Curated Video
Hashing in a Nutshell
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Curated Video
Pass the Hash with Mimikatz on Windows
An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that...
Curated Video
Attack a Router Using Medusa
In this video, you will learn how to run an online password attack on a router using Medusa on KALI. Use this ethically !!!
Curated Video
Intercept_ Analyze_ and Replay Web Traffic
Learn how to leverage the powerful Burp suite in analyzing web traffic and crafting attacks
Curated Video
Password Spraying
Learn how to spray passwords across many accounts. Password spraying is an attack that attempts to access a large number of accounts (usernames) with a few commonly used passwords. It is different from the traditional brute-force attacks...
Curated Video
Run an Online Password Attack on a Router
Learn how to plan an execute an online password attack on a router
Curated Video
Handle Passwords Safely
This video will introduce you to best practices in handling your passwords
Curated Video
Importance of Cyber Security
The video explains the importance of cyber security in a connected world
Curated Video
Introduction to IT and Cybersecurity: Cyber Security Essentials
Part 13/16 of Introduction to IT and Cybersecurity series: The video discusses the essentials of cyber security and covers various aspects such as encryption, firewalls, digital certificates and signatures, passwords, and intrusion...
Curated Video
How to Deal with Passwords
The video will guide you on the best practices in password management, password generation, and password storage
Curated Video
I WONDER - Why It Is Important To Create Strong Passwords?
This video is answering the question of why it is important to create strong passwords.
Curated Video
ISO 27001- 2022 Organizational controls
In this video, we will be discussing the ISO 27001-2022 organizational controls. ISO 27001 is an international standard that outlines the requirements for an information security management system (ISMS). The 2022 version of the standard...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Authentication Methods
Have you ever had trouble remembering usernames and passwords for multiple web apps? Password vaults serve as a protected credential repository in addition to common authentication methods such as one-time password codes,...
Oxford Online English
Emails in English - How to Write an Email in English - Business English Writing
In this lesson, you can learn how to write an email in English. Do you need to write emails at work? Are you worried that your emails aren’t clear, or that you make mistakes in English? In this lesson, you can see a how to write clear,...
National Institute of Standards and Technology
National Strategy for Trusted Identities in Cyberspace (NSTIC)
This animated video provides viewers with a look at how the National Strategy for Trusted Identities will work. The goal is to establish identity solutions and privacy-enhancing technologies that will improve the security and convenience...
Seven Dimensions
Understanding Crime and Upholding Safety
In this video, retired detective Colin McLaren discusses with Eve Ash how workplaces can be sitting ducks for crimes such as theft, dishonesty and cyberattacks. He advocates ramping up security, investing in the right applications and...
National Institute of Standards and Technology
What is the Internet of Things (IoT) and how can we secure it?
Industry leaders discuss cybersecurity concerns around the Internet of Things (IoT) and the role NIST (https://go.usa.gov/xPzuY) can play to help secure our future. Featuring thought leaders from: Global Cyber Alliance Symantec Cisco...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Password Attacks
Username and password authentication remains common, as do related dictionary and brute-force attacks. Account lockout threshold can mitigate password attacks other than password spraying attacks. This clip is from the chapter "Securing...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Data Protection
Data is not all the same. Whether data is at rest, in use, or in transit will affect how you can best secure it. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Tarver Academy
How to protect yourself with good, strong passwords - DIGITAL CITIZENSHIP
In This Episode, Tyler Teaches Us About How to protect yourself with good, strong passwords - DIGITAL CITIZENSHIP
All Ears English
Daily English Conversation Using this Phrasal Verb - All Ears English Podcast 1787
Daily English Conversation Using this Phrasal Verb - All Ears English Podcast 1787
The Wall Street Journal
Pro Perspective: Where Cybersecurity Meets Physical Security
Physical security can be an important part of cybersecurity, from controlling building access to protecting the residences of key employees. CISO of Global Guardian, outlines how companies can address both areas to create stronger...
Packt
Securely Storing Passwords: Part I
API Authentication and Security (Task App): Securely Storing Passwords: Part I This clip is from the chapter "API Authentication and Security (Task App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In this...
IDG TECHtalk
Tips for conducting effective phishing simulations
Poorly executed phishing simulations can send the wrong message to employees. Here’s how to do it right.