Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Driver and Overflow Attacks
Malicious actors can trick victims into installing malicious code such as driver shims. Software programming flaws related to memory allocation can result in security threats. Secure coding, patching, and user awareness go a long way in...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Social Engineering Attacks
Social engineering attacks can take place over the phone, in person, or through technology. This episode discusses concepts such as spam, phishing and DNS URL redirection. This clip is from the chapter "Testing Infrastructure" of the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Centralized Logging
Network infrastructure and host and application logs can be stored centrally such as with Linux or Windows log forwarding. This can then be fed into a centralized log ingestion and analysis system, otherwise called SIEM. This clip is...
Curated Video
Factors Affecting Food Security
In this video, the topic of food security and its various factors affecting food supplies are discussed. The narrator explains that having enough food to feed a population, especially when population numbers are rising, is important for...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Domain 1 - What We will Be Covering
This video explains what you will be learning in this section. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain...
Global Ethics Solutions
Confidentiality and Intellectual Property Tips and Actions for Success
Learn helpful tips for protecting confidential information and guidelines for reporting abuse.
The Wall Street Journal
Securing The Perimeter
Headed into an election year, are private and government systems ready to withstand sophisticated hacks and attempts to spread misinformation? Greylock's Sarah Guo and Crowdstrike's George Kurtz discuss at WSJ Tech Live in Laguna Beach.
The Wall Street Journal
Building Out the Blockchain
Ripple Chief Technology Officer Stefan Thomas joins Bitpesa Founder and CEO Elizabeth Rossiello to discuss the future of blockchain and cryptocurrencies with WSJ Global Markets Reporter Steven Russolillo at the WSJ D.Live conference in...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing Hardware
All IT solutions, in the end, run on hardware somewhere. Restricting physical access to IT hardware such as through locked server rooms and encryption of data at rest provide a layer of security. This clip is from the chapter "Securing...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Password Attacks
Username and password authentication remains common, as do related dictionary and brute-force attacks. Account lockout threshold can mitigate password attacks other than password spraying attacks. This clip is from the chapter "Securing...
Curated Video
Latitude Festival: A Cultural Extravaganza in Suffolk
Latitude Festival is a four-day event held in Henham Park, Suffolk, England. Learn more about its unique blend of music, theater, literature, and art, making it culturally enriching and appealing to a wide range of festival-goers.
Packt
AWS Certified Cloud Practitioner (CLF-C01)- The AWS Well Architected Framework - Part 1
In this video, we'll learn about AWS well architected framework - part 1. This clip is from the chapter "The Well Architected Framework" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is about...
Curated Video
Learning PHP 7 (Video 1)
PHP is back and is faster and more lightweight than ever. The world of web technology is seamlessly evolving, and PHP 7's simplicity and prowess addresses the requirements of current and future web and mobile application development....
The Wall Street Journal
How to Implement Continuous Monitoring of Third Party Risk
In this workshop, hear from two exectuives from Angelo Gordon and Bristol Myers Squibb on how to reduce and manage third-party cyber risks.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Firewalls
Packet filtering firewalls apply to layer 4 (Transport layer) of the OSI model and examine only packet headers to allow or deny network traffic. Content filtering firewalls apply to OSI layer 7 (Application layer) and can examine packet...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Data Destruction
Digital data resides on physical storage devices. Secure storage media disposal mechanisms, such as shredding, cryptographic erasure, degaussing, and disk wiping, must be put in place to ensure sensitive data cannot be retrieved by...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Testing Infrastructure Overview
With so many security vulnerabilities out there, a good IT security tech must know how to robustly test their network and physical security measures. This clip is from the chapter "Testing Infrastructure" of the series "CompTIA Security+...
Curated Video
Introduction to Guiding Principles of Responsible AI
In this video, we will cover an introduction to guiding principles of responsible AI. This clip is from the chapter "AI Workloads and Considerations (15-20%)" of the series "AI-900: Microsoft Azure AI Fundamentals Video Course + Ques".In...
The Wall Street Journal
The Blockchain In Your Future
The technology behind cryptocurrencies keeps threatening to radically alter how we transact and record. Is that time finally here?
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Data Protection
Data is not all the same. Whether data is at rest, in use, or in transit will affect how you can best secure it. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This...
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Governance, Management, standards, and frameworks
CISM Domain 1: Information Security Governance: Governance, Management, standards, and frameworks This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information...
The March of Time
1950: UNITED NATIONS SECURITY COUNCIL: ** VS U.S. Ambassador Warren Austin addressing council in session (SOT) '... determined that the armed invasion of the Republic of Korea by armed forces from Northern Korea constituted a breach in the peace...'
MOT 1950: UNITED NATIONS SECURITY COUNCIL: ** VS U.S. Ambassador Warren Austin addressing council in session (SOT) '... determined that the armed invasion of the Republic of Korea by armed forces from Northern Korea constituted a breach...
The Wall Street Journal
A Dose Of AI Reality
AI experts Oren Etzioni and Carol E. Reily discuss the state of the U.S and China AI race at WSJ Tech Live in Laguna Beach.
The Wall Street Journal
A Cyber Rethink
Are companies doing the right things, measuring the right things and structured in the right way to manage current and coming threats? We examine how to structure security staff and policy to be ready for next new threats.