Hi, what do you want to do?
Curated Video
Email Security
This video will guide you on how to setup your email for optimal security in addition to tips on how to prevent malicious emails
Curated Video
What is Social Engineering
Social engineering is the psychological trickery used to get others to do things or reveal private information. Contrary to social engineering, which does not include disclosing sensitive information, this is a social science.
Curated Video
Protect Yourself from Phishing Attacks
The video explains the phishing attack techniques and how you can identify and avoid them.
Curated Video
What is a Phishing Attack
Phishing is a form of social engineering in which an attacker delivers a false message intended to dupe a person into giving up personal information to the attacker or to install harmful software, such as ransomware, on the victim's...
Curated Video
I WONDER - Why Should You Be Careful When Clicking On Online Links?
This video is answering the question of why should you be careful when clicking on online links.
Curated Video
Using Infinitives to Add Precise Meaning to Writing
In this video, the teacher explains how writers use infinitives to show purpose and add information in their writing. The students are guided through examples and practice exercises to identify infinitives and revise sentences using the...
The Wall Street Journal
Countering Digital Risk
Dick Clarke, former White House special advisor on cyberspace, on the accelerated efforts of cyber criminals. From ransomware attacks and supply chain compromises, to how continued state sponsored hacking means digital risk is greater...
The Wall Street Journal
Voya Financial's Raj Badhwar on Innovative Security For a Remote Workf
Voya Financial CISO, Raj Badhwar, outlines his approach to innovative cybersecurity for a distributed workforce.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Shells
Shells allow technicians to enter commands, such as a Linux bash shell or a Windows command prompt. Reverse shells are the result of infected victim machines that reach out to an attacker station.
r/>
This clip is from the...
r/>
This clip is from the...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - How Hard Is it to Get Hacked?
You will learn how hard it has become to hack into systems and company networks these days.
r/>
This clip is from the chapter "How Hard Is it to Get Hacked?" of the series "The Beginners 2022 Cyber Security Awareness Training...
r/>
This clip is from the chapter "How Hard Is it to Get Hacked?" of the series "The Beginners 2022 Cyber Security Awareness Training...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part III
In Part III of this module, you will continue to see several ways in which hackers and scammers are social engineering us, via emails and webpages. Even more major red flags are exposed so that these now become ingrained in our...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part I
In Part I of this engaging module, you will learn how targeted email phishing is executed against you, as well as recognize some of the major red flags to be able to readily detect these emails in the future.
r/>
This clip is...
r/>
This clip is...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part II
In Part II of this engaging module, you will continue to see new examples of targeted phishing emails, and to recognize some of the major red flags in them.
r/>
This clip is from the chapter "Targeted Email Phishing and Social...
r/>
This clip is from the chapter "Targeted Email Phishing and Social...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part IV
In Part IV of this entertaining module, you will learn the common patterns in all common social engineering attacks, how these are all very similar, and how they can be caught easily.
r/>
This clip is from the chapter "Targeted...
r/>
This clip is from the chapter "Targeted...
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - The Elements of Risk
This video explains the elements of risk.<br<br/>/>
This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to understand risk.
This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to understand risk.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Social Engineering
Tricking people into doing something or divulging sensitive information – this is social engineering. This episode discusses a pretext, or believable story, that often goes along with this type of activity.
r/>
This clip is...
r/>
This clip is...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Social Engineering Attack
This video explains the social engineering attacks, such as dumpster diving, shoulder surfing, and phishing. This clip is from the chapter "Protecting Your Network" of the series "CompTIA Network+ Certification N10-007: The Total...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Social Engineering
Lot's Of Interesting Bits Of Information: Social Engineering
r/>
This clip is from the chapter "Lot's Of Interesting Bits Of Information" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this...
r/>
This clip is from the chapter "Lot's Of Interesting Bits Of Information" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this...
National Institute of Standards and Technology
You've Been Phished!
NIST research reveal that context plays a critical factor in why users click or don’t click on a phishing email. Why do phishing emails remain so effective at disrupting our computer networks?
<
br/>
The paper published in...
<
br/>
The paper published in...
National Institute of Standards and Technology
Introducing Phish Scale - Rating Human Phishing Detection Difficulty
If your employees are online, they – and, by extension, your organization – are a target for phishing. Enter the phish scale. Created by NIST researchers using real data, this scale allows you to evaluate the quality and sophistication...
Curated Video
Beware of Holiday Phishing Scams on Social Media
The holiday season is a time for joy but also a time to be wary of hackers and phishing scams. Cheddar News explains.
Curated Video
Turkey cracks down as cybercrime rises amid pandemic
Country is among many that has seen an enormous increase in the number of phishing sites, designed to steal users' financial information.
Curated Video
Cyber scams surge during COVID-19 pandemic
Cybercrime experts say criminals are preying on anxious Canadians and technical vulnerability brought on by the coronavirus pandemic.
Curated Video
US sanctions Philippines tech firm tied to crypto scam network
The US government has imposed sanctions on a Philippines-based tech firm, Funnull Tech, accused of enabling a $200 million crypto scam. The firm's assets are frozen, and it's now blacklisted.