Instructional Video4:48
The Business Professor

How does a Security Interest Benefit a Mortgage Lender

Higher Ed
How does a Security Interest Benefit a Mortgage Lender
Instructional Video18:54
The Wall Street Journal

Technology Transformation at JPMorgan Chase

Higher Ed
JPMorgan Chase & Co. Global CIO, Lori Beer, discusses the bank's plan to invest $14 billion on technology, digitization, infrastructure modernization, software development and to enhance its AI models, among other projects.
Instructional Video2:38
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 9 Exam Question Review

Higher Ed
Critical infrastructure IT systems can sometimes be vulnerable to attacks. In this episode, a scenario is presented in which the best solution must be implemented to protect Programmable Logic Controllers (PLCs). This clip is from the...
Instructional Video3:24
Curated Video

Describe cyber attacks that could affect a computer system or network : Overview of Network Security

Higher Ed
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Instructional Video34:50
The Wall Street Journal

Scoring Board

Higher Ed
Successful chief information security officers are effective at getting their message across to the board. In this session we'll put two CISOs to the test as they present in front of two board members and have their efforts critiqued.
Instructional Video23:31
The Wall Street Journal

Kevin Mandia on the key lessons learned from SolarWinds

Higher Ed
Kevin Mandia, CEO of FireEye, discusses the SolarWinds attack and what we can learn to provide better protection in the future.
Instructional Video2:29
Curated Video

Guiding Principle - Privacy and Security

Higher Ed
In this video, we will cover a guiding principle - privacy and security. This clip is from the chapter "AI Workloads and Considerations (15-20%)" of the series "AI-900: Microsoft Azure AI Fundamentals Video Course + Ques".In this...
Instructional Video6:51
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - RFID, NFC, and Bluetooth

Higher Ed
While there are many wireless network standards, which ones are designed for close proximity? This video covers RFID, NFC and Bluetooth wireless network communications. This clip is from the chapter "Securing Wireless LANs" of the series...
Instructional Video1:15
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 6 Ask Me Anything (AMA)

Higher Ed
Secure Sockets Layer (SSL) has long been used to secure network communication on LANs and WANs. This episode discusses how Transport Layer Security (TLS) supersedes SSL in addition to continued backwards-compatibility support that...
Instructional Video9:36
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Linux Command-Line Tools

Higher Ed
Security technicians must be comfortable with Linux commands for standard maintenance and security tasks using commands such as head, tail, grep, dig, and setting filesystem permissions with chmod. This clip is from the chapter "Tools of...
Instructional Video5:01
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Autopsy Forensic Browser Lab

Higher Ed
Digital forensics is the cross-pollination of computer science and law. In this demonstration, Dan shows how to use the Autopsy forensic tool to work with a disk image to retrieve a deleted file. This clip is from the chapter "Dealing...
Instructional Video9:18
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Information Security Governance: Values, Vision, Mission, and Plans

Higher Ed
This video focuses on values, vision, mission, and plans. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
Instructional Video7:55
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 Revision 4

Higher Ed
This video explains NIST SP 800-53 revision 4. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and...
Instructional Video10:50
Let's Tute

Consignment Accounting: Advanced Concept of Consignee's Security Money

9th - Higher Ed
In this video, the teacher explains the concept of advanced money from the consignee as security money in consignment accounting. They provide an example and show how the treatment of the advanced money differs depending on whether it is...
Instructional Video17:58
The Wall Street Journal

Defending America From Cyberattacks

Higher Ed
CISA's executive director, Brandon Wales discusses the role of the agency in reinforcing America’s infrastructure security in light of continued geopolitical instability.
Instructional Video2:20
APMonitor

Introduction to OT Cybersecurity

10th - Higher Ed
Cybersecurity is the protection of networks and computer systems, including hardware and software, against cyberattacks. Of particular interest to engineers is the computer control of physical systems that monitor and control...
Instructional Video14:40
The Wall Street Journal

Pro Perspective: Where Cybersecurity Meets Physical Security

Higher Ed
Physical security can be an important part of cybersecurity, from controlling building access to protecting the residences of key employees. CISO of Global Guardian, outlines how companies can address both areas to create stronger...
Instructional Video28:51
The Wall Street Journal

Countering Digital Risk

Higher Ed
Dick Clarke, former White House special advisor on cyberspace, on the accelerated efforts of cyber criminals. From ransomware attacks and supply chain compromises, to how continued state sponsored hacking means digital risk is greater...
Instructional Video3:01
National Institute of Standards and Technology

Password Security Fatigue

9th - 12th
Ever get tired of having to update your username and password? In this video, Mary Theofanos explains the idea of security fatigue and how users are bogged down by too many decisions involving their online security. Creating awareness...
Instructional Video13:27
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Software development methodologies part 2

Higher Ed
CISM Domain 1: Information Security Governance: Software development methodologies part 2 This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security...
Instructional Video16:34
National Institute of Standards and Technology

Vint Cerf: The past, present and future of the internet

9th - 12th
Donna Dodson, Associate Director and Chief Cyber Security Advisor, and Vint Cerf, Chief Internet Evangelist for Google and former NIST VCAT member, have a wide-ranging discussion about the past, present and future of the internet,...
Instructional Video8:46
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cloud Deployment Models

Higher Ed
Virtualization alone does not constitute cloud computing; a number of characteristics such as resource pooling and metered usage must also be involved. This episode discusses public, private, hybrid, and community clouds. This clip is...
Instructional Video16:29
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Touring the CLI

Higher Ed
The Command-Line Interface (CLI) allows technicians to interact with Windows, Linux, and MacOS systems by typing in commands such as ping and ipconfig. Windows uses a command prompt, MacOS uses a terminal shell, and Linux can use a...
Instructional Video1:58
Seven Dimensions

Principles and Protocols for Protecting Personal Items and Preventing Theft

Higher Ed
Colin McLaren and Eve Ash discuss what people should do to protect their personal property and company assets. The video highlights the need for vigilance and proactive management in maintaining a safe work environment.