Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Defining a Public Server
Public servers offer services to internet users. These servers should be hardened and placed on an isolated network such as a screened subnet or DMZ so that in the case of compromise, lateral movement by the attacker will not allow...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - hping3 Forged Packet Lab
The hping3 tool provides many services, including the creation of network packets based on command-line parameters. This episode demonstrates craft packets using the hping3 tool. This clip is from the chapter "Testing Infrastructure" of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 7 Ask Me Anything (AMA)
Some wireless networking attacks involve deception. In this episode, Mike describes how there are variations of Evil Twin attacks including through DNS. This clip is from the chapter "Securing Wireless LANs" of the series "CompTIA...
Curated Video
SSL Complete Guide 2021: HTTP to HTTPS - Elliptic Curve Cryptography Overview
In this video, we'll learn about elliptic curve cryptography. This clip is from the chapter "SSL, TLS, and HTTPS" of the series "SSL Complete Guide 2021: HTTP to HTTPS".In this section, we'll learn about SSL, TLS, and HTTPS.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Hypervisors and Virtual Machines
Hypervisors are servers configured to host virtual machine guests. This episode will discuss Type 1 and Type 2 hypervisors as well as hardening. This clip is from the chapter "Securing Public Servers" of the series "CompTIA Security+...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Threat Analysis and Mitigating Actions
Stepping through how attackers manage to compromise a system or exfiltrate data helps harden environments to prevent future incidents. This episode covers the Cyber Kill Chain, the Mitre ATT&CK Framework, the Diamond Model of Intrusion...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Social Engineering
Tricking people into doing something or divulging sensitive information – this is social engineering. This episode discusses a pretext, or believable story, that often goes along with this type of activity. This clip is from the chapter...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Data Backup
Backing data up provides availability in the event of data deletion, corruption, or encryption through ransomware. This episode discusses backup settings such as compression and encryption, as well as full, differential, and incremental...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - International Agreements and Guidelines
This video highlights the international agreements and guidelines. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Physical Security
This episode covers physical security controls such as door lock types and bollards, as well as encryption of data at rest. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The...
Zach Star
This completely changed the way I see numbers - Modular Arithmetic Visually Explained
This completely changed the way I see numbers - Modular Arithmetic Visually Explained
Zach Star
Computer Science Careers and Subfields
This video will cover computer science careers and as well as different areas within computer science you can dive into. Computer science is a very broad and diverse field that includes software development, cryptography, cyber security,...
Bloomberg
Nobel Laureate Romer on Cryptography, Innovation in Future of Money
Dec.17 -- Paul Romer, Nobel laureate and NYU Stern Professor of Economics, examines the role of cryptocurrencies in the future of money. He speaks on "Bloomberg Daybreak: Americas."
Bloomberg
SEC's Gensler Signals No Interest in Crypto Ban
Oct.05 -- Securities and Exchange Commission Chair Gary Gensler has had multiple dust-ups with crypto firms but even he says the U.S. won’t follow China’s lead in banning digital tokens. He spoke before a virtual House hearing.
Bloomberg
Billionaire Novogratz Says Tesla Feels Like Bitcoin
Jan.30 -- Billionaire Bitcoin maven Mike Novogratz, Galaxy Investment Partners chief executive officer, explains why he is shorting Tesla Inc. He speaks during an interview with Bloomberg's Erik Schatzker on "Bloomberg Markets."
Curated Video
Saul Rubinek on 'Warehouse 13' Holiday special, his and Judd Hirsch's eyebrows
Syfy
No re-use/re-sale without clearance
1. Clip, 'Warehouse 13'
AP Television
New York, 30 November 2010
2. SOUNDBITE (English) Saul Rubinek, Actor: "The Christmas episode was really a warmly written, very funny episode, it's got, you...
Bloomberg
Novogratz Sees Stocks Going 'Parabolic,' Maybe 24% or Higher This Year
Jan.30 -- Billionaire Bitcoin maven Mike Novogratz, Galaxy Investment Partners chief executive officer, discusses his bullish outlook for global stocks. He speaks during an interview with Bloomberg's Erik Schatzker on "Bloomberg Markets."
Bloomberg
Billionaire Mike Novogratz Talks Tesla, Stocks and Bitcoin
Jan.30 -- Billionaire Bitcoin maven Mike Novogratz, Galaxy Investment Partners chief executive officer, discusses his Tesla Inc. short, the outlook for global stocks and cryptocurrencies with Bloomberg's Erik Schatzker on "Bloomberg...
Bloomberg
Katie Haun's Outlook on Crypto Winter
Emily Chang sits down with Haun Ventures CEO & Founder Katie Haun on the latest episode of Studio 1.0.
PBS
Cyber Codes
Let's get the video out in the open. Viewers learn about some early instances of cryptography and then hone in on modern cyber codes. Specifically, the animated video describes the basics of how public key cryptography works.
Physics Girl
Quantum Cryptography Explained
Cryptography keeps your identifying information safe! An interesting lesson explains the history of encryption and decryption. The instructor begins with simple strategies and progresses to quantum cryptography to finish the well-rounded...
Code.org
The Internet: Encryption and Public Keys
We can partially thank Caesar that our e-mails are secure! Viewers learn how encryption and public key cryptography keep our communications safe over the Internet. The video also briefly covers the history of ciphers, such as the Caesar...
TED-Ed
Is DNA the Future of Data Storage?
When you think of secret messages and data storage, DNA doesn't normally come to mind. Viewers watch a video that explains how scientists use DNA to store information. It describes some recent advances in the area.