Instructional Video5:53
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Identity Management Systems

Higher Ed
How can authentication be removed from individual apps? The answer is identity federation, which uses a centralized identity provider that is trusted by resources, such as Web apps, and can also support single sign-on (SSO). This clip is...
Instructional Video13:03
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Intrusion Detection and Prevention Systems (IDS/IPS)

Higher Ed
Intrusion detection can detect, log, report, and send alerts when suspicious activity is detected on a host or on the network, whereas intrusion prevention can be configured to stop the suspicious activity. Anomaly detection can be...
Instructional Video9:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Penetration Testing

Higher Ed
This episode focuses on how penetration testing discovers and exploits security vulnerabilities. Concepts covered include known, partially known, and unknown testing types as well as the role that red, white, blue, and purple teams play....
Instructional Video31:47
The Wall Street Journal

How to Choose a Cybersecurity Vendor

Higher Ed
How can your business navigate among the many firms and choose the vendor that fits with your risks. We look at how you should manage the relationship, what questions you should ask and what pitfalls should you avoid.
Instructional Video6:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Agreement Types

Higher Ed
When organizations enter into business partnerships with third-party service providers, the agreements and contracts they both sign protect both organizations legally, as well as establish the terms of service. This episode covers the...
Instructional Video11:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Mobile Device Deployment and Hardening

Higher Ed
Organizations normally allow the use of personal or work-issued mobile devices for work purposes through provisioning schemes such as Bring Your Own Device (BYOD) and Choose Your Own Device (CYOD). This episode also discusses Subscriber...
Instructional Video10:53
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Connecting to Dedicated and Mobile Systems

Higher Ed
There are many modern wireless communication standards. This episode discussed the Global Positioning System (GPS), 4G and 5G cellular, Wi-Fi Direct, and mobile device tethering. This clip is from the chapter "Securing Dedicated Systems"...
Instructional Video10:21
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing the Cloud

Higher Ed
Cloud security is generally split between the Cloud Service Provider (CSP) and the cloud tenant, depending on which type of cloud service is being used. Security solutions include firewalls, data loss prevention tools as well as a Cloud...
Instructional Video13:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Malware

Higher Ed
Malicious software is referred to as malware and includes various types including ransomware, fileless viruses, worms, keyloggers, and trojan horses. Infected computers that periodically contact command and control servers are called...
Instructional Video12:14
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Digital Forensics

Higher Ed
The application of computer science to legal situations include evidence gathering is referred to as digital forensics. This episode covers e-discovery and steganography. This clip is from the chapter "Dealing with Incidents" of the...
Instructional Video17:30
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy-Segment 2

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Instructional Video8:21
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Coverage and Performance

Higher Ed
Optimizing Wi-Fi communication means ensuring there is proper coverage over a given area and that there are no wireless interference issues from other transmitting devices. A wireless site survey with a heat map can identify overlapping...
Instructional Video13:20
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Embedded Systems

Higher Ed
Embedded systems use an operating system burned into one or more chips and have a defined function, such as running an elevator or proving Wi-Fi services. In this episode, Industrial Control Systems, Internet of Things (IoT), Raspberry...
Instructional Video8:02
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Web Application Security

Higher Ed
The OWASP Top 10 identifies common web application attacks. This episode also discusses secure coding practices that should be applied to each System (Or Software) Development Life Cycle (SDLC) phase. This clip is from the chapter...
Instructional Video8:38
Curated Video

Factors Affecting Food Security: Increasing Population, Changing Diets, Pests and Pathogens, Environmental Changes, and More

Higher Ed
In this video lecture, the speaker discusses the concept of food security and the various factors that affect it. They begin by explaining that food security means having enough food to feed a population, and then go on to discuss the...
Instructional Video40:54
The Wall Street Journal

Refocusing The U.S. vs. China Debate: The Future For Tech Innovation

Higher Ed
At WSJ Tech Live, Ron Kirk, Clete Willems, Andy Purdy, and Edith Young debate the future roadmap for tech innovation in the U.S. and China.
Instructional Video1:18
Next Animation Studio

North Korea destroys north-south joint liaison office: report

12th - Higher Ed
North Korea blew up the joint liaison office in the border city of Kaesong used for bettering ties with South Korea after days of rising tensions on June 16.
Instructional Video13:41
Hip Hughes History

The DREAMers and DACA Explained

6th - 12th
Who are the DREAMers and what is DACA? Why does President Drumpf want to repeal it and who supports it? A comprehensive look at immigration reform at it relates to this crucial issue.
Instructional Video9:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Security and the Information Life Cycle

Higher Ed
Security must be applied to all phases of the information life cycle, from collection to its eventual archiving and deletion. This includes data security techniques such as tokenization and masking while considering how laws apply to...
Instructional Video3:45
The Business Professor

Employee Retirement Income Security Act ( ERISA)

Higher Ed
Employee Retirement Income Security Act ( ERISA)
Instructional Video23:58
Globalive Media

Beyond Innovation: Episode 14

Higher Ed
Researchers send smells over the Internet, a startup brings the eBay model to the trucking industry and a flying car comes closer to becoming a reality. Plus, famous geneticist George Church explains why he’s willing to pay you to...
Instructional Video3:17
Science360

Computer scientist sees new possibilities for ocular biometrics

12th - Higher Ed
While many of us rely on passwords to protect our identity, there's more sophisticated identity recognition technology called biometrics that we could use. Security measures that use biometrics rely on a person's unique characteristics...
Instructional Video12:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - The OSI Model

Higher Ed
Is there a standard model for describing and mapping network hardware and software? Yes, the 7-layer conceptual OSI model! Understanding network security and selecting the appropriate security solutions requires a solid understanding of...
Instructional Video1:18
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 3 Ask Me Anything (AMA) "Identity and Account Management"

Higher Ed
Authentication can be configured and managed within a single organization to control access to IT resources. This episode covers identity federation and its relationship to identity and resource providers. This clip is from the chapter...