Instructional Video29:02
The Wall Street Journal

Reinforcing the Supply Chain

Higher Ed
High-profile incidents have shown companies that they are vulnerable to attacks on technology supply chains. Cyber leaders from NYSE and Foley & Lardner show companies what they can do to improve security and the response to attacks.
Instructional Video18:52
Let's Tute

Consignment Accounting Problem Solving: Accounting for Consignment Sales with Commission and Security Money

9th - Higher Ed
This video discusses the consignment of goods by rail to Sahil for sale, including Sahil's commission and security money. It also covers the calculation of commission, closing stock, and profit, as well as the adjustment of security...
Instructional Video25:17
IDG TECHtalk

Enterprise networking in 2022: Applying remote work lessons as employees return to the office

Higher Ed
As employees return to the office, IT can apply lessons learned from supporting remote workers to transform their networks. Cloud architectures such as SD-WAN and SASE could continue to be useful. Network as a Service, or NaaS, is still...
Instructional Video5:40
IDG TECHtalk

Microsoft Defender for Business | What security admins need to know

Higher Ed
The new Microsoft Defender for Business makes important Windows security features more available to small businesses.
Instructional Video6:09
Blockchain Central

Cardano - The Third Generation of Blockchain | Blockchain Central

Higher Ed
This week on Blockchain Central: we'll take a closer look at the blockchain technology called Cardano, what are the features of the third generation blockchains and how can it revolutionize the industry. Make sure to watch till the end...
Instructional Video12:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Asymmetric Cryptosystems

Higher Ed
In this episode, Mike describes encrypting and decrypting data with different keys and the magic that happens when key pairs are generated. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification...
Instructional Video7:20
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Methods

Higher Ed
This episode introduces various methods used to protect the critical keys in cryptography that keep communication secure. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total...
Instructional Video8:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Touring Certificates

Higher Ed
Mike tours various certificates in this episode. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces you to cryptography.
Instructional Video1:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 12 Ask Me Anything (AMA)

Higher Ed
One aspect of security testing is determining if internal employees have an awareness of common security problems. In this episode, Mike discusses phishing and whaling. This clip is from the chapter "Testing Infrastructure" of the series...
Instructional Video25:18
The Wall Street Journal

10 Years Out

Higher Ed
A discussion of how cybersecurity will influence public acceptance of emerging technology and how hackers could seek to subvert world-changing innovations.
Instructional Video31:04
The Wall Street Journal

What To Report

Higher Ed
What should a CISO report to the executive team and board, and what do board members want to know? We'll look at what corporate stakeholders regard as the principles of reporting and the most useful information.
Instructional Video20:50
The Wall Street Journal

Are We Winning?

Higher Ed
High-profile breaches continue, from DNC and Equifax to Facebook and Under Armour. Malware and ransomware grind businesses to a halt, and vulnerabilities face utilities and other infrastructure. What's the score in the battle over...
Instructional Video2:04
The Business Professor

Disclosure Documents in Securities Issuance - Explained

Higher Ed
Disclosure Documents in Securities Issuance - Explained
Instructional Video6:23
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing Network Access

Higher Ed
Securing networks restricts access to the network while securing services on the network. 802.1x network edge devices can limit network access. Rogue DHCP servers can be mitigated with DHCP snooping configurations. Secure remote server...
Instructional Video8:02
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Protocol Analyzers

Higher Ed
Network traffic can be captured, saved, and analyzed using a properly placed hardware or software network protocol analyzer such as the free Wireshark tool. Capture analysis can result in identifying indicators of compromise or the use...
Instructional Video5:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Wiping Disks with the dd Command Lab

Higher Ed
When storage media has reached the end of its useful life, data must be wiped from it in a secure manner which can include using some built-in operating system tools. Linux administrators can use the dd command to wipe disk partitions by...
Instructional Video3:33
IDG TECHtalk

Reviewing software risks on your Windows network

Higher Ed
Set aside some time to inventory and analyze the software and settings on your network to identify risks.
Instructional Video13:52
IDG TECHtalk

Is end-to-end encryption for videoconferencing important?

Higher Ed
More people are relying on videoconferencing software to do their jobs and chat with friends and family. This uptick in use highlighted some security concerns like “Zoombombing” and the lack of end-to-end encryption in popular...
Instructional Video6:28
IDG TECHtalk

Most common cyberattack techniques of 2020

Higher Ed
Research on the most common techniques attackers used to breach systems provides insight on where to focus your defenses.
Instructional Video4:35
IDG TECHtalk

Tips for conducting effective phishing simulations

Higher Ed
Poorly executed phishing simulations can send the wrong message to employees. Here’s how to do it right.
Instructional Video4:19
IDG TECHtalk

How to manage and secure administrator accounts

Higher Ed
Administrator accounts have wide access to data and systems. Here’s how to protect them from abuse or compromise.
Instructional Video4:03
IDG TECHtalk

How to enable and configure Office 365 logging and auditing

Higher Ed
Make sure Microsoft Office 365 logging and auditing is set up properly so forensic data is available when needed.
Instructional Video2:45
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- Amazon Compliance Programs and AWS Artifact

Higher Ed
In this video, we'll learn about Amazon compliance programs and AWS Artifact. This clip is from the chapter "Security" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".You will learn about security here. It...
Instructional Video17:55
IDG TECHtalk

Your best defense against insider threats | TECH(talk)

Higher Ed
When employees are your weakest link, companies must have programs in place to prevent them from accidentally or intentionally putting the organization at risk. Watch as TECHtalk hosts Ken Mingis and Juliet Beauchamp discuss various...