Instructional Video12:13
Curated Video

Becoming a Cyber Security Professional - A Beginner's Career Guide - Bug Hunter

Higher Ed
In this lesson, the author discusses a very popular career role, bug hunting and explains the role and the intricacies and criteria for the role if you are looking to become a bug hunter.
Instructional Video3:06
Curated Video

Becoming a Cyber Security Professional - A Beginner's Career Guide - Security Architect

Higher Ed
In this video, we will explore the roles of security officers including that of a security architect, which is a senior position.
Instructional Video5:40
Curated Video

Becoming a Cyber Security Professional - A Beginner's Career Guide - Security Analyst

Higher Ed
The first kind of job discussed in this lecture is the role of a security analyst, the prerequisites and paygrades of the job, and other information.
Instructional Video0:57
Curated Video

Becoming a Cyber Security Professional - A Beginner's Career Guide - Introduction

Higher Ed
This introductory video talks about the various career roles in brief and outlines the various components required to become a successful cybersecurity professional.
Instructional Video5:57
Curated Video

Becoming a Cyber Security Professional - A Beginner's Career Guide - Soft Skills – Part 2

Higher Ed
This video continues from where we left off in the previous and talks about how to communicate effectively and why it is so important to be able to communicate effectively.
Instructional Video6:20
Curated Video

Becoming a Cyber Security Professional - A Beginner's Career Guide - Soft Skills – Part 1

Higher Ed
This video discusses the importance of soft skills and the importance of being able to communicate effectively and in a likeable manner.
Instructional Video15:11
Curated Video

Becoming a Cyber Security Professional - A Beginner's Career Guide - The Most Essential Skills to Learn

Higher Ed
This video illustrates the essential skills that are required to be inculcated and the practical skill sets required to learn and build a cybersecurity professional career.
Instructional Video2:16
Curated Video

Becoming a Cyber Security Professional - A Beginner's Career Guide - You Don't need a Degree?

Higher Ed
In this video, you will learn whether it is important to have a degree or not for a career in this industry, if so, what degrees are best suited for these job roles.
Instructional Video3:44
Curated Video

Becoming a Cyber Security Professional - A Beginner's Career Guide - Four Things You Must Know about a Cyber Security Career

Higher Ed
This video elaborates on the concepts of cybersecurity briefly and outlines the prerequisites of starting a career in this discipline.
Instructional Video5:57
Curated Video

Becoming a Cyber Security Professional - A Beginner's Career Guide - Start and Grow your Career in Cyber Security

Higher Ed
This brief overview talks about the course and cybersecurity in general and how this course could benefit you if you are planning to build a career in this industry.
Instructional Video6:52
Curated Video

Risk Management for Cyber Security Managers - Standards

Higher Ed
This video provides an overview of the crucial role standards play in risk management, distinguishing between regulatory and non-regulatory standards, and introduces the main cybersecurity risk management frameworks from NIST and ISO.
Instructional Video11:59
Curated Video

CISSP Crash Course - Security Governance

Higher Ed
This video explains security policy and how to apply security governance.
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on...
Instructional Video1:05
Curated Video

Ensuring Information Security: Challenges and Preparations for Major Events

Pre-K - Higher Ed
The video discusses the importance of information security in the world of technology, highlighting the potential threats from organized crime and individual hackers. It also mentions the massive undertaking of ensuring information...
Instructional Video22:16
Curated Video

Risk Management

Higher Ed
Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings. These risks stem from a variety of sources including financial uncertainties, legal liabilities, technology...
Instructional Video21:29
Curated Video

AWS Security Boiled Down

Higher Ed
A general overview about AWS security architecture and tools. Learn more about VPC, EC2, S3, AIM, Security Groups, and NACLs. This video will give you a quick jump into cloud security.
Instructional Video3:59
Curated Video

Mobile Attack Surface

Higher Ed
In this video, you will get an overview on the different types of threats that affect a mobile application.
Instructional Video9:47
Curated Video

Types of Data

Higher Ed
On social networking sites like Facebook, Twitter, and Linked in, as well as online photo sharing sites like Instagram and Picasa and video sharing sites like YouTube, users are producing a lot of data. Blogs, email, text messages on...
Instructional Video15:32
Curated Video

Create a Simple SIEM

Higher Ed
Learn the basic feature of SIEM solutions; logs aggregation using Powershell commands.
Instructional Video1:51
Curated Video

Who is Selling Your Email Addresses

Higher Ed
This video will help you identify those companies you sign up to, who in return sell your email addresses to companies who will spam you. You can easily identify those now.
Instructional Video6:27
Curated Video

Hack Using Google ONLY

Higher Ed
You will learn how to easily perform hacking using search engines and publicly available information. Find passwords, confidential files, and gain access to systems with minimum efforts.
Instructional Video4:28
Curated Video

DKIM Email Security

Higher Ed
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Instructional Video4:12
Curated Video

Hack Using a Rogue Access Point

Higher Ed
In this tutorial, you will learn how to create a fake wireless access point and use it to hack the users logged on to it. We will use WiFi Pineapple device.
Instructional Video5:21
Curated Video

DNS Poisoning Attack

Higher Ed
In this video, you will use KALI to learn how to cache poison the DNS (Domain Name Server) entries to redirect the requester to a different page.
Instructional Video9:04
Curated Video

Risk Analysis

Higher Ed
Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects. This process is done in order to help organizations avoid or mitigate those risks.