Instructional Video13:58
PBS

Why Quantum Computing Requires Quantum Cryptography

12th - Higher Ed
Quantum computing is cool, but you know what would be extra awesome - a quantum internet. In fact if we want the first we’ll need the latter. And the first step to the quantum internet is quantum cryptography.
Instructional Video14:40
PBS

Solving Quantum Cryptography

12th - Higher Ed
Your extensive posting history on r/birdswitharms and your old fanfiction-heavy livejournal are both one tiny math problem away from becoming public knowledge. That math problem is prime number factoring, and the new era of quantum...
Instructional Video24:41
3Blue1Brown

But how does bitcoin actually work? Cryptocurrency - Part 1 of 2

12th - Higher Ed
How does bitcoin work? What is a "block chain"? What problem is this system trying to solve, and how does it use the tools of cryptography to do so?
Instructional Video26:20
3Blue1Brown

Ever wonder how Bitcoin (and other cryptocurrencies) actually work?

12th - Higher Ed
How does bitcoin work? What is a "block chain"? What problem is this system trying to solve, and how does it use the tools of cryptography to do so?
Instructional Video2:56
SciShow

Alan Turing: Great Minds

12th - Higher Ed
Hank introduces us to that great mathematical mind, Alan Turing, who, as an openly gay man in the early 20th century faced brutal prejudice that eventually led to his suicide, despite being a genius war hero who helped the Allies defeat...
Instructional Video12:23
SciShow

3 Surprising Things That Act Like Fluids

12th - Higher Ed
Sometimes being in a traffic jam can feel like being stuck in a clogged pipe. And it turns out, maybe that feeling isn’t too far off. Today we look at 3 things that are remarkably unlike fluids, yet still behave in liquid-like ways.
Instructional Video16:16
TED Talks

TED: The future of money | Neha Narula

12th - Higher Ed
What happens when the way we buy, sell and pay for things changes, perhaps even removing the need for banks or currency exchange bureaus? That's the radical promise of a world powered by cryptocurrencies like Bitcoin and ethereum. We're...
Instructional Video4:17
3Blue1Brown

How secure is 256 bit security? Cryptocurrency - Part 2 of 2

12th - Higher Ed
When a piece of cryptography is described as having "256-bit security", what exactly does that mean? Just how big is the number 2^256?
Instructional Video5:15
SciShow

How to Stop Light in Its Tracks

12th - Higher Ed
Scientists have created beams of light that are slower than a car! Not only that, but with the literal flick of a switch, they can freeze that beam of light in place!
Instructional Video12:00
Crash Course

Cryptography: Crash Course Computer Science

12th - Higher Ed
Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a...
Instructional Video7:59
SciShow

Cryptography: The Science of Making and Breaking Codes

12th - Higher Ed
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable.
Instructional Video3:18
Wonderscape

Understanding Cryptocurrencies: The Future of Money

K - 5th
Explore the world of cryptocurrencies, digital currencies secured by cryptography, and their potential to revolutionize financial transactions. Learn about the impact of cryptocurrencies on society, including debates over their use,...
Instructional Video5:44
Curated Video

CISSP Crash Course - Cryptanalytic Attacks

Higher Ed
This video explains cryptographic attacks and malware attacks such as Ransomware. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture...
Instructional Video6:22
Great Big Story

This Uncrackable Code Is Puzzling the CIA

12th - Higher Ed
Delve into the enigma of Kryptos, a mysterious sculpture at the heart of the CIA headquarters, challenging code-breakers for three decades. Meet Elonka Dunin, a puzzle enthusiast, and artist Jim Sanborn, the creator of Kryptos, as they...
Instructional Video2:15
Curated Video

The Key Distribution Problem

12th - Higher Ed
Quantum physicist Artur Ekert (Oxford and NUS) describes a key issue in cryptography: the key distribution problem.
Instructional Video3:02
Curated Video

Staying A Step Ahead

12th - Higher Ed
Quantum physicist Artur Ekert (Oxford and NUS) discusses the question of building public key cryptosytems that are safe from even a quantum computer.
Instructional Video3:41
Curated Video

Applied Philosophy

12th - Higher Ed
Quantum physicist Artur Ekert describes how his formative work in quantum cryptography was motivated by a desire to concretely probe philosophical ideas first formulated by Albert Einstein and later refined by John Bell.
Instructional Video10:10
Curated Video

Mobile Application Testing Framework (MASVS)

Higher Ed
In this video, we will be discussing the Mobile Application Testing Framework (MASVS). MASVS is a comprehensive guide for mobile app developers and testers to ensure the security of their applications. We will explore the different...
Instructional Video1:08
Curated Video

What is ANNEX A in ISo 27001

Higher Ed
In this video, we will be discussing Annex A in ISO 27001. Annex A is a crucial component of the ISO 27001 standard, as it outlines the controls that organizations must implement to ensure the confidentiality, integrity, and availability...
Instructional Video10:22
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Personnel Risk and Policies

Higher Ed
Hiring the right employees and contractors for the job always matters. Enacting internal security controls such as background checks, mandatory vacations, job rotation, and separation of duties goes a long way in ensuring the integrity...
Instructional Video7:24
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Risk Management Concepts

Higher Ed
A risk management framework aids in identifying and managing risks and is sometimes required for compliance with data privacy regulations such as GDPR and HIPAA. Organization security policies are often influenced by data privacy...
Instructional Video13:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Account Management

Higher Ed
Accountability for resource access is possible only with people using their own unique user accounts where the principle of least privilege has been applied, ideally through group-assigned permissions. Account policies can determine...
Instructional Video8:30
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Third-Party Risk Management

Higher Ed
Some business activities cannot be completed entirely within an organization and must be outsourced. Ensuring that proper security safeguards are in place throughout the hardware, software, and personnel supply chain results in a...
Instructional Video11:29
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Data Types and Roles

Higher Ed
Protecting personally identifiable information, or PII, is crucial and required by security regulations such as GDPR, but of the vast amounts of data in an organization, how do you know which data is sensitive? The answer is through data...