Instructional Video10:17
SciShow

5 More Computer Viruses You Really Don't Want to Get

12th - Higher Ed
From taking your files ransom to foiling uranium enrichment, here are five more computer viruses that you really want to avoid.
Instructional Video12:00
Crash Course

Cryptography: Crash Course Computer Science

12th - Higher Ed
Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a...
Instructional Video1:00
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting Mac OS with FileVault

Higher Ed
In this video, you will learn about encrypting a Mac OS system with an encryption tool, FileVault.
Instructional Video2:09
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting Windows 10 with Bitlocker

Higher Ed
Another encryption tool available for the Windows 10 Operating system, Bitlocker, is explored here.
Instructional Video4:27
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Disk Encryption

Higher Ed
Here, you will learn about encryption and decryption, the two technologies applied to a hard drive.
Instructional Video4:56
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to VPNs

Higher Ed
In this lesson, we will examine the most famous anonymous tool, the virtual private network.
Instructional Video3:14
Curated Video

The Prime Number Code

6th - 12th
Why prime numbers are the building blocks of encryption, used for information security, in cash machines and to hide your identity online. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Instructional Video10:57
Curated Video

Fundamentals of Secure Software - Encryption Use Cases

Higher Ed
This video focuses on various use cases for encryption.
Instructional Video3:58
Curated Video

Fundamentals of Secure Software - Encryption Overview

Higher Ed
This video provides an introduction and overview of encryption.
Instructional Video3:56
Curated Video

Fundamentals of Secure Software - Identification and Authentication Failures

Higher Ed
This video explains identification and authentication failures.
Instructional Video3:18
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Creating a Personal Disaster Recovery Plan

Higher Ed
In this video, you will learn to create your very own disaster recovery plan. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section talks about malware...
Instructional Video4:19
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Restore Lab

Higher Ed
Database failure happens. How do you recover when a failure occurs? This video shows you how to restore a database in a disaster scenario so you can get back up and running quickly.
Instructional Video9:13
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Encrypting Mass Storage

Higher Ed
Securing mass storage is a critical aspect of system security. Make sure you know the many ways a system's mass storage can be encrypted. This clip is from the chapter "Implementing Mass Storage" of the series "CompTIA A+ Certification...
Instructional Video8:52
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - The World Wide Web

Higher Ed
The web puts a graphical face on the Internet. You access it via a web browser, connecting with HTTP (insecure) or HTTPS (secure). Certificates give you a resource for whether a website can be trusted. This clip is from the chapter "The...
Instructional Video9:13
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - Encrypting Mass Storage

Higher Ed
Securing mass storage is a critical aspect of system security. Make sure you know the many ways a system's mass storage can be encrypted. This clip is from the chapter "Book Chapter 9 - Implementing Mass Storage" of the series "CompTIA...
Instructional Video5:44
Curated Video

CISSP Crash Course - Cryptanalytic Attacks

Higher Ed
This video explains cryptographic attacks and malware attacks such as Ransomware. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture...
Instructional Video11:01
Curated Video

CISSP Crash Course - Cryptographic Solutions

Higher Ed
This video explains cryptographic systems—asymmetric encryption and RSA algorithm. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on...
Instructional Video4:48
Curated Video

HashiCorp Certified - Vault Associate Course - Vault Initialization

Higher Ed
This video explains the process of initializing HashiCorp Vault, which is a one-time process that sets up the initial configuration and encryption key for Vault. You will need to initialize Vault when it is first provisioned, so this...
Instructional Video4:29
Curated Video

HashiCorp Certified - Vault Associate Course - Unsealing with Auto Unseal

Higher Ed
This video focuses on the auto-unsealing feature in HashiCorp Vault, which is a mechanism to automatically unseal Vault when it is started or restarted. Now that you understand seal and unseal, how do we do it? Well, this video explains...
Instructional Video2:49
Curated Video

HashiCorp Certified - Vault Associate Course - Vault Data Protection

Higher Ed
In this video, we will focus on how HashiCorp Vault protects sensitive data by providing robust encryption mechanisms and access control policies. You are storing lots of sensitive data in Vault, and we want Vault to protect it for you....
Instructional Video3:52
Curated Video

Getting Started with HashiCorp Nomad - Secure Gossip Encryption

Higher Ed
In this video, we will understand the concept of gossip encryption. We will understand the use of encryption keys and how federation requires the same key on all other data centers. This clip is from the chapter "Securing Nomad" of the...
Instructional Video14:49
Curated Video

HashiCorp Certified - Vault Associate Course - Lab—Transit Secrets Engine

Higher Ed
This is a lab video on Transit Secrets Engine. This clip is from the chapter "Compare and Configure Secrets Engines" of the series "HashiCorp Certified - Vault Associate Course".null
Instructional Video10:03
Curated Video

Alteryx Advanced - In-Database

Higher Ed
In this video, we will explore in-database processing, which enables blending and analysis of large datasets without moving the data from the database. You will learn to use the input tool and the different data sources that support...
Instructional Video8:15
Curated Video

Real-World DevOps Project From Start to Finish - Traefik - Part 2

Higher Ed
Continuing from Part 1, we will dive deeper into Traefik's configuration options. We will explore advanced routing techniques, including path-based routing and URL rewriting. Also, discover how to configure HTTPS with Let's Encrypt and...