Vlogbrothers
Why Are Poor Countries Poor?
In which John looks at the vicious cycles of poverty and poor health in Sierra Leone, including how the ebola crisis happened and why a center of diamond mining has become one of the poorest regions in the world. For the last year and a...
Curated Video
Threat Modeling
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized. In this video, you will learn about...
Curated Video
Steps to plan a successfull pentest
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Curated Video
Types of Attackers and Cybersecurity Professionals
In the field of information security, there are three well-known categories of hackers: black hats, white hats, and grey hats. In an effort to set themselves apart from one another and distinguish the good hackers from the evil, hackers...
Curated Video
Security Playbooks Benefits
A cybersecurity playbook is a comprehensive, company-wide guideline that specifies exactly what steps to take in the event of data loss.
Curated Video
Wireshark D4 V2 - TCP Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 2: TCP deep-dive
Curated Video
Introduction to IT and Cybersecurity: Business Continuity Planning (BCP)
Part 12/16 of Introduction to IT and Cybersecurity series: The video discusses business continuity planning (BCP) or contingency planning. The video emphasizes the importance of data classification, identifying critical systems that...
Curated Video
Threats and Vulnerabilities
In cybersecurity, a vulnerability is a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system. After exploiting a vulnerability, a cyberattack can run malicious code, install malware and even...
Curated Video
LAB 5: Shodan and IoT Scanners
I will introeuce you to shodan, and teach you how to discover assets over the Internet
Curated Video
Spark Programming in Python for Beginners with Apache Spark 3 - Spark Data Sources and Sinks
In this video, we will cover Spark data sources and sinks. This clip is from the chapter "Spark Data Sources and Sinks" of the series "Spark Programming in Python for Beginners with Apache Spark 3".In this section, you will learn about...
Mazz Media
The Difference between feudalism and manorialism
Medieval culture during the Middle Ages in Europe was based on two systems: Feudalism and Manorialism. Both systems were dependent on land. How were they different? This program explores what made them different and how each of these...
Curated Video
Linux Fundamentals - Overview of the tar and gzip Utilities
This video presents an overview of the tar and gzip utilities. This clip is from the chapter "Compressing and Sorting in Linux" of the series "Linux Fundamentals".This section provides an overview of the tar and gzip utilities. Next, you...
Curated Video
Learn JMeter from Scratch on Live Applications - Performance Testin - Step- by-Step Example to Run Tests on the Slave Machine from the Client Machine
This video presents an example of how to run tests on the slave machine from the client machine. This clip is from the chapter "JMeter Distributed Mode in Running Tests in Slave Machines" of the series "Learn JMeter from Scratch on Live...
Curated Video
Android Security Architecture
A very important video that details the security architecture of an APK app and how it interacts with the Android platform
Curated Video
Introduction to IT and Cybersecurity: Application Development Techniques
Part 8/16 of Introduction to IT and Cybersecurity series : This video discusses application development techniques for end users and programmers. It explains the concept of end user development, which is where people who are not...
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - What Is Glue? + Partitioning Your Data Lake
This video focuses on AWS Glue and explains how to partition the data lake. This clip is from the chapter "Domain 3: Processing" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, we will complete our...
Curated Video
ICT readiness for business continuity control
In this video, we will be discussing the importance of ICT readiness for business continuity control. With the increasing reliance on technology in today's business world, it is crucial to have a plan in place to ensure that your...
Curated Video
ISO 27002-2022 Control Examples
In this video, we will be exploring ISO 27002-2022 control examples. ISO 27002-2022 is a globally recognized standard for information security management systems. It provides a framework for organizations to establish, implement,...
Curated Video
ISO 27001-2022 Technological controls
In this video, we will be discussing the technological controls outlined in the latest version of the ISO 27001 standard, ISO 27001-2022. These controls are designed to help organizations protect their information assets from cyber...
Curated Video
ISO 27001- 2022 Organizational controls
In this video, we will be discussing the ISO 27001-2022 organizational controls. ISO 27001 is an international standard that outlines the requirements for an information security management system (ISMS). The 2022 version of the standard...
Curated Video
Information deletion control
In this video, we will be discussing the importance of information deletion control. With the increasing amount of data being collected and stored, it is crucial to have proper measures in place to ensure that sensitive information is...
Curated Video
ISO 27001-2022 and NIST CSF controls
In this video, we will be discussing the ISO 27001-2022 and NIST CSF controls. These controls are essential for ensuring the security of your organization's information and data. We will explore the different types of controls, their...
Executive Finance
Introduction to Financial Intelligence and Statements
This video discusses the importance of systems and processes in building financial intelligence. It explains how financial statements are created, the different types of statements, and how to evaluate them. The video also touches on the...
Curated Video
Types of Economic Systems and Mixed Economy
The video is a lecture presentation that explains the different types of economic systems that can exist in an economy. The video explains the two main mechanisms that allocate resources, the market mechanism and the planning mechanism,...