Instructional Video10:08
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Understanding Malware and Anti-Malware Products

Higher Ed
In this video, you will learn about malware and the various anti-malware products. This clip is from the chapter "Personal Security" of the series "The Absolute Beginners Guide to Cybersecurity 2023 - Part 4".This section talks about...
Instructional Video1:11
Great Big Story

Inside Sweden's Pionen Data Centre, A High-Security Bunker

12th - Higher Ed
Tour the subterranean world of Pionen Data Centre, housed in a former nuclear bunker beneath Stockholm.
Instructional Video2:16
Curated Video

Propaganda Today

9th - Higher Ed
In the digital age, it’s never been easier for governments to influence our opinions and actions using propaganda. So what does propaganda actually look like in the 21st century – and how effective is it?
Instructional Video2:12
Curated Video

Browsing the Internet Safely

Higher Ed
The video highlights the tips on how to browse the internet safely and what are the risky habits to avoid over the internet
Instructional Video1:29:27
National Institute of Standards and Technology

Launch of the National Strategy for Trusted Identities in Cyberspace

9th - 12th
The Obama Administration released the National Strategy for Trusted Identities in Cyberspace (NSTIC) on April 15, 2011 during a meeting with about 250 business, government, and other leaders at the U.S. Chamber of Commerce in Washington,...
Instructional Video1:05
Next Animation Studio

TikTok secretly collected users’ MAC addresses: report

12th - Higher Ed
TikTok engaged in a banned data-collecting process that harvested highly personalized information from its users for more than a year, an investigation by the Wall Street Journal has found.
Instructional Video3:30
IDG TECHtalk

How to set up security in Office 365 to CIS recommendations

Higher Ed
Following the Center for Internet Security’s benchmarks and checklists, here’s how to configure Microsoft Office 365 for the security level you need.
Instructional Video5:25
IDG TECHtalk

Microsoft’s Windows, Office 365 advice for secure elections

Higher Ed
Microsoft has issued guidance and offered resources to help election officials and candidate campaigns to better protect their Windows and Office 365 systems.
Instructional Video6:19
IDG TECHtalk

The four pillars of Windows network security

Higher Ed
Multi-factor authentication, strong patch management, device control, and adherence to security benchmarks go a long way to protecting your Windows network.
News Clip4:59
Curated Video

Explainer: The Security Flaw That's Freaked Out The Internet

Higher Ed
A wide swath of critical industries, including electric power, water, food and beverage, manufacturing and transportation, were exposed.
News Clip3:31
Bloomberg

BlackBerry Wants to Teach You How to Defeat Hackers

Higher Ed
Feb. 25 -- BlackBerry Ltd. is building out a consultancy business to help companies and governments defend against hackers as it seeks new revenue streams. Bloomberg TV Canada's, Pamela Ritchie speaks with Bloomberg News' technology...
News Clip2:33
AFP News Agency

CLEAN : Ethiopia mobile internet still off after a week

9th - Higher Ed
Getting online remains difficult in Ethiopia as the country enters the second week of its nationwide internet shutdown even as the government falsely claimed the service had been restored
News Clip0:26
Curated Video

List Of U.S. Government Agency Cyberattacks Grows

Higher Ed
SolarWinds, the maker of the software targeted in the attack says thousands of its customers were also affected by the attack.
Instructional Video
Other

Netsafe Net Basics

9th - 10th
New Zealand-based cybersafety organization provides access to entertaining, educational animated videos on topics associated with online safety and media awareness. Find episodes on the dangers of downloading, firewalls, phishing,...
Instructional Video
PBS

Nova Labs: The Secret Lives of Hackers

9th - 10th
Hackers may not be who we think they are. In fact, you might be a hacker and not even know it. Learn the true meaning of hacking and some of the many reasons that hackers hack. [3:01]
Instructional Video
PBS

Nova Labs: Cyber Codes

9th - 10th
Do you trust the security of your email, text messages, and browser history? Learn how trustworthy online communication actually is and how encryption can protect your privacy. Sometimes. [3:25]
Instructional Video
PBS

Nova Labs: A Cyber Privacy Parable

9th - 10th
Follow the trials and tribulations of Tim as a seemingly innocent piece of digital information threatens to ruin his life when it falls into the wrong hands. [3:18]
Audio
Other

It Conversations: Future Proofing Your Privacy

9th - 10th
This podcast addresses the issue of protecting your privacy today with threats from identity theft, malware, government surveillance, and consumer profiling. Marc Hedlund speaks about how can we best protect our future selves from the...
Instructional Video
PBS

Pbs: Nova Science Now: Luis Von Ahn: Computer Scientist

9th - 10th
In this video meet Luis von Ahn, a computer scientist and a professor at Carnegie Mellon who had a most successful idea-CAPTCHA-a test that humans can pass but computers cannot, which has been used to improve the security of Internet...
Instructional Video
PBS

Pbs Learning Media: Online "Friends"

3rd - 5th
You know your friends in your neighborhood or at school because you see them almost every day, you play with them, sometimes you are in class with them, you see them at the store, the library, or the playground. On the Internet there are...