Instructional Video7:52
Vlogbrothers

Why Are Poor Countries Poor?

6th - 11th
In which John looks at the vicious cycles of poverty and poor health in Sierra Leone, including how the ebola crisis happened and why a center of diamond mining has become one of the poorest regions in the world. For the last year and a...
Instructional Video5:33
Curated Video

Threat Modeling

Higher Ed
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized. In this video, you will learn about...
Instructional Video3:54
Curated Video

Steps to plan a successfull pentest

Higher Ed
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Instructional Video4:40
Curated Video

Types of Attackers and Cybersecurity Professionals

Higher Ed
In the field of information security, there are three well-known categories of hackers: black hats, white hats, and grey hats. In an effort to set themselves apart from one another and distinguish the good hackers from the evil, hackers...
Instructional Video2:30
Curated Video

Security Playbooks Benefits

Higher Ed
A cybersecurity playbook is a comprehensive, company-wide guideline that specifies exactly what steps to take in the event of data loss.
Instructional Video9:36
Curated Video

Wireshark D4 V2 - TCP Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 2: TCP deep-dive
Instructional Video11:04
Curated Video

Introduction to IT and Cybersecurity: Business Continuity Planning (BCP)

Higher Ed
Part 12/16 of Introduction to IT and Cybersecurity series: The video discusses business continuity planning (BCP) or contingency planning. The video emphasizes the importance of data classification, identifying critical systems that...
Instructional Video8:42
Curated Video

Threats and Vulnerabilities

Higher Ed
In cybersecurity, a vulnerability is a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system. After exploiting a vulnerability, a cyberattack can run malicious code, install malware and even...
Instructional Video1:26
Curated Video

LAB 5: Shodan and IoT Scanners

Higher Ed
I will introeuce you to shodan, and teach you how to discover assets over the Internet
Instructional Video6:44
Curated Video

Spark Programming in Python for Beginners with Apache Spark 3 - Spark Data Sources and Sinks

Higher Ed
In this video, we will cover Spark data sources and sinks. This clip is from the chapter "Spark Data Sources and Sinks" of the series "Spark Programming in Python for Beginners with Apache Spark 3".In this section, you will learn about...
Instructional Video3:24
Mazz Media

The Difference between feudalism and manorialism

6th - 8th
Medieval culture during the Middle Ages in Europe was based on two systems: Feudalism and Manorialism. Both systems were dependent on land. How were they different? This program explores what made them different and how each of these...
Instructional Video3:42
Curated Video

Linux Fundamentals - Overview of the tar and gzip Utilities

Higher Ed
This video presents an overview of the tar and gzip utilities. This clip is from the chapter "Compressing and Sorting in Linux" of the series "Linux Fundamentals".This section provides an overview of the tar and gzip utilities. Next, you...
Instructional Video11:08
Curated Video

Learn JMeter from Scratch on Live Applications - Performance Testin - Step- by-Step Example to Run Tests on the Slave Machine from the Client Machine

Higher Ed
This video presents an example of how to run tests on the slave machine from the client machine. This clip is from the chapter "JMeter Distributed Mode in Running Tests in Slave Machines" of the series "Learn JMeter from Scratch on Live...
Instructional Video1:54
Curated Video

Android Security Architecture

Higher Ed
A very important video that details the security architecture of an APK app and how it interacts with the Android platform
Instructional Video14:04
Curated Video

Introduction to IT and Cybersecurity: Application Development Techniques

Higher Ed
Part 8/16 of Introduction to IT and Cybersecurity series : This video discusses application development techniques for end users and programmers. It explains the concept of end user development, which is where people who are not...
Instructional Video6:03
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - What Is Glue? + Partitioning Your Data Lake

Higher Ed
This video focuses on AWS Glue and explains how to partition the data lake. This clip is from the chapter "Domain 3: Processing" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, we will complete our...
Instructional Video2:05
Curated Video

ICT readiness for business continuity control

Higher Ed
In this video, we will be discussing the importance of ICT readiness for business continuity control. With the increasing reliance on technology in today's business world, it is crucial to have a plan in place to ensure that your...
Instructional Video5:08
Curated Video

ISO 27002-2022 Control Examples

Higher Ed
In this video, we will be exploring ISO 27002-2022 control examples. ISO 27002-2022 is a globally recognized standard for information security management systems. It provides a framework for organizations to establish, implement,...
Instructional Video14:55
Curated Video

ISO 27001-2022 Technological controls

Higher Ed
In this video, we will be discussing the technological controls outlined in the latest version of the ISO 27001 standard, ISO 27001-2022. These controls are designed to help organizations protect their information assets from cyber...
Instructional Video15:13
Curated Video

ISO 27001- 2022 Organizational controls

Higher Ed
In this video, we will be discussing the ISO 27001-2022 organizational controls. ISO 27001 is an international standard that outlines the requirements for an information security management system (ISMS). The 2022 version of the standard...
Instructional Video1:55
Curated Video

Information deletion control

Higher Ed
In this video, we will be discussing the importance of information deletion control. With the increasing amount of data being collected and stored, it is crucial to have proper measures in place to ensure that sensitive information is...
Instructional Video13:34
Curated Video

ISO 27001-2022 and NIST CSF controls

Higher Ed
In this video, we will be discussing the ISO 27001-2022 and NIST CSF controls. These controls are essential for ensuring the security of your organization's information and data. We will explore the different types of controls, their...
Instructional Video10:39
Executive Finance

Introduction to Financial Intelligence and Statements

Higher Ed
This video discusses the importance of systems and processes in building financial intelligence. It explains how financial statements are created, the different types of statements, and how to evaluate them. The video also touches on the...
Instructional Video12:46
Curated Video

Types of Economic Systems and Mixed Economy

12th - Higher Ed
The video is a lecture presentation that explains the different types of economic systems that can exist in an economy. The video explains the two main mechanisms that allocate resources, the market mechanism and the planning mechanism,...