Instructional Video6:19
Curated Video

Practical Cyber Hacking Skills for Beginners - The Hacking Methodology

Higher Ed
Here, you will learn more about the different hacking methodologies that hackers employ to cause harm to a system or a network and also understand the possibilities of minimizing the attacks.
Instructional Video8:03
Curated Video

Practical Cyber Hacking Skills for Beginners - Social Engineering

Higher Ed
This video discusses social engineering concepts, understanding the human psyche, and how hackers manipulate the human mind to hack.
Instructional Video5:32
Curated Video

Practical Cyber Hacking Skills for Beginners - The Bad Guys - Black Hats, Cyber Criminals and Disgruntled Employees

Higher Ed
Here, you will learn more about hackers, how they operate, their intentions, and how they differ based on the hacking methodologies.
Instructional Video9:09
Curated Video

Build and Learn ASP.NET 6.0 Blazor Hands-On - Lifecycle Methods (Code Example) - SetParametersAsync

Higher Ed
This lecture discusses the SetParametersAsync method, which is the first method called in a component's lifecycle. This clip is from the chapter "Advanced Concepts with Hands-On Coding in Blazor" of the series "Build and Learn ASP.NET...
Instructional Video11:08
Curated Video

Risk Management for Cyber Security Managers - Business Continuity and Disaster Recovery Plans

Higher Ed
This video elaborates on how an organization can develop a plan for continuity or recovery when a cyber-attack occurs.
Instructional Video5:28
Curated Video

Risk Management for Cyber Security Managers - Ethical Hacking and Pen Testing

Higher Ed
In this video, we will discuss ethical hacking and penetration testing and how we can use these techniques to mitigate cyber risks in an organization.
Instructional Video8:19
Curated Video

Risk Management for Cyber Security Managers - Implementation of Security Controls

Higher Ed
This lesson will look at the practical methods available to implement security controls in order to avoid/mitigate risks.
Instructional Video3:07
Curated Video

Risk Management for Cyber Security Managers - Risk Acceptance and Risk Rejection

Higher Ed
In this lesson, you will learn the options when we cannot mitigate risk, transfer risk, or avoid a hazard.
Instructional Video3:32
Curated Video

Risk Management for Cyber Security Managers - Risk Avoidance

Higher Ed
This is the second way we can respond to a certain kind of risk and learn how to avoid risks at all costs.
Instructional Video5:16
Curated Video

Risk Management for Cyber Security Managers - Risk Identification

Higher Ed
We will look at the first step in cyber risk management: cyber risk identification.
Instructional Video7:12
Curated Video

Risk Management for Cyber Security Managers - Types of Risks

Higher Ed
In this lesson, we will look at the different risks that a company, an organization, or a system might face from a business perspective.
Instructional Video3:36
Curated Video

Risk Management for Cyber Security Managers - What Is Risk?

Higher Ed
This video explains what constitutes a risk in terms of a business, a functioning system, or all kinds of assets.
Instructional Video4:41
Curated Video

Risk Management for Cyber Security Managers - Third-Party Cyber Risk Management

Higher Ed
This video elaborates on the various options for transferring or outsourcing risk management to a third party or a vendor.
Instructional Video2:54
Curated Video

Risk Management for Cyber Security Managers - Information Security Controls

Higher Ed
After learning to classify information differently, we will discuss the kinds of security controls available to us to avoid/control risks.
Instructional Video1:49
Curated Video

Risk Management for Cyber Security Managers - Information Classification

Higher Ed
In this lesson, you will learn how to classify information to understand how to mitigate risks in the most efficient manner.
Instructional Video1:15
Curated Video

Risk Management for Cyber Security Managers - Risk Transference

Higher Ed
In this video, we will look at risk transference, the third significant way we can adopt to mitigate cyber risks in an organization.
Instructional Video4:35
Curated Video

Risk Management for Cyber Security Managers - Threats and Adversaries

Higher Ed
Here, we will discuss the different kinds of threats that you might face as a cyber risk manager.
Instructional Video3:14
Curated Video

Risk Management for Cyber Security Managers - Risk Management as a Profession

Higher Ed
In this video, the author discusses the pros and cons of risk management as a profession and how to go about it for those interested in this.
Instructional Video4:11
Curated Video

Get Hired: LGBTQ+ in the Workplace

9th - Higher Ed
We have made great strides when it comes to being a more inclusive society, and respecting all people for who they are. However, change rarely happens overnight and many in the LGBTQ community may feel hesitation and skepticism about...
Instructional Video10:40
Curated Video

Inside the Fight to Save an Ancient Forest

9th - Higher Ed
The ancient forests of the Pacific Northwest are home to giant trees and many secrets, which science is just beginning to understand. But these forests are at risk of disappearing. In British Columbia on First Nations territory, a small...
Instructional Video3:01
Curated Video

Answering Interview Questions

3rd - Higher Ed
“Answering Interview Questions” explores appropriate responses to interview questions.
Instructional Video3:31
Curated Video

Cumulative Frequency: You're Fired?

6th - 12th
Revealed: Enron's brutal 'rank or yank' policy, and how employees could use cumulative frequency graphs to find out whether they were in the top 20% to be rewarded, or the bottom 20% to be fired. Maths - Statistics And Probability A Twig...
Instructional Video3:31
Curated Video

Namibia: Ecotourism

6th - 12th
How an alliance between government, an international tour operator, and a local community has created a mutually beneficial tourism business venture. Human Geography - Orientation And Settlements - Namibia, in southern Africa, now enjoys...
Instructional Video3:26
Curated Video

Why Do Shares Change Price?

6th - 12th
What are shares, and what affects their price? Discover why share price is not only dictated by monetary value, and why this makes trading a risky business. Maths - Statistics And Probability A Twig Math Film. Reinforce and extend the...