Curated Video
The Beginners 2025 Cyber Security Awareness Training Course - What Else Can You Do to Protect Yourself Part II
New ReviewIn part II of this recap module, you will continue to be shown even more cool tips and tricks on how to protect yourself when using computers, smartphones, and the Internet. And we will wrap up the training with information on how you...
Curated Video
The Beginners 2025 Cyber Security Awareness Training Course - Ransomware
New ReviewYou will be learning about all of the recent ransomware attacks you may have heard about in the news, and why they are so effective in forcing their victims to hand money over to the hackers. You will see various examples of what they...
Curated Video
AWS Certified Cloud Practitioner (CLF-C02) - Ultimate Exam Training - AWS Key Management Service (KMS) and CloudHSM
New ReviewIn this video, you will learn about AWS Key Management Service (KMS) and CloudHSM.
Curated Video
Java Multithreading and Parallel Programming Masterclass - How to Properly Size a Thread Pool
This video explains how to properly size a thread pool.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacks Against Encryption
In this video, we will look at the different kinds of attacks that hackers can perform to decrypt an already encrypted hard drive.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting with Veracrypt
After learning about encryption, we will look at encrypting a computer using Veracrypt software.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Disk Encryption
Here, you will learn about encryption and decryption, the two technologies applied to a hard drive.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - VPN Myths Debunked
In this video, the author debunks the significant myths about VPN use and several reasons for using a paid VPN.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - HTTP, HTTPS, SSL, and TLS
Here, you will learn about the hypertext transfer protocol, hypertext transfer protocol secure, secure sockets layer, and transport layer security, and how each one works.
Curated Video
Practical Cyber Hacking Skills for Beginners - Hashing
In this video, we will look at hashing, which is the conversion of key/string/variable into a hash using an algorithm used in malware and antimalware products.
Curated Video
Pavel Durov and How Telegram Works
The CEO of Telegram, Pavel Durov, was arrested in France and is facing up to 20 years in prison. Learn how encrypted messaging apps like Telegram and Signal work and why some government officials want to ban them.
Topics Covered:
Why...
Curated Video
Binary: The Alien Language
In the 1970s, launched aboard a space probe was what is considered one of the most important scientific diagrams ever created. If found by extraterrestrial life, the plaque explains details about the human race and where we are in the...
Curated Video
The Prime Number Code
Why prime numbers are the building blocks of encryption, used for information security, in cash machines and to hide your identity online. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Curated Video
Binary: What Is Binary?
Learn how the binary base system works, and how to symbolise any number using just two digits. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum. Twig’s context films show abstract concepts in...
Curated Video
Algorithms: Turing
Why Turing devoted his life to the quest of what we now know as artificial intelligence, and invented the first algorithms that now form the basis of all programmed computers. Maths - History Of Maths A Twig Math Film. Reinforce and...
Curated Video
Binary: The Computer Language
We use binary every day – although we might not know it. Find out how this number system is used in computers to store large amounts of data. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Curated Video
Fundamentals of Secure Software - Conclusion
This video reviews a few of the important concepts learned throughout the course.
Curated Video
Fundamentals of Secure Software - Encryption Use Cases
This video focuses on various use cases for encryption.
Curated Video
Fundamentals of Secure Software - Risk Rating Demo
This video helps in performing a risk rating.
Curated Video
Fundamentals of Secure Software - SCA (Software Composition Analysis)
This video talks about the SCA (Software Composition Analysis).
Curated Video
Fundamentals of Secure Software - Penetration Testing
This video explains penetration testing.
Curated Video
Fundamentals of Secure Software - WAF (Web Application Firewall)
This video Introduces you to WAF (Web Application Firewall).
Curated Video
Fundamentals of Secure Software - RASP (Runtime Application Self-Protection)
This video talks about RASP (Runtime Application Self-Protection).
Curated Video
Fundamentals of Secure Software - IAST (Interactive Application Security Testing)
This video demonstrates IAST (Interactive Application Security Testing).