Instructional Video16:29
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Touring the CLI

Higher Ed
The Command-Line Interface (CLI) allows technicians to interact with Windows, Linux, and MacOS systems by typing in commands such as ping and ipconfig. Windows uses a command prompt, MacOS uses a terminal shell, and Linux can use a...
Instructional Video8:46
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cloud Deployment Models

Higher Ed
Virtualization alone does not constitute cloud computing; a number of characteristics such as resource pooling and metered usage must also be involved. This episode discusses public, private, hybrid, and community clouds. This clip is...
Instructional Video5:09
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Security Constraints for Dedicated Systems

Higher Ed
Some dedicated device security settings are limited, or patches are not available, and should be placed on isolated networks that do not contain sensitive systems or data. Mobile devices have limited CPU and battery power which limits...
Instructional Video6:50
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network and Port Address Translation

Higher Ed
Network Address Translation (NAT) maps external public IPs to internal private IPs to protect the true identity of servers. Port Address Translation (PAT) allows multiple internal network clients with private IPs to access the Internet...
Instructional Video6:18
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Shells

Higher Ed
Shells allow technicians to enter commands, such as a Linux bash shell or a Windows command prompt. Reverse shells are the result of infected victim machines that reach out to an attacker station. This clip is from the chapter "Tools of...
Instructional Video12:42
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Cryptosystems

Higher Ed
In this episode, Mike describes encrypting and decrypting data with the same key. He also covers how symmetric algorithms can either be block or streaming and use various types of ciphers depending on which one is used. This clip is from...
Instructional Video8:16
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Symmetric Block Modes

Higher Ed
Symmetric block algorithms have limitations depending on which kind of cipher is used. This episode explores the different block modes. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601:...
Instructional Video9:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Gathering Digital Evidence

Higher Ed
This episode covers chain of custody, evidence order of volatility, and digital forensics tools used to acquire evidence. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video6:01
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Incident Response Plans (IRPs)

Higher Ed
An IRP provides guidance on how security incidents are dealt with effectively while they are occurring. The IRP includes roles, responsibilities, a contact list and escalation procedures. IRPs should be updated periodically through...
Instructional Video9:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations

Higher Ed
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
Instructional Video10:13
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Password Cracking

Higher Ed
Passwords are often stored in hash format but can still be susceptible to attacks. The various password attacks include brute force, dictionary, and rainbow table. Salting and key stretching add another layer of security to hashed...
Instructional Video1:09
The Business Professor

Chartered Market Technician

Higher Ed
Explanation of Chartered Market Technician
Instructional Video4:37
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - The Windows Command Line

Higher Ed
The Windows command line is spawned by cmd.exe. Security technicians can automate tasks using batch file scripts containing commands such as whoami and ipconfig. Powershell.exe can be spawned from a Windows command prompt in order to use...
Instructional Video15:57
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cryptography Basics

Higher Ed
Cryptography is the practice of disguising information in a way that looks random. This episode explores the history of cryptography and how it has evolved into the complex systems today. This clip is from the chapter "Cryptography" of...
Instructional Video2:57
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Physical Security Lab

Higher Ed
A full IT security audit always includes physical security. In this episode, physical security considerations are presented. This clip is from the chapter "Physical Security" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video5:40
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Load Balancing

Higher Ed
Active/active and active/passive load balancing can efficiently route client application requests to backend servers. Load balancing improves application performance and resiliency to a single application server failure. This clip is...
Instructional Video11:39
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Security Assessment Tools

Higher Ed
Open-source and proprietary (paid) security assessment tools are used by security analysts and malicious actors; what differs is the reason they are being used. The scanless tool uses web sites to perform port scans while the hping3 tool...
Instructional Video12:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Asymmetric Cryptosystems

Higher Ed
In this episode, Mike describes encrypting and decrypting data with different keys and the magic that happens when key pairs are generated. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification...
Instructional Video7:20
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Methods

Higher Ed
This episode introduces various methods used to protect the critical keys in cryptography that keep communication secure. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total...
Instructional Video8:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Touring Certificates

Higher Ed
Mike tours various certificates in this episode. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces you to cryptography.
Instructional Video1:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 12 Ask Me Anything (AMA)

Higher Ed
One aspect of security testing is determining if internal employees have an awareness of common security problems. In this episode, Mike discusses phishing and whaling. This clip is from the chapter "Testing Infrastructure" of the series...
Instructional Video5:12
Curated Video

Speech Recognition and Speech Synthesis

Higher Ed
In this video, we will cover speech recognition and speech synthesis. This clip is from the chapter "Natural Language Processing (NLP) Workloads on Azure (15-20%)" of the series "AI-900: Microsoft Azure AI Fundamentals Video Course +...
Instructional Video11:06
TLDR News

How Washington Was Stormed By Trump Supporters: What Happens to Trump Now? - TLDR News

12th - Higher Ed
Yesterday, some people supporting the President stormed the Capitol Building in an attempt to disrupt the certification of Biden's Victory. This terrifying moment left a lot of people reeling, so in this video, we discuss what happens...
Instructional Video1:01
The Business Professor

Chartered Marketing Analyst

Higher Ed
Explanation of Chartered Marketing Analyst