Instructional Video2:00
National Institute of Standards and Technology

National Strategy for Trusted Identities in Cyberspace (NSTIC)

9th - 12th
This animated video provides viewers with a look at how the National Strategy for Trusted Identities will work. The goal is to establish identity solutions and privacy-enhancing technologies that will improve the security and convenience...
Instructional Video7:22
National Institute of Standards and Technology

Cybersecurity Framework Workshop Rebecca Blank

9th - 12th
Commerce Deputy Secretary Rebecca Blank calls for industry to work with NIST in partnership to develop a voluntary framework that will promote best practices at critical infrastructure facilities and businesses to keep the U.S. safe.
Instructional Video11:55
TLDR News

Does the EU Really Need the UK? - Brexit Explained.

12th - Higher Ed
When scrolling through comments you often see people say "they need us more than we need them". So we have tried to respond to that once and for all. We look at if the EU relies on the UK for trade, how the EU budget will cope without...
Instructional Video30:15
The Wall Street Journal

The Role of Cyber-Insurance

Higher Ed
When it comes to cyber insurance, wow much should you buy, what does it cover and how does it fit with an overall cybersecurity strategy?
Instructional Video2:18
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 3 Exam Question Review "Identity and Account Management"

Higher Ed
There are a variety of ways in which user authentication can be implemented prior to allowing user access to the Internet. This question presents a scenario require user sign-off to a term of agreement before gaining Internet access....
Instructional Video26:14
The Wall Street Journal

Enterprise Technology Innovation During Market Volatility

Higher Ed
Salesforce Venture's Alex Kayyal and Fusion Fund's Shane Wall discuss the outlook for innovation in enterprise technology amid market volatility and uncertainty.
Instructional Video21:56
The Wall Street Journal

Building the City of Tomorrow

Higher Ed
Cisco CEO Chuck Robbins discusses the future of cities with WSJ Chief News Editor Jason Anders at the WSJ D.Live conference in Laguna Beach, Calif.
Instructional Video12:27
Seven Dimensions

Understanding Crime and Upholding Safety

Higher Ed
In this video, retired detective Colin McLaren discusses with Eve Ash how workplaces can be sitting ducks for crimes such as theft, dishonesty and cyberattacks. He advocates ramping up security, investing in the right applications and...
Instructional Video5:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Creating Linux Users and Groups Lab

Higher Ed
User and group management in Linux can be performed at the command line. This demo makes use of the user add and group add commands to create authentication identities. This clip is from the chapter "Identity and Account Management" of...
Instructional Video7:54
National Institute of Standards and Technology

What is the Internet of Things (IoT) and how can we secure it?

9th - 12th
Industry leaders discuss cybersecurity concerns around the Internet of Things (IoT) and the role NIST (https://go.usa.gov/xPzuY) can play to help secure our future. Featuring thought leaders from: Global Cyber Alliance Symantec Cisco...
Instructional Video11:36
Weird History

What Life Is Like as a Secret Service Agent

12th - Higher Ed
The people who undertake Secret Service training keep presidents, vice presidents, first families, and even candidates safe. But their own lives can be incredibly dangerous. The Secret Service agent job description includes both...
Instructional Video8:01
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Identification, Authentication, and Authorization

Higher Ed
Authorization to access resources occurs after the successful proving of one's identity through authentication. This clip is from the chapter "Identity and Account Management" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video11:00
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Threat Intelligence

Higher Ed
With the ever-changing IT threat landscape, how can you keep up with the latest security issues? Threat intelligence refers to the wide variety of open-source intelligence (OSINT) and proprietary IT security sources that use standards...
Instructional Video13:38
The Wall Street Journal

Pro Perspective: Hindsight in 2020 - Lessons Learned in Cybersecurity

Higher Ed
Stanford University's CISO Michael Duff takes a look at the lessons learn in cybersecurity so far this year.
Instructional Video25:20
The Wall Street Journal

IOT And The New Frontier Of Risk

Higher Ed
Kevin McNamee, Director, Threat Intelligence, Nokia and Nasrin Rezai, Global Chief Information and Product Security Officer, GE explore security failings in the Internet of Things and how companies can avoid them.
Instructional Video5:27
Healthcare Triage

Antibiotics are Overused

Higher Ed
The best way to prevent transmission of Ebola in the United States, or any country for that matter, is to identify and quarantine those with the disease as soon as possible. However, the first person diagnosed with Ebola in the US was,...
Instructional Video2:50
Science360

NUCLEAR CSI

12th - Higher Ed
In episode 73, Jordan and Charlie investigate a new procedure developed by researchers at the University of Missouri that could be used to identify individuals exposed to uranium within the past year. Scientists and homeland security...
Instructional Video14:11
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Certificate Types

Higher Ed
Mike reviews different types of certificates including web, email, code-signing, machine/computer, and user. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Instructional Video10:20
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Disk RAID Levels

Higher Ed
Data availability, including through disk redundancy, is an aspect of IT security. There are various RAID levels that organize physical disks together to provide performance and/or fault tolerant benefits. This clip is from the chapter...
Instructional Video5:25
Blockchain Central

Will Quantum Computers Threaten Blockchains?

Higher Ed
This week on Blockchain Central: we'll talk about quantum computers and the potential threat it has on blockchain technology. Thank to revolutionary computational power, these computers can easily encrypt the keys that are protecting...
Instructional Video8:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Hashing

Higher Ed
Hashes provide assurance of data integrity using fascinating mathematical calculations. Passwords are a very common use for hashing. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video5:24
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Environmental Controls

Higher Ed
Computing equipment must be kept at the correct temperature and humidity levels to function efficiently. This episode covers air flow management using hot and cold aisles as well as environmental monitoring. This clip is from the chapter...
Instructional Video3:07
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - About the Security+ (SY0-601) Exam

Higher Ed
This episode goes over the domains of the CompTIA Security+ (SY0-601) exam objectives and the various topics that are covered. This clip is from the chapter "Risk Management" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video10:11
TLDR News

Why Don't We Vote Online in Elections? - TLDR Explains

12th - Higher Ed
Voting can be complicated a time consuming, and having your say in an election can take its toll. That's why many have discussed taking voting online to make engaging in democracy quicker and easier. However, Estonia is the only country...