Instructional Video11:37
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Weak Configurations

Higher Ed
A lack of secure configurations for networks, devices, and hosts results in an increased attack surface. Default settings, especially credentials, should not be used. Deprecated security protocols such as WEP and SSL should also be...
Instructional Video9:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Authentication

Higher Ed
Older network authentication protocols such as Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP) have been deprecated in favor of protocols such as Kerberos and Extensible Authentication...
Instructional Video3:49
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Ethics

Higher Ed
CISM Domain 1: Information Security Governance: Ethics This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019".In...
Instructional Video0:53
The Business Professor

Regulatory Goals of Security Laws - Explained

Higher Ed
Regulatory Goals of Security Laws - Explained
Instructional Video28:14
The Wall Street Journal

How To Protect Your Company Without Breaking the Bank

Higher Ed
How do you make best use of the resources you have and what outside help can you get that matches your cyber risks?
Instructional Video6:11
Curated Video

Disaster Recovery Planning: Ensuring Business Continuity

Higher Ed
Business continuity ensures that business processes can continue despite interruptions. Continuity of Operations (COOP), Disaster Recovery Plans (DRPs), as well as hot, warm, and cold alternate sites are discussed. This clip is from...
Instructional Video4:47
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Enabling Multifactor Authentication

Higher Ed
Multifactor authentication (MFA) hardens user sign-in by requiring more than one factor, or category of authentication, such as something you know combined with something you have. This clip is from the chapter "Identity and Account...
Instructional Video12:38
Let's Tute

Introduction to Debentures

9th - Higher Ed
In this video, the teacher explains the concept of debentures and their benefits compared to other funding options, such as issuing shares. The teacher also discusses the different types of debentures based on convertibility,...
Instructional Video23:12
IDG TECHtalk

How to create a pandemic disaster recovery plan

Higher Ed
The coronavirus pandemic forced IT teams around the world to adapt to serving an almost entirely remote workforce. But once we all return to work in an office, those lessons shouldn’t be forgotten. Jack Gold, president and principal...
Instructional Video9:19
IDG TECHtalk

Election security concerns: Voting machines, malware and misinformation

Higher Ed
Americans are days away from the 2020 Presidential Election and have been casting early ballots at an all-time high. Cybersecurity experts and election officials have probably implemented election security measures by now. But it’s not...
Instructional Video3:14
The Business Professor

Security Interests (Intro)

Higher Ed
Security Interests (Intro)
Instructional Video8:22
Seven Dimensions

Office Security: Lessons Learned from a Theft

Higher Ed
In this video, an employee addresses a theft that occurred in their office and emphasizes the importance of security. They propose implementing stricter measures, such as ID checks and security lists, to ensure that only authorized...
Instructional Video1:05
Next Animation Studio

How the scaled-down Biden inauguration will work

12th - Higher Ed
Organizers of Joe Biden’s inauguration say people should expect to see few attendees at his inauguration on January 20.
Instructional Video19:52
The Wall Street Journal

Up in the Cloud

Higher Ed
Corporate computing has moved into the cloud. We examine what executives need to know about keeping data secure, auditing its use and staying compliant.
Instructional Video25:38
The Wall Street Journal

Anticipating the Next Big Security Threat

Higher Ed
Cybersecurity experts Cheryl Davis and David Koh speak with WSJ Senior Editor Yun-Hee Kim about emerging security threats and how to protect businesses from cyberattacks.
Instructional Video2:06
The Business Professor

Major Federal Securities Laws - Explained

Higher Ed
Major Federal Securities Laws - Explained
Instructional Video8:57
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Log Files

Higher Ed
Log files can provide valuable insights related to suspicious network, host or application activity, but only if log file integrity can be ensured. Centralized logging in the enterprise on a secured logging host ensures an accurate copy...
Instructional Video5:11
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - DNS Security

Higher Ed
DNS is a crucial network service used by everybody to resolve names to IP addresses and as a result, it is a target for attackers. This episode also discusses other protocols such has Simple Network Management Protocol (SNMP) and Secure...
Instructional Video2:36
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Introduction

Higher Ed
Mike and Dan introduce the CompTIA Security+ (SY0-601) video course from Total Seminars. This clip is from the chapter "Risk Management" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces...
Instructional Video17:06
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy - Segment 7

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Instructional Video14:06
The Wall Street Journal

Executive Travel Risk Briefing

Higher Ed
Rob Sloan, Research Director, WSJ Pro presents on how executives are at a greater risk of being hacked while traveling overseas.
Instructional Video4:06
Blockchain Central

Why Criminals Love Monero? | Blockchain Central

Higher Ed
This week on Blockchain Central: we'll take a closer look at Monero, a cryptocurrency which has one of the best security systems among others and has a potential to become your personal bank. However, it still has downsides, which we...
Instructional Video20:07
Institute for New Economic Thinking

Yvo Desmedt: Much Ado About Cyber Security

Higher Ed
Private data is leaked more and more in our society. Wikileaks, Facebook, and identity theft are just three examples. Network defenses are constantly under attack from cyber criminals, organized hacktivists, and even disgruntled...
Instructional Video7:08
IDG TECHtalk

How to deploy secure Windows computing resources remotely

Higher Ed
As remote work becomes more prevalent and, likely, permanent, you need secure deployment processes in place for devices connecting to Windows networks.