Instructional Video2:31
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Welcome to the Course

Higher Ed
This video explains the course overview.<br<br/>/>

This clip is from the chapter "Course Introduction" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section introduces you to the course.
Instructional Video1:49
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Understanding Security Controls

Higher Ed
This video explains understanding security controls.
<
br/>
This clip is from the chapter "Risk Responses and Controls" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains risk...
Instructional Video6:47
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - IT Security Assessments

Higher Ed
This video explains IT security assessments.<br<br/>/>

This clip is from the chapter "Risk Identification" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to identify risk.
Instructional Video2:58
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Instructor Introduction

Higher Ed
This video introduces you to the instructor of the course.
<
br/>
This clip is from the chapter "Course Introduction" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section introduces you to the...
Instructional Video2:36
IDG TECHtalk

Congress addresses SolarWinds attack, Biden’s cybersecurity plan

Higher Ed
While the federal government and businesses continue to reel from the SolarWinds attack, members of Congress have begun proposing cybersecurity measures to better strengthen the United States against foreign cyber attacks. In this...
Instructional Video4:57
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Tangible and Intangible Assets

Higher Ed
This video explains tangible and intangible assets.<br<br/>/>

This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to understand risk.
Instructional Video4:12
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Deeper Dive Look at IT Vulnerabilities

Higher Ed
This video explains a deeper dive look at IT vulnerabilities.
<
br/>
This clip is from the chapter "Why We Need Risk Management" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the...
Instructional Video3:20
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - Common IT Vulnerabilities

Higher Ed
This video explains common IT vulnerabilities.<br<br/>/>

This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to understand risk.
Instructional Video1:12
Next Animation Studio

China turns ‘Great Cannon’ on Hong Kong web forum

12th - Higher Ed
A Chinese cyberweapon dubbed the Great Cannon is launching DDoS attacks on a Hong Kong webform after years of silence, AT&T Cybersecurity reported on Wednesday.
Instructional Video34:41
The Wall Street Journal

Where to Start in Understanding Your Cyber Risk

Higher Ed
How the latest cyber risks affect your business and how to use that knowledge to start planning a cyber-defense strategy.
Instructional Video11:28
Flame Media

Real Future: Hackers

12th - Higher Ed
As companies like Ashley Madison and celebrities like Jennifer Lawrence have learned, being hacked can have devastating consequences. But how bad can it get? Our host decides to find out by inviting two of the world's most elite...
Instructional Video4:39
National Institute of Standards and Technology

Cybersecurity Framework Overview Michael Daniel

9th - 12th
White House Cybersecurity Coordinator Michael Daniel describes the Cybersecurity Executive order as industry and government sharing information to raise the baseline of cybersecurity across U.S. businesses and critical infrastructure.
Instructional Video12:13
The Wall Street Journal

Compliance Officer Survey

Higher Ed
The Wall Street Journal’s Tom Corrigan reveals the results of the Journal’s third annual compliance officer survey, including where compliance officers see the greatest risks and how they see their role and resources changing.
Instructional Video9:58
Curated Video

Shutdown Any WiFi Network

Higher Ed
In this tutorial, you will learn how to jam nearby WiFi signals and how disconnect authenticated users from them.
Instructional Video2:02
National Institute of Standards and Technology

Introducing Phish Scale - Rating Human Phishing Detection Difficulty

9th - 12th
If your employees are online, they – and, by extension, your organization – are a target for phishing. Enter the phish scale. Created by NIST researchers using real data, this scale allows you to evaluate the quality and sophistication...
Instructional Video2:03
PBS

Hot Shots and Hot Jobs: Cyber Security Analysts Fight Crime | Science Matters

3rd - 12th
Rather than a trench coat and a magnifying glass, the tools of the modern crime fighter are the internet and a computer. Find out what it takes to fight crime as a cybersecurity analyst. 
Instructional Video10:25
1
1
Crash Course

The Biggest Problems We're Facing Today and the Future of Engineering: Crash Course Engineering #46

9th - 12th
Be the future of engineering. Scholars learn about the future of engineering, particularly in the areas of sustainability, infrastructure, security, health, and general quality of life. The informational video looks at several examples,...
Instructional Video12:47
Veritasium

This Toy Can Open Any Garage

9th - 12th Standards
Just how secure are those remote devices used to unlock cars and open garage doors?  A short video follows two friends as they try to hack the codes using children's toys and sophisticated computer programs.
Instructional Video3:01
PBS

The Secret Lives of Hackers

6th - 12th
Hacking: cyber crime or creative problem-solving technique? Young pupils watch a video about hackers. and learn that not all computer hackers are evil. The video also describes some common types of hackers.
Instructional Video3:18
1
1
PBS

A Cyber Privacy Parable

6th - 12th
Next time you think about posting a picture online, consider this parable. A short video explains the dangers of social media as it relates to cybersecurity and privacy. It uses a cautionary parable to describe what can happen when you...
Instructional Video3:25
PBS

Cyber Codes

6th - 12th
Let's get the video out in the open. Viewers learn about some early instances of cryptography and then hone in on modern cyber codes. Specifically, the animated video describes the basics of how public key cryptography works.
Instructional Video3:38
PBS

Cybersecurity 101

6th - 12th
You wouldn't hand strangers keys to your house; why wouldn't you protect yourself online? Scholars watch a short video on cybersecurity. The engaging video describes how the Internet came to be and how criminals can steal sensitive...
Instructional Video5:02
1
1
Code.org

The Internet: Cybersecurity and Crime

6th - 12th
Don't get tricked into opening suspicious e-mails. Viewers learn about the importance of cybersecurity. The video describes several different threats to computers, including viruses, malware, and phishing attacks. Time to change...
Instructional Video
Crash Course

Crash Course Computer Science #31: Cybersecurity

9th - 10th
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability. This episode discusses these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our...