Instructional Video7:55
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Driver and Overflow Attacks

Higher Ed
Malicious actors can trick victims into installing malicious code such as driver shims. Software programming flaws related to memory allocation can result in security threats. Secure coding, patching, and user awareness go a long way in...
Instructional Video10:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Social Engineering Attacks

Higher Ed
Social engineering attacks can take place over the phone, in person, or through technology. This episode discusses concepts such as spam, phishing and DNS URL redirection. This clip is from the chapter "Testing Infrastructure" of the...
Instructional Video9:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Centralized Logging

Higher Ed
Network infrastructure and host and application logs can be stored centrally such as with Linux or Windows log forwarding. This can then be fed into a centralized log ingestion and analysis system, otherwise called SIEM. This clip is...
Instructional Video3:11
Curated Video

Factors Affecting Food Security

Higher Ed
In this video, the topic of food security and its various factors affecting food supplies are discussed. The narrator explains that having enough food to feed a population, especially when population numbers are rising, is important for...
Instructional Video2:41
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Domain 1 - What We will Be Covering

Higher Ed
This video explains what you will be learning in this section. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain...
Instructional Video3:47
Global Ethics Solutions

Confidentiality and Intellectual Property Tips and Actions for Success

Higher Ed
Learn helpful tips for protecting confidential information and guidelines for reporting abuse.
Instructional Video24:02
The Wall Street Journal

Securing The Perimeter

Higher Ed
Headed into an election year, are private and government systems ready to withstand sophisticated hacks and attempts to spread misinformation? Greylock's Sarah Guo and Crowdstrike's George Kurtz discuss at WSJ Tech Live in Laguna Beach.
Instructional Video33:25
The Wall Street Journal

Building Out the Blockchain

Higher Ed
Ripple Chief Technology Officer Stefan Thomas joins Bitpesa Founder and CEO Elizabeth Rossiello to discuss the future of blockchain and cryptocurrencies with WSJ Global Markets Reporter Steven Russolillo at the WSJ D.Live conference in...
Instructional Video11:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing Hardware

Higher Ed
All IT solutions, in the end, run on hardware somewhere. Restricting physical access to IT hardware such as through locked server rooms and encryption of data at rest provide a layer of security. This clip is from the chapter "Securing...
Instructional Video8:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Password Attacks

Higher Ed
Username and password authentication remains common, as do related dictionary and brute-force attacks. Account lockout threshold can mitigate password attacks other than password spraying attacks. This clip is from the chapter "Securing...
Instructional Video5:00
Curated Video

Latitude Festival: A Cultural Extravaganza in Suffolk

Pre-K - Higher Ed
Latitude Festival is a four-day event held in Henham Park, Suffolk, England. Learn more about its unique blend of music, theater, literature, and art, making it culturally enriching and appealing to a wide range of festival-goers.
Instructional Video11:48
Packt

AWS Certified Cloud Practitioner (CLF-C01)- The AWS Well Architected Framework - Part 1

Higher Ed
In this video, we'll learn about AWS well architected framework - part 1. This clip is from the chapter "The Well Architected Framework" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is about...
Instructional Video3:51
Curated Video

Learning PHP 7 (Video 1)

Higher Ed
PHP is back and is faster and more lightweight than ever. The world of web technology is seamlessly evolving, and PHP 7's simplicity and prowess addresses the requirements of current and future web and mobile application development....
Instructional Video38:06
The Wall Street Journal

How to Implement Continuous Monitoring of Third Party Risk

Higher Ed
In this workshop, hear from two exectuives from Angelo Gordon and Bristol Myers Squibb on how to reduce and manage third-party cyber risks.
Instructional Video11:17
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Firewalls

Higher Ed
Packet filtering firewalls apply to layer 4 (Transport layer) of the OSI model and examine only packet headers to allow or deny network traffic. Content filtering firewalls apply to OSI layer 7 (Application layer) and can examine packet...
Instructional Video6:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Data Destruction

Higher Ed
Digital data resides on physical storage devices. Secure storage media disposal mechanisms, such as shredding, cryptographic erasure, degaussing, and disk wiping, must be put in place to ensure sensitive data cannot be retrieved by...
Instructional Video4:31
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Testing Infrastructure Overview

Higher Ed
With so many security vulnerabilities out there, a good IT security tech must know how to robustly test their network and physical security measures. This clip is from the chapter "Testing Infrastructure" of the series "CompTIA Security+...
Instructional Video6:11
Curated Video

Introduction to Guiding Principles of Responsible AI

Higher Ed
In this video, we will cover an introduction to guiding principles of responsible AI. This clip is from the chapter "AI Workloads and Considerations (15-20%)" of the series "AI-900: Microsoft Azure AI Fundamentals Video Course + Ques".In...
Instructional Video24:26
The Wall Street Journal

The Blockchain In Your Future

Higher Ed
The technology behind cryptocurrencies keeps threatening to radically alter how we transact and record. Is that time finally here?
Instructional Video8:37
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Data Protection

Higher Ed
Data is not all the same. Whether data is at rest, in use, or in transit will affect how you can best secure it. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Instructional Video6:51
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Governance, Management, standards, and frameworks

Higher Ed
CISM Domain 1: Information Security Governance: Governance, Management, standards, and frameworks This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information...
Instructional Video1:31
The March of Time

1950: UNITED NATIONS SECURITY COUNCIL: ** VS U.S. Ambassador Warren Austin addressing council in session (SOT) '... determined that the armed invasion of the Republic of Korea by armed forces from Northern Korea constituted a breach in the peace...'

12th - Higher Ed
MOT 1950: UNITED NATIONS SECURITY COUNCIL: ** VS U.S. Ambassador Warren Austin addressing council in session (SOT) '... determined that the armed invasion of the Republic of Korea by armed forces from Northern Korea constituted a breach...
Instructional Video24:48
The Wall Street Journal

A Dose Of AI Reality

Higher Ed
AI experts Oren Etzioni and Carol E. Reily discuss the state of the U.S and China AI race at WSJ Tech Live in Laguna Beach.
Instructional Video19:55
The Wall Street Journal

A Cyber Rethink

Higher Ed
Are companies doing the right things, measuring the right things and structured in the right way to manage current and coming threats? We examine how to structure security staff and policy to be ready for next new threats.