SciShow
5 More Computer Viruses You Really Don't Want to Get
From taking your files ransom to foiling uranium enrichment, here are five more computer viruses that you really want to avoid.
Crash Course
Cryptography: Crash Course Computer Science
Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting Mac OS with FileVault
In this video, you will learn about encrypting a Mac OS system with an encryption tool, FileVault.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting Windows 10 with Bitlocker
Another encryption tool available for the Windows 10 Operating system, Bitlocker, is explored here.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Disk Encryption
Here, you will learn about encryption and decryption, the two technologies applied to a hard drive.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to VPNs
In this lesson, we will examine the most famous anonymous tool, the virtual private network.
Curated Video
The Prime Number Code
Why prime numbers are the building blocks of encryption, used for information security, in cash machines and to hide your identity online. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Curated Video
Fundamentals of Secure Software - Encryption Use Cases
This video focuses on various use cases for encryption.
Curated Video
Fundamentals of Secure Software - Encryption Overview
This video provides an introduction and overview of encryption.
Curated Video
Fundamentals of Secure Software - Identification and Authentication Failures
This video explains identification and authentication failures.
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Creating a Personal Disaster Recovery Plan
In this video, you will learn to create your very own disaster recovery plan. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section talks about malware...
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Restore Lab
Database failure happens. How do you recover when a failure occurs? This video shows you how to restore a database in a disaster scenario so you can get back up and running quickly.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Encrypting Mass Storage
Securing mass storage is a critical aspect of system security. Make sure you know the many ways a system's mass storage can be encrypted. This clip is from the chapter "Implementing Mass Storage" of the series "CompTIA A+ Certification...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - The World Wide Web
The web puts a graphical face on the Internet. You access it via a web browser, connecting with HTTP (insecure) or HTTPS (secure). Certificates give you a resource for whether a website can be trusted. This clip is from the chapter "The...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Encrypting Mass Storage
Securing mass storage is a critical aspect of system security. Make sure you know the many ways a system's mass storage can be encrypted. This clip is from the chapter "Book Chapter 9 - Implementing Mass Storage" of the series "CompTIA...
Curated Video
CISSP Crash Course - Cryptanalytic Attacks
This video explains cryptographic attacks and malware attacks such as Ransomware. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture...
Curated Video
CISSP Crash Course - Cryptographic Solutions
This video explains cryptographic systems—asymmetric encryption and RSA algorithm. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Curated Video
HashiCorp Certified - Vault Associate Course - Vault Initialization
This video explains the process of initializing HashiCorp Vault, which is a one-time process that sets up the initial configuration and encryption key for Vault. You will need to initialize Vault when it is first provisioned, so this...
Curated Video
HashiCorp Certified - Vault Associate Course - Unsealing with Auto Unseal
This video focuses on the auto-unsealing feature in HashiCorp Vault, which is a mechanism to automatically unseal Vault when it is started or restarted. Now that you understand seal and unseal, how do we do it? Well, this video explains...
Curated Video
HashiCorp Certified - Vault Associate Course - Vault Data Protection
In this video, we will focus on how HashiCorp Vault protects sensitive data by providing robust encryption mechanisms and access control policies. You are storing lots of sensitive data in Vault, and we want Vault to protect it for you....
Curated Video
Getting Started with HashiCorp Nomad - Secure Gossip Encryption
In this video, we will understand the concept of gossip encryption. We will understand the use of encryption keys and how federation requires the same key on all other data centers. This clip is from the chapter "Securing Nomad" of the...
Curated Video
HashiCorp Certified - Vault Associate Course - Lab—Transit Secrets Engine
This is a lab video on Transit Secrets Engine. This clip is from the chapter "Compare and Configure Secrets Engines" of the series "HashiCorp Certified - Vault Associate Course".null
Curated Video
Alteryx Advanced - In-Database
In this video, we will explore in-database processing, which enables blending and analysis of large datasets without moving the data from the database. You will learn to use the input tool and the different data sources that support...
Curated Video
Real-World DevOps Project From Start to Finish - Traefik - Part 2
Continuing from Part 1, we will dive deeper into Traefik's configuration options. We will explore advanced routing techniques, including path-based routing and URL rewriting. Also, discover how to configure HTTPS with Let's Encrypt and...