Instructional Video5:51
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - What Else Can You Do to Protect Yourself Part II

Higher Ed
New ReviewIn part II of this recap module, you will continue to be shown even more cool tips and tricks on how to protect yourself when using computers, smartphones, and the Internet. And we will wrap up the training with information on how you...
Instructional Video4:24
Curated Video

The Beginners 2025 Cyber Security Awareness Training Course - Ransomware

Higher Ed
New ReviewYou will be learning about all of the recent ransomware attacks you may have heard about in the news, and why they are so effective in forcing their victims to hand money over to the hackers. You will see various examples of what they...
Instructional Video4:57
Curated Video

AWS Certified Cloud Practitioner (CLF-C02) - Ultimate Exam Training - AWS Key Management Service (KMS) and CloudHSM

Higher Ed
New ReviewIn this video, you will learn about AWS Key Management Service (KMS) and CloudHSM.
Instructional Video12:52
Instructional Video6:05
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacks Against Encryption

Higher Ed
In this video, we will look at the different kinds of attacks that hackers can perform to decrypt an already encrypted hard drive.
Instructional Video9:26
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting with Veracrypt

Higher Ed
After learning about encryption, we will look at encrypting a computer using Veracrypt software.
Instructional Video4:27
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Disk Encryption

Higher Ed
Here, you will learn about encryption and decryption, the two technologies applied to a hard drive.
Instructional Video6:45
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - VPN Myths Debunked

Higher Ed
In this video, the author debunks the significant myths about VPN use and several reasons for using a paid VPN.
Instructional Video6:30
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - HTTP, HTTPS, SSL, and TLS

Higher Ed
Here, you will learn about the hypertext transfer protocol, hypertext transfer protocol secure, secure sockets layer, and transport layer security, and how each one works.
Instructional Video9:10
Curated Video

Practical Cyber Hacking Skills for Beginners - Hashing

Higher Ed
In this video, we will look at hashing, which is the conversion of key/string/variable into a hash using an algorithm used in malware and antimalware products.
Instructional Video4:08
Curated Video

Pavel Durov and How Telegram Works

12th - Higher Ed
The CEO of Telegram, Pavel Durov, was arrested in France and is facing up to 20 years in prison. Learn how encrypted messaging apps like Telegram and Signal work and why some government officials want to ban them. Topics Covered: Why...
Instructional Video3:15
Curated Video

Binary: The Alien Language

6th - 12th
In the 1970s, launched aboard a space probe was what is considered one of the most important scientific diagrams ever created. If found by extraterrestrial life, the plaque explains details about the human race and where we are in the...
Instructional Video3:14
Curated Video

The Prime Number Code

6th - 12th
Why prime numbers are the building blocks of encryption, used for information security, in cash machines and to hide your identity online. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Instructional Video3:07
Curated Video

Binary: What Is Binary?

6th - 12th
Learn how the binary base system works, and how to symbolise any number using just two digits. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum. Twig’s context films show abstract concepts in...
Instructional Video3:28
Curated Video

Algorithms: Turing

6th - 12th
Why Turing devoted his life to the quest of what we now know as artificial intelligence, and invented the first algorithms that now form the basis of all programmed computers. Maths - History Of Maths A Twig Math Film. Reinforce and...
Instructional Video2:45
Curated Video

Binary: The Computer Language

6th - 12th
We use binary every day – although we might not know it. Find out how this number system is used in computers to store large amounts of data. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Instructional Video12:30
Curated Video

Fundamentals of Secure Software - Conclusion

Higher Ed
This video reviews a few of the important concepts learned throughout the course.
Instructional Video10:57
Curated Video

Fundamentals of Secure Software - Encryption Use Cases

Higher Ed
This video focuses on various use cases for encryption.
Instructional Video15:01
Curated Video

Fundamentals of Secure Software - Risk Rating Demo

Higher Ed
This video helps in performing a risk rating.
Instructional Video5:34
Curated Video

Fundamentals of Secure Software - SCA (Software Composition Analysis)

Higher Ed
This video talks about the SCA (Software Composition Analysis).
Instructional Video2:12
Curated Video

Fundamentals of Secure Software - Penetration Testing

Higher Ed
This video explains penetration testing.
Instructional Video3:31
Curated Video

Fundamentals of Secure Software - WAF (Web Application Firewall)

Higher Ed
This video Introduces you to WAF (Web Application Firewall).
Instructional Video2:04
Curated Video

Fundamentals of Secure Software - RASP (Runtime Application Self-Protection)

Higher Ed
This video talks about RASP (Runtime Application Self-Protection).
Instructional Video1:52
Curated Video

Fundamentals of Secure Software - IAST (Interactive Application Security Testing)

Higher Ed
This video demonstrates IAST (Interactive Application Security Testing).