Instructional Video6:09
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Password Cracking Demo

Higher Ed
Dan demonstrates how to use a password cracking tool to turn hashed passwords into cleartext. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces...
Instructional Video2:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 10 Ask Me Anything (AMA)

Higher Ed
Some physical security controls protect physical property which includes hardware IT devices. In this episode, IP cameras and CCTV are discussed. This clip is from the chapter "Physical Security" of the series "CompTIA Security+...
Instructional Video10:07
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Virtual Private Networks (VPNs)

Higher Ed
VPNs provide an encrypted network tunnel over the Internet to provide secure access to a remote network. Client-to-site VPNs allow individual device access where site-to-site VPNs can securely link branch offices over the Internet or...
Instructional Video6:16
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Proxy Servers

Higher Ed
Forward proxies sit between internal user devices and the Internet and fetch Internet content on behalf of internal users. Reverse proxies map public network service IPs to private IPs; they route client requests for a network service to...
Instructional Video9:06
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - SSH Public Key Authentication Lab

Higher Ed
Multifactor authentication should always be used for administrative accounts. In this demo, SSH public key authentication is configured for a Linux host. This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Instructional Video9:39
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - The 8 CISSP domains or CBKs (Common Bodies of Knowledge)

Higher Ed
Introduction: The 8 CISSP domains or CBKs (Common Bodies of Knowledge). This clip is from the chapter "Introduction" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp 2019".This section...
Instructional Video1:36
Curated Video

CISSP®- Introduction

Higher Ed
This video provides an introduction to the author of this course. This clip is from the chapter "Introduction" of the series "CISSP® Certification Domain 1: Security and Risk Management Video Boot Camp for 2022".This section provides an...
Instructional Video4:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Trust Models

Higher Ed
Web of trust is a mostly outdated method of proving identities, however it is helpful to understand as the predecessor of Public Key Infrastructure (PKI) which is widely used today. This clip is from the chapter "Cryptography" of the...
Instructional Video3:24
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 11 Exam Question Review

Higher Ed
Connecting to any Internet resource commonly uses DNS to resolve host names to IP addresses. In this episode, the viewer is presented with a DNS scenario and must determine which type of attack has occurred. This clip is from the chapter...
Instructional Video4:57
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Request Forgery Attacks

Higher Ed
Hijacked authenticated user sessions can result in Cross-Site Request Forgery (CSRF) attacks. This episode explains how these attacks occur and how they can be mitigated. This clip is from the chapter "Securing Dedicated Systems" of the...
Instructional Video1:36
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Data security frameworks

Higher Ed
CISM Domain 1: Information Security Governance: Data security frameworks This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security Governance Video...
Instructional Video16:07
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - How to reach your goal, in this case passing the CISM exam!

Higher Ed
How to study for the CISM certification and how to reach your goals: How to reach your goal, in this case passing the CISM exam! This clip is from the chapter "How to study for the CISM certification and how to reach your goals" of the...
Instructional Video5:00
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - I failed, now what should I do?

Higher Ed
The exam and life after it: I failed, now what should I do? This clip is from the chapter "The exam and life after it" of the series "CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019".Look into the steps...
Instructional Video4:22
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Why you should want to get CISM certified.

Higher Ed
Introduction: Why you should want to get CISM certified. This clip is from the chapter "Introduction" of the series "CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019".In this section, learn why you want...
Instructional Video5:22
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Other Layer 2 Attacks

Higher Ed
Layer 2 of the OSI model (Data Link layer) accessing network media and addressing using MAC addresses. MAC address flooding attacks and broadcast storms can be mitigated with network switches configuring with BPDU and STP. This clip is...
Instructional Video16:23
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Windows Command-Line Tools

Higher Ed
Security technicians must be comfortable with Windows commands for standard maintenance and security tasks using commands such as ping, netstat, and icalcs. This clip is from the chapter "Tools of the Trade" of the series "CompTIA...
Instructional Video11:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Linux Shells

Higher Ed
A Linux shell is a case-sensitive command line environment that supports scripting and comes in various flavors including Bash, Korn, and C shells. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+...
Instructional Video6:04
Curated Video

Course Introduction

Higher Ed
This clip is from the chapter "Introduction" of the series "AI-900: Microsoft Azure AI Fundamentals Video Course + Ques".Welcome to the course! Lets's take a quick introduction to the course.
Instructional Video2:17
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 9 Ask Me Anything (AMA)

Higher Ed
Some IT solutions are dedicated to serving specific functions. In this episode, Mike discusses the security aspect of using Zigbee devices. This clip is from the chapter "Securing Dedicated Systems" of the series "CompTIA Security+...
Instructional Video10:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Hardening

Higher Ed
There are many options for securing Wi-Fi networks. Disabling items such as WLAN name broadcast, DHCP, and public network management are the first consideration. Using WPA3 enterprise mode and changing default settings also help harden...
Instructional Video3:39
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Public Key Infrastructure

Higher Ed
In this episode, Mike discusses Public Key Infrastructure (PKI), used to enable commerce and other secure activities over the Internet. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601:...
Instructional Video2:03
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 11 Ask Me Anything (AMA)

Higher Ed
Securing web applications involves not only IT administrators but also software developers. In this episode, Mike provides a distinction between input validation and input sanitization. This clip is from the chapter "Securing Dedicated...
Instructional Video8:03
Science360

Research gov Site Demonstration Part 2 Grantee Services

12th - Higher Ed
Research gov is an exciting initiative that enables organizations and researchers to access streamlined research grants management services and other resources for multiple federal agencies in one location. This video provides a demo of...
Instructional Video2:02
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 8 Ask Me Anything (AMA)

Higher Ed
Virtual machines, often referred to as instances, are widely used both on-premises and in the cloud. This episode tackles issues related to being aware of deployed instances in the interest of reducing the attack surface. This clip is...