Hi, what do you want to do?
Curated Video
CISSP Crash Course - Design and Validate Assessment, Test, and Audit
This video explains design and validate assessment, tests, internal and external audits.
<
br/>
This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which...
<
br/>
This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which...
Curated Video
CISSP Crash Course - Identity Lifecycle
This video explains the identity and access lifecycle along with access review.
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on...
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on...
Curated Video
CISSP Crash Course - Implement and Manage Authorization
This video explains how to implement and manage authorization.
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and...
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and...
Curated Video
CISSP Crash Course - Control Physical and Logical Access
This video explains control physical and logical access as well as type of assets that are part of a system.
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section...
<
br/>
This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section...
Curated Video
CISSP Crash Course - Security in Systems Part 2
This video continues talking about security in systems, microservices, and containerization.
<
br/>
This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which...
<
br/>
This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which...
Curated Video
CISSP Crash Course - Architecture and Design
This video explains architecture and design and takes us through what’s inside a system.
<
br/>
This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which...
<
br/>
This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which...
Curated Video
CISSP Crash Course - Security Capabilities
This video explains security capabilities of information systems.
<
br/>
This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and...
<
br/>
This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and...
Curated Video
CISSP Crash Course - Security Controls from Requirements
This video explains common criteria guidelines for security controls.
<
br/>
This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture...
<
br/>
This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture...
Curated Video
CISSP Crash Course - Security Controls and Compliance Requirements
This video explains security controls, security controls baseline, and compliance requirements.
<
br/>
This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on...
<
br/>
This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on...
Curated Video
CISSP Crash Course - Asset Retention
This video explains asset retention, end-of-life, end-of-support, and end-of-service-life.
<
br/>
This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset...
<
br/>
This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset...
Curated Video
CISSP Crash Course - Data Roles
This video explains data roles, data owner, and asset owner in domain 2.
<
br/>
This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data,...
<
br/>
This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data,...
Curated Video
CISSP Crash Course - Secure Provisioning
This video explains ownership and secure provisioning in asset security.
<
br/>
This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data,...
<
br/>
This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data,...
Curated Video
CISSP Crash Course - Information Assets
This video explains information assets and data classification.
<
br/>
This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and...
<
br/>
This clip is from the chapter "Asset Security" of the series "CISSP Crash Course".This section covers domain 2, which focuses on asset security, data, and...
Curated Video
CISSP Crash Course - Threat Modeling
This video explains threat modeling and identifying threats.
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Curated Video
CISSP Crash Course - Personnel Security Policies and Procedures
This video explains personnel security policies and procedures.
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and...
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and...
Curated Video
CISSP Crash Course - Policy, Standards, Procedures, and Guidelines
This video explains policy, standards, procedures, and guidelines.
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and...
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and...
Curated Video
CISSP Crash Course - Security Concepts
This video explains some basic security topics.<br<br/>/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk management.
Curated Video
The Eradication of Smallpox: A Triumph of Medicine and Collaboration
This video provides a brief history of smallpox, highlighting the efforts of ancient civilizations and the breakthrough discovery by Edward Jenner that led to the development of a smallpox vaccine. It also discusses the global initiative...
Curated Video
Marriage, Male Friendship, and Desire in A Midsummer Night's Dream
This video discusses the assumptions about marriage and male friendships in early modern England, exploring how committed relationships between men could be seen as more important than marriages. It examines how Shakespeare's plays,...
Great Big Story
Secrets of the elusive Rowley's Palm Pit viper
Explore the rare and venomous Rowley's Palm Pit Viper, a hidden gem of southern Mexico's forests.
Curated Video
Comanche Part 2
Travel to the Old Fort Parker and Ft. Sill, Oklahoma and learn about the Comanche and the Red River Wars.
Curated Video
Endangered and Extinct
Dr. Forrester explains how humans have had one of the most significant impacts on the environment.
Curated Video
What is Marine Conservation?
Marine Conservation is the protection and preservation of ocean ecosystems, with a focus on limiting the damage caused to them by humans and preserving threatened marine species. I’m joined in this video by Alex Collins, a fellow...
Curated Video
Life in the Colonies: Indigenous Communities
The arrival of Europeans and creation of the 13 colonies led to immense challenges and profound changes for Indigenous peoples.