Instructional Video0:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Defining a Public Server

Higher Ed
Public servers offer services to internet users. These servers should be hardened and placed on an isolated network such as a screened subnet or DMZ so that in the case of compromise, lateral movement by the attacker will not allow...
Instructional Video6:09
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - hping3 Forged Packet Lab

Higher Ed
The hping3 tool provides many services, including the creation of network packets based on command-line parameters. This episode demonstrates craft packets using the hping3 tool. This clip is from the chapter "Testing Infrastructure" of...
Instructional Video1:20
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 7 Ask Me Anything (AMA)

Higher Ed
Some wireless networking attacks involve deception. In this episode, Mike describes how there are variations of Evil Twin attacks including through DNS. This clip is from the chapter "Securing Wireless LANs" of the series "CompTIA...
Instructional Video1:54
Curated Video

SSL Complete Guide 2021: HTTP to HTTPS - Elliptic Curve Cryptography Overview

Higher Ed
In this video, we'll learn about elliptic curve cryptography. This clip is from the chapter "SSL, TLS, and HTTPS" of the series "SSL Complete Guide 2021: HTTP to HTTPS".In this section, we'll learn about SSL, TLS, and HTTPS.
Instructional Video8:25
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Hypervisors and Virtual Machines

Higher Ed
Hypervisors are servers configured to host virtual machine guests. This episode will discuss Type 1 and Type 2 hypervisors as well as hardening. This clip is from the chapter "Securing Public Servers" of the series "CompTIA Security+...
Instructional Video7:40
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Threat Analysis and Mitigating Actions

Higher Ed
Stepping through how attackers manage to compromise a system or exfiltrate data helps harden environments to prevent future incidents. This episode covers the Cyber Kill Chain, the Mitre ATT&CK Framework, the Diamond Model of Intrusion...
Instructional Video5:58
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Social Engineering

Higher Ed
Tricking people into doing something or divulging sensitive information – this is social engineering. This episode discusses a pretext, or believable story, that often goes along with this type of activity. This clip is from the chapter...
Instructional Video9:46
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Data Backup

Higher Ed
Backing data up provides availability in the event of data deletion, corruption, or encryption through ransomware. This episode discusses backup settings such as compression and encryption, as well as full, differential, and incremental...
Instructional Video4:47
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - International Agreements and Guidelines

Higher Ed
This video highlights the international agreements and guidelines. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Instructional Video13:00
Zach Star

The Mathematics of Cryptography

12th - Higher Ed
The Mathematics of Cryptography
Instructional Video9:53
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Physical Security

Higher Ed
This episode covers physical security controls such as door lock types and bollards, as well as encryption of data at rest. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video19:13
Zach Star

This completely changed the way I see numbers - Modular Arithmetic Visually Explained

12th - Higher Ed
This completely changed the way I see numbers - Modular Arithmetic Visually Explained
Instructional Video12:47
Zach Star

Computer Science Careers and Subfields

12th - Higher Ed
This video will cover computer science careers and as well as different areas within computer science you can dive into. Computer science is a very broad and diverse field that includes software development, cryptography, cyber security,...
News Clip5:02
Bloomberg

Nobel Laureate Romer on Cryptography, Innovation in Future of Money

Higher Ed
Dec.17 -- Paul Romer, Nobel laureate and NYU Stern Professor of Economics, examines the role of cryptocurrencies in the future of money. He speaks on "Bloomberg Daybreak: Americas."
News Clip1:45
Bloomberg

SEC's Gensler Signals No Interest in Crypto Ban

Higher Ed
Oct.05 -- Securities and Exchange Commission Chair Gary Gensler has had multiple dust-ups with crypto firms but even he says the U.S. won’t follow China’s lead in banning digital tokens. He spoke before a virtual House hearing.
News Clip1:52
Bloomberg

Billionaire Novogratz Says Tesla Feels Like Bitcoin

Higher Ed
Jan.30 -- Billionaire Bitcoin maven Mike Novogratz, Galaxy Investment Partners chief executive officer, explains why he is shorting Tesla Inc. He speaks during an interview with Bloomberg's Erik Schatzker on "Bloomberg Markets."
News Clip5:37
Curated Video

Saul Rubinek on 'Warehouse 13' Holiday special, his and Judd Hirsch's eyebrows

Higher Ed
Syfy No re-use/re-sale without clearance 1. Clip, 'Warehouse 13' AP Television New York, 30 November 2010 2. SOUNDBITE (English) Saul Rubinek, Actor: "The Christmas episode was really a warmly written, very funny episode, it's got, you...
News Clip2:31
Bloomberg

Novogratz Sees Stocks Going 'Parabolic,' Maybe 24% or Higher This Year

Higher Ed
Jan.30 -- Billionaire Bitcoin maven Mike Novogratz, Galaxy Investment Partners chief executive officer, discusses his bullish outlook for global stocks. He speaks during an interview with Bloomberg's Erik Schatzker on "Bloomberg Markets."
News Clip8:02
Bloomberg

Billionaire Mike Novogratz Talks Tesla, Stocks and Bitcoin

Higher Ed
Jan.30 -- Billionaire Bitcoin maven Mike Novogratz, Galaxy Investment Partners chief executive officer, discusses his Tesla Inc. short, the outlook for global stocks and cryptocurrencies with Bloomberg's Erik Schatzker on "Bloomberg...
News Clip1:37
Bloomberg

Katie Haun's Outlook on Crypto Winter

Higher Ed
Emily Chang sits down with Haun Ventures CEO & Founder Katie Haun on the latest episode of Studio 1.0.
Instructional Video3:25
PBS

Cyber Codes

6th - 12th
Let's get the video out in the open. Viewers learn about some early instances of cryptography and then hone in on modern cyber codes. Specifically, the animated video describes the basics of how public key cryptography works.
Instructional Video8:13
Physics Girl

Quantum Cryptography Explained

9th - Higher Ed Standards
Cryptography keeps your identifying information safe! An interesting lesson explains the history of encryption and decryption. The instructor begins with simple strategies and progresses to quantum cryptography to finish the well-rounded...
Instructional Video6:40
1
1
Code.org

The Internet: Encryption and Public Keys

6th - 12th
We can partially thank Caesar that our e-mails are secure! Viewers learn how encryption and public key cryptography keep our communications safe over the Internet. The video also briefly covers the history of ciphers, such as the Caesar...
Instructional Video5:30
TED-Ed

Is DNA the Future of Data Storage?

9th - Higher Ed Standards
When you think of secret messages and data storage, DNA doesn't normally come to mind. Viewers watch a video that explains how scientists use DNA to store information. It describes some recent advances in the area.