Instructional Video2:06
Curated Video

Email Security

Higher Ed
This video will guide you on how to setup your email for optimal security in addition to tips on how to prevent malicious emails
Instructional Video1:33
Curated Video

What is Social Engineering

Higher Ed
Social engineering is the psychological trickery used to get others to do things or reveal private information. Contrary to social engineering, which does not include disclosing sensitive information, this is a social science.
Instructional Video7:08
Curated Video

Protect Yourself from Phishing Attacks

Higher Ed
The video explains the phishing attack techniques and how you can identify and avoid them.
Instructional Video2:21
Curated Video

What is a Phishing Attack

Higher Ed
Phishing is a form of social engineering in which an attacker delivers a false message intended to dupe a person into giving up personal information to the attacker or to install harmful software, such as ransomware, on the victim's...
Instructional Video1:45
Curated Video

I WONDER - Why Should You Be Careful When Clicking On Online Links?

Pre-K - 5th
This video is answering the question of why should you be careful when clicking on online links.
Instructional Video8:50
Curated Video

Using Infinitives to Add Precise Meaning to Writing

K - 5th
In this video, the teacher explains how writers use infinitives to show purpose and add information in their writing. The students are guided through examples and practice exercises to identify infinitives and revise sentences using the...
Instructional Video28:51
The Wall Street Journal

Countering Digital Risk

Higher Ed
Dick Clarke, former White House special advisor on cyberspace, on the accelerated efforts of cyber criminals. From ransomware attacks and supply chain compromises, to how continued state sponsored hacking means digital risk is greater...
Instructional Video14:28
The Wall Street Journal

Voya Financial's Raj Badhwar on Innovative Security For a Remote Workf

Higher Ed
Voya Financial CISO, Raj Badhwar, outlines his approach to innovative cybersecurity for a distributed workforce.
Instructional Video6:18
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Shells

Higher Ed
Shells allow technicians to enter commands, such as a Linux bash shell or a Windows command prompt. Reverse shells are the result of infected victim machines that reach out to an attacker station.
r/>
This clip is from the...
Instructional Video2:38
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - How Hard Is it to Get Hacked?

Higher Ed
You will learn how hard it has become to hack into systems and company networks these days.
r/>
This clip is from the chapter "How Hard Is it to Get Hacked?" of the series "The Beginners 2022 Cyber Security Awareness Training...
Instructional Video4:12
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part III

Higher Ed
In Part III of this module, you will continue to see several ways in which hackers and scammers are social engineering us, via emails and webpages. Even more major red flags are exposed so that these now become ingrained in our...
Instructional Video4:48
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part I

Higher Ed
In Part I of this engaging module, you will learn how targeted email phishing is executed against you, as well as recognize some of the major red flags to be able to readily detect these emails in the future.
r/>
This clip is...
Instructional Video1:35
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part II

Higher Ed
In Part II of this engaging module, you will continue to see new examples of targeted phishing emails, and to recognize some of the major red flags in them.
r/>
This clip is from the chapter "Targeted Email Phishing and Social...
Instructional Video12:48
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part IV

Higher Ed
In Part IV of this entertaining module, you will learn the common patterns in all common social engineering attacks, how these are all very similar, and how they can be caught easily.
r/>
This clip is from the chapter "Targeted...
Instructional Video2:03
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - The Elements of Risk

Higher Ed
This video explains the elements of risk.<br<br/>/>

This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to understand risk.
Instructional Video5:58
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Social Engineering

Higher Ed
Tricking people into doing something or divulging sensitive information – this is social engineering. This episode discusses a pretext, or believable story, that often goes along with this type of activity.
r/>
This clip is...
Instructional Video3:56
Packt

CompTIA Network+ Certification N10-007: The Total Course - Social Engineering Attack

Higher Ed
This video explains the social engineering attacks, such as dumpster diving, shoulder surfing, and phishing. This clip is from the chapter "Protecting Your Network" of the series "CompTIA Network+ Certification N10-007: The Total...
Instructional Video9:01
Curated Video

Web Security: Common Vulnerabilities And Their Mitigation - Social Engineering

Higher Ed
Lot's Of Interesting Bits Of Information: Social Engineering
r/>
This clip is from the chapter "Lot's Of Interesting Bits Of Information" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this...
Instructional Video2:45
National Institute of Standards and Technology

You've Been Phished!

9th - 12th
NIST research reveal that context plays a critical factor in why users click or don’t click on a phishing email. Why do phishing emails remain so effective at disrupting our computer networks?
<

br/>

The paper published in...
Instructional Video2:02
National Institute of Standards and Technology

Introducing Phish Scale - Rating Human Phishing Detection Difficulty

9th - 12th
If your employees are online, they – and, by extension, your organization – are a target for phishing. Enter the phish scale. Created by NIST researchers using real data, this scale allows you to evaluate the quality and sophistication...
News Clip4:19
Curated Video

Beware of Holiday Phishing Scams on Social Media

9th - Higher Ed
The holiday season is a time for joy but also a time to be wary of hackers and phishing scams. Cheddar News explains.
News Clip5:35
Curated Video

Turkey cracks down as cybercrime rises amid pandemic

9th - Higher Ed
Country is among many that has seen an enormous increase in the number of phishing sites, designed to steal users' financial information.
News Clip3:49
Curated Video

Cyber scams surge during COVID-19 pandemic

9th - Higher Ed
Cybercrime experts say criminals are preying on anxious Canadians and technical vulnerability brought on by the coronavirus pandemic. 
News Clip1:39
Curated Video

US sanctions Philippines tech firm tied to crypto scam network

9th - Higher Ed
The US government has imposed sanctions on a Philippines-based tech firm, Funnull Tech, accused of enabling a $200 million crypto scam. The firm's assets are frozen, and it's now blacklisted.