TED Talks
TED: How fake handbags fund terrorism and organized crime | Alastair Gray
What's the harm in buying a knock-off purse or a fake designer watch? According to counterfeit investigator Alastair Gray, fakes like these fund terrorism and organized crime. Learn more about the trillion-dollar underground economy of...
SciShow
Underwater Discovery and Adventure: The Story of Jacques Cousteau
Learn about the famous red hat wearing underwater explorer Jacques Cousteau!
TED Talks
TED: The best career path isn't always a straight line | Sarah Ellis, Helen Tupper
Conventional wisdom frames the ideal career path as a linear one -- a ladder to be climbed with a single-minded focus to get to the top. Career development consultants Sarah Ellis and Helen Tupper invite you to replace this outdated and...
Brainwaves Video Anthology
Karin Hurt - Teachers Make a Difference - Dr. Henry Sims
Karin Hurt inspires courage confidence, and innovation. A former Verizon Wireless executive, she’s known for growing courageous leaders, building great cultures, and inspiring high-performance teams. She’s the award Winning Author of...
Communication Coach Alex Lyon
How to Lead by Example in 4 Ways
How to lead by example in 4 important ways.
Curated Video
Living Green - Episode 97 - Green TV
UK based Internet channel Green TV is proving to be a big hit with web audiences. Based in London, Green TV uses the latest technology to showcase interviews, debates, music videos and viral campaigns from green organisations as well as...
Wonderscape
The Green Guardians: Trees and the Fight Against Deforestation
Explore the critical role trees play in our environment, from providing essential resources like food, shelter, and oxygen to combating climate change by absorbing carbon dioxide. Learn about the challenges of deforestation and how it...
Curated Video
The CISO Masterclass - Career Path to vCISO
In this video, explore the exciting opportunities and challenges of transitioning to a virtual CISO (vCISO) role and the unique career path it offers.
Curated Video
The CISO Masterclass - DevSecOps and the Role of CISO
This video highlights the growing importance of DevSecOps and the pivotal role that CISOs play in integrating security into the development process.
Curated Video
The CISO Masterclass - Know Your Role
In this video, delve into the key aspects of understanding and defining your role as a CISO within your organization.
Curated Video
The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Should Contracts Be Allowed to Receive Funds? (Thought Experiment)
In the world of blockchain and cryptocurrencies, smart contracts have the ability to receive and transfer funds. However, this raises the question of whether contracts should be allowed to receive funds or not. On one hand, allowing...
Curated Video
Fundamentals of Secure Software - PCI DSS (Payment Card Industry Data Security Standard)
This video explains the PCI DSS (Payment Card Industry Data Security Standard) and its purpose.
Curated Video
Fundamentals of Secure Software - Security Logging and Monitoring Failures
This video demonstrates insecure logging.
Curated Video
Fundamentals of Secure Software - Software and Data Integrity Failures
This video talks about software and data integrity failures.
Curated Video
Fundamentals of Secure Software - Cryptographic Failures
This video explains what sensitive data exposure is and talks about cryptographic failures.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - AWS Control Tower
This video will explore the features and benefits of using AWS Control Tower to manage multiple AWS accounts.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Recycling and Data Destruction
Disposing of old computer gear means using environmentally friendly methods and wiping all your data from any storage devices. Batteries in computers need to go to special recycling centers. Data wiping methods take many forms, from...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Incident Response
Although procedures can vary among companies, the CompTIA A+ objectives follow a logical set of responses. This video describes each step. This clip is from the chapter "Securing Computers" of the series "CompTIA A+ Certification Core 2...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Cloud Ownership
In this episode, Mike looks at concepts of security, ownership, and access to cloud resources. Specifically, he explores the differences among public, private, hybrid, and community cloud computing. This clip is from the chapter "Book...
Curated Video
CISSP Crash Course - Security in the SDLC
This video explains security in the SDLC, methodologies, and maturity models. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Curated Video
CISSP Crash Course - Secure Communication
This video explains how to implement secure communication. This clip is from the chapter "Communication and Network Security" of the series "CISSP Crash Course".This section covers domain 4, which focuses on communication and network...
Curated Video
CISSP Crash Course - Collect Security Process Data
This video explains collecting security process data and account management and review. This clip is from the chapter "Security Assessment and Testing" of the series "CISSP Crash Course".This section covers domain 6, which focuses on...
Curated Video
HashiCorp Certified - Vault Associate Course - Benefits and Use Cases of Vault
This video outlines the benefits and various use cases of HashiCorp Vault. Learn all the cool things that Vault has to offer organizations that decide to use it to protect their secrets and other data. This clip is from the chapter...
Curated Video
HashiCorp Certified - Vault Associate Course - Why Organizations Choose Vault
This video explains why organizations choose HashiCorp Vault as their go-to solution for managing secrets and sensitive data. This clip is from the chapter "Introduction to Vault" of the series "HashiCorp Certified - Vault Associate...