Instructional Video6:10
Curated Video

Bypass Firewalls by Tunneling Data and Commands over DNS new

Higher Ed
This video will teach you how to setup a Command and Control center to bypass firewall rules and control the victim over DNS traffic, which in many cases is not suspicious to anyone monitoring a network traffic.
Instructional Video1:00
Curated Video

Identity and Data Protection Tools

Higher Ed
This video will introcude you to many technologies that serve to protect your identiy and protect your data online
Instructional Video1:03
Curated Video

Endpoint Protection Tools

Higher Ed
This video will introcude you to many technologies that serve to protect your endpoints and workstations
Instructional Video0:31
Curated Video

Modern Security Solutions

Higher Ed
This video will introcude you to the state of the art cyber security tools such as IAM, DLP, CASB, WAF, SIEM
Instructional Video2:28
Curated Video

LAB 3: How to Enable a Firewall

Higher Ed
I will show you how to enable the firewall on your Windows OS
Instructional Video4:55
Curated Video

Introduction to Cloud Computing - What is SAAS , PAAS, and IAAS

Higher Ed
This video explains SAAS, PAAS, and IAAS. This clip is from the chapter "Introduction" of the series "Introduction to Cloud Computing".This section introduces you to the course.
Instructional Video0:55
Curated Video

Cloud and Network Protection tools

Higher Ed
This video will introcude you to many technologies that serve to protect your cloud and network
Instructional Video2:08
Curated Video

Structural Design Patterns in Modern C++ - Handle-Body

Higher Ed
This video discusses the handle-body idiom. This clip is from the chapter "Bridge Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the bridge design pattern. You will also learn about...
Instructional Video11:08
Curated Video

Learn JMeter from Scratch on Live Applications - Performance Testin - Step- by-Step Example to Run Tests on the Slave Machine from the Client Machine

Higher Ed
This video presents an example of how to run tests on the slave machine from the client machine. This clip is from the chapter "JMeter Distributed Mode in Running Tests in Slave Machines" of the series "Learn JMeter from Scratch on Live...
Instructional Video2:03
Curated Video

How to Protect Your Data

Higher Ed
This video introduces different techniques on how to protect your data
Instructional Video2:52
Curated Video

Bring Your Own Device (BYOD) Security

Higher Ed
The video highlights the security you need to implement when you bring your personal device to work
Instructional Video10:22
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Personnel Risk and Policies

Higher Ed
Hiring the right employees and contractors for the job always matters. Enacting internal security controls such as background checks, mandatory vacations, job rotation, and separation of duties goes a long way in ensuring the integrity...
Instructional Video7:24
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Risk Management Concepts

Higher Ed
A risk management framework aids in identifying and managing risks and is sometimes required for compliance with data privacy regulations such as GDPR and HIPAA. Organization security policies are often influenced by data privacy...
Instructional Video13:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Account Management

Higher Ed
Accountability for resource access is possible only with people using their own unique user accounts where the principle of least privilege has been applied, ideally through group-assigned permissions. Account policies can determine...
Instructional Video8:30
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Third-Party Risk Management

Higher Ed
Some business activities cannot be completed entirely within an organization and must be outsourced. Ensuring that proper security safeguards are in place throughout the hardware, software, and personnel supply chain results in a...
Instructional Video11:29
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Data Types and Roles

Higher Ed
Protecting personally identifiable information, or PII, is crucial and required by security regulations such as GDPR, but of the vast amounts of data in an organization, how do you know which data is sensitive? The answer is through data...
Instructional Video6:44
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Industrial Control System (ICS)

Higher Ed
ICSs use computing devices to automate tasks in a fast dependable way using Programmable Logic Controllers (PLCs). This episode also covers Supervisory Control and Data Acquisition (SCADA). This clip is from the chapter "Securing...
Instructional Video9:19
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Business Impact Analysis

Higher Ed
In addition to deploying effective security controls to protect assets, what can be done to ensure business continuity in the event of a security incident. A business impact analysis involves proactive planning to help reduce downtime...
Instructional Video9:23
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Security Controls

Higher Ed
Various security standards such as PCI DSS and the Cloud Controls Matrix (CCM) define what types of security controls to put in place to mitigate risk both on-premises and in the cloud. The specific type of attack vector determines...
Instructional Video6:50
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Access Control Schemes

Higher Ed
Controlling access to resources begins with policies governing how credentials are managed. Permissions to use resources can be configured through Attribute-Based Access Control (ABAC), Role-Based Access Control (RBAC), Discretionary...
Instructional Video5:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Risk Assessments and Treatments

Higher Ed
How can you determine whether assets are adequately protected from threats? One way is running periodic risk assessments to address the ever-changing threat landscape to define the likelihood and impact of security incidents. This clip...
Instructional Video7:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Threats and Vulnerabilities

Higher Ed
The CIA security triad (confidentiality, integrity and availability) describes how solutions such as encryption, hashing, and data backups can address potential attack vectors that might be exploited by threat actors. This clip is from...
Instructional Video14:07
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Authentication Methods

Higher Ed
Have you ever had trouble remembering usernames and passwords for multiple web apps? Password vaults serve as a protected credential repository in addition to common authentication methods such as one-time password codes,...
Instructional Video4:51
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Authorization

Higher Ed
What role does authorization play in Identity and Access Management (IAM)? Authorization relates to resource permissions granted to a security principal such as a user or device. This clip is from the chapter "Identity and Account...