Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Identity Management Systems
How can authentication be removed from individual apps? The answer is identity federation, which uses a centralized identity provider that is trusted by resources, such as Web apps, and can also support single sign-on (SSO). This clip is...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Intrusion Detection and Prevention Systems (IDS/IPS)
Intrusion detection can detect, log, report, and send alerts when suspicious activity is detected on a host or on the network, whereas intrusion prevention can be configured to stop the suspicious activity. Anomaly detection can be...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Penetration Testing
This episode focuses on how penetration testing discovers and exploits security vulnerabilities. Concepts covered include known, partially known, and unknown testing types as well as the role that red, white, blue, and purple teams play....
The Wall Street Journal
How to Choose a Cybersecurity Vendor
How can your business navigate among the many firms and choose the vendor that fits with your risks. We look at how you should manage the relationship, what questions you should ask and what pitfalls should you avoid.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Agreement Types
When organizations enter into business partnerships with third-party service providers, the agreements and contracts they both sign protect both organizations legally, as well as establish the terms of service. This episode covers the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Mobile Device Deployment and Hardening
Organizations normally allow the use of personal or work-issued mobile devices for work purposes through provisioning schemes such as Bring Your Own Device (BYOD) and Choose Your Own Device (CYOD). This episode also discusses Subscriber...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Connecting to Dedicated and Mobile Systems
There are many modern wireless communication standards. This episode discussed the Global Positioning System (GPS), 4G and 5G cellular, Wi-Fi Direct, and mobile device tethering. This clip is from the chapter "Securing Dedicated Systems"...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing the Cloud
Cloud security is generally split between the Cloud Service Provider (CSP) and the cloud tenant, depending on which type of cloud service is being used. Security solutions include firewalls, data loss prevention tools as well as a Cloud...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Malware
Malicious software is referred to as malware and includes various types including ransomware, fileless viruses, worms, keyloggers, and trojan horses. Infected computers that periodically contact command and control servers are called...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Digital Forensics
The application of computer science to legal situations include evidence gathering is referred to as digital forensics. This episode covers e-discovery and steganography. This clip is from the chapter "Dealing with Incidents" of the...
National Institute of Standards and Technology
Cybersecurity and Innovation in the Information Economy-Segment 2
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Coverage and Performance
Optimizing Wi-Fi communication means ensuring there is proper coverage over a given area and that there are no wireless interference issues from other transmitting devices. A wireless site survey with a heat map can identify overlapping...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Embedded Systems
Embedded systems use an operating system burned into one or more chips and have a defined function, such as running an elevator or proving Wi-Fi services. In this episode, Industrial Control Systems, Internet of Things (IoT), Raspberry...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Web Application Security
The OWASP Top 10 identifies common web application attacks. This episode also discusses secure coding practices that should be applied to each System (Or Software) Development Life Cycle (SDLC) phase. This clip is from the chapter...
Curated Video
Factors Affecting Food Security: Increasing Population, Changing Diets, Pests and Pathogens, Environmental Changes, and More
In this video lecture, the speaker discusses the concept of food security and the various factors that affect it. They begin by explaining that food security means having enough food to feed a population, and then go on to discuss the...
The Wall Street Journal
Refocusing The U.S. vs. China Debate: The Future For Tech Innovation
At WSJ Tech Live, Ron Kirk, Clete Willems, Andy Purdy, and Edith Young debate the future roadmap for tech innovation in the U.S. and China.
Next Animation Studio
North Korea destroys north-south joint liaison office: report
North Korea blew up the joint liaison office in the border city of Kaesong used for bettering ties with South Korea after days of rising tensions on June 16.
Hip Hughes History
The DREAMers and DACA Explained
Who are the DREAMers and what is DACA? Why does President Drumpf want to repeal it and who supports it? A comprehensive look at immigration reform at it relates to this crucial issue.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Security and the Information Life Cycle
Security must be applied to all phases of the information life cycle, from collection to its eventual archiving and deletion. This includes data security techniques such as tokenization and masking while considering how laws apply to...
The Business Professor
Employee Retirement Income Security Act ( ERISA)
Employee Retirement Income Security Act ( ERISA)
Globalive Media
Beyond Innovation: Episode 14
Researchers send smells over the Internet, a startup brings the eBay model to the trucking industry and a flying car comes closer to becoming a reality. Plus, famous geneticist George Church explains why he’s willing to pay you to...
Science360
Computer scientist sees new possibilities for ocular biometrics
While many of us rely on passwords to protect our identity, there's more sophisticated identity recognition technology called biometrics that we could use. Security measures that use biometrics rely on a person's unique characteristics...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - The OSI Model
Is there a standard model for describing and mapping network hardware and software? Yes, the 7-layer conceptual OSI model! Understanding network security and selecting the appropriate security solutions requires a solid understanding of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 3 Ask Me Anything (AMA) "Identity and Account Management"
Authentication can be configured and managed within a single organization to control access to IT resources. This episode covers identity federation and its relationship to identity and resource providers. This clip is from the chapter...