khan Academy: Encryption and Public Keys

9th - 10th
Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This video explains 256-bit encryption, public and private keys, SSL & TLS and HTTPS....
Instructional Video
Khan Academy

Khan Academy: Packets, Routers, and Reliability

9th - 10th
Spotify engineer Lynn Root and Vint Cerf, Father of the Internet, explain how information on the Internet is broken down into packets, and how to ensure that information is reliably received. [6:25]
Instructional Video
Khan Academy

Khan Academy: What Is Cryptography?

9th - 10th
What is Cryptography? A story which takes us from Caesar to Claude Shannon. [1:31]
Instructional Video
Khan Academy

Khan Academy: Bitcoin: Digital Signatures

9th - 10th
This video is a high-level explanation of digital signature schemes, which are a fundamental building block in many cryptographic protocols. [9:46]
Instructional Video
Khan Academy

Khan Academy: Bitcoin: Cryptographic Hash Functions

9th - 10th
This video discusses what cryptographic hash functions are and what properties are desired of them. [10:13]
Instructional Video
Khan Academy

Khan Academy: Perfect Secrecy

9th - 10th
Claude Shannon's idea of perfect secrecy: no amount of computational power can help improve your ability to break the one-time pad.
Instructional Video
Khan Academy

Khan Academy: Rsa Encryption: Step 2

9th - 10th
This video shows the second step in setting up a trap-door function for RSA, the public-key cryptosystem that is used for safe data transmission. This video lesson from Khan Academy is intended for students who are taking an introductory...
Instructional Video
Khan Academy

Khan Academy: Rsa Encryption: Step 4

9th - 10th
This video shows the last step in setting up a trap-door function for RSA, the public-key cryptosystem that is used for safe data transmission. This video lesson from Khan Academy is intended for students who are taking an introductory...
Instructional Video
Khan Academy

Khan Academy: Rsa Encryption: Step 3

9th - 10th
This video shows the third step in setting up a trap-door function for RSA, the public-key cryptosystem that is used for safe data transmission. This video lesson from Khan Academy is intended for students who are taking an introductory...
Instructional Video
Khan Academy

Khan Academy: Encryption and Public Keys

9th - 10th
Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This video explains 256-bit encryption, public and private keys, SSL & TLS and HTTPS....