-
15:59
Information security: Anish Bhimani at TEDxUConn 2013
Information security: Anish Bhimani at TEDxUConn 2013
Information security: Anish Bhimani at TEDxUConn 2013
The future of information security is changing, as the technologies we have are becoming more advanced and permeating deeper into our everyday lives. We must...
-
41:47
Introduction to Computer Security - Information Security Lesson #1 of 12
Introduction to Computer Security - Information Security Lesson #1 of 12
Introduction to Computer Security - Information Security Lesson #1 of 12
Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, contr...
-
4:49
What you need to know about... Information Security
What you need to know about... Information Security
What you need to know about... Information Security
Information security is becoming more and more important. Criminals are stealing our information and using it for profit. We need to be more aware of what we...
-
53:40
DEFCON 17: Effective Information Security Career Planning
DEFCON 17: Effective Information Security Career Planning
DEFCON 17: Effective Information Security Career Planning
Speaker: Lee Kushner President, LJ Kushner and Associates, Founder InfoSecLeaders.com Mike Murray President, Michael Murray and Associates, Founder InfoSecLe...
-
5:15
Introduction to Information Security
Introduction to Information Security
Introduction to Information Security
An Information Security overview.
-
34:41
Firewalls and Network Security - Information Security Lesson #7 of 12
Firewalls and Network Security - Information Security Lesson #7 of 12
Firewalls and Network Security - Information Security Lesson #7 of 12
Dr. Soper discusses firewalls and network security. Topics covered include network vulnerabilities, port scanning, network segmentation, firewall security po...
-
3:56
Information security training for new employees.
Information security training for new employees.
Information security training for new employees.
This animation was developed for partial fulfillment of MSc. computer science, systems security management (IS0729) module. This animation presents basic set...
-
2:22
Discover a Career in Information Security
Discover a Career in Information Security
Discover a Career in Information Security
Watch a networks analyst discuss his exciting career in information security and how he achieved his career goals. Brought to you by MSN.
-
7:47
Guide to Information Security Certifications
Guide to Information Security Certifications
Guide to Information Security Certifications
In this video I will talk about the Information Security Certifications out there and recomend what I feel is the best place to start and which ones you shou...
-
51:21
Information Security Policies - Development
Information Security Policies - Development
Information Security Policies - Development
A general presentation covering policy design within organisation. This presentation covers policies, procedures and guidelines along with a discussion of a ...
-
2:17
Physical & Information Security Awareness
Physical & Information Security Awareness
Physical & Information Security Awareness
-
76:27
Information Security—Before & After Public-Key Cryptography
Information Security—Before & After Public-Key Cryptography
Information Security—Before & After Public-Key Cryptography
[Recorded Jan 26, 2005] Whitfield Diffie, a key figure in the discovery of public-key cryptography, traces the growth of information security through the 20t...
-
38:22
Identification and Authentication - Information Security Lesson #2 of 12
Identification and Authentication - Information Security Lesson #2 of 12
Identification and Authentication - Information Security Lesson #2 of 12
Dr. Soper discusses identification and authentication issues in the context of computer security. Topics covered include controlled access, impersonation, au...
-
12:56
Managing IT Risk: Trends in Global Information Security
Managing IT Risk: Trends in Global Information Security
Managing IT Risk: Trends in Global Information Security
Enterprise IT security is a perpetual challenge for IT leaders. Companies are operating in a relentless and dynamic technology environment that puts all thei...
-
2:44
SIT - BEng (Hons) Information and Communications Technology (Information Security)
SIT - BEng (Hons) Information and Communications Technology (Information Security)
SIT - BEng (Hons) Information and Communications Technology (Information Security)
-
4:09
The Evolving Role of the Chief Information Security Officer
The Evolving Role of the Chief Information Security Officer
The Evolving Role of the Chief Information Security Officer
Driven by a confluence of increasingly sophisticated and determined attackers, as well as fundamental changes in computing models, the role of the CISO is ev...
-
1:03
Information Security 101: Data Protection
Information Security 101: Data Protection
Information Security 101: Data Protection
One of the first rules of Information Security is data protection. We are all familiar with encryption, anti-malware and anti-virus technology. But despite our best intentions, strange things still happen.
We have encryption, but how do we know it is active? And what use is a lock, if the key is still in the door? And as we all know, devices can end up in the weirdest places.
Then there is Anti-Virus software, if this is not up to date, you could be in big trouble. So how do you know your house is in order? Visibility is key.
To achieve this you need a persistent connection to each device. With alerts to whenever a device or data it cont
-
2:51
A day in the life of IT security
A day in the life of IT security
A day in the life of IT security
Find out how IT security take back control of the endpoint in this animation Learn more about Endpoint Control, the issues affecting organisations and how yo...
-
13:48
Social Engineering (Information Security) Awareness Training for Employees [sample]
Social Engineering (Information Security) Awareness Training for Employees [sample]
Social Engineering (Information Security) Awareness Training for Employees [sample]
Even the best information security policies, procedures, or controls are useless if employees are tricked not to follow them. Through 'social engineering', c...
-
15:34
Information Security & Risk Management
Information Security & Risk Management
Information Security & Risk Management
An Interview with Ian Mann after a guest lecture at Leeds Metropolitan University.
-
27:22
Denial of Service and Intrusion Detection - Information Security Lesson #11 of 12
Denial of Service and Intrusion Detection - Information Security Lesson #11 of 12
Denial of Service and Intrusion Detection - Information Security Lesson #11 of 12
Dr. Soper discusses denial of service attacks and intrusion detection systems. Topics covered include types of denial of service (DoS) attacks, connection fl...
-
47:41
Introduction to Information Security - ISC 11/29/12
Introduction to Information Security - ISC 11/29/12
Introduction to Information Security - ISC 11/29/12
The first presentation from UAH's Information Security Club meeting of November 29, 2012. This talk dealt with giving an Introdution to Information Security,...
-
31:56
CISSP SG Information Security Governance & Risk Management
CISSP SG Information Security Governance & Risk Management
CISSP SG Information Security Governance & Risk Management
Slide Deck https://www.defensepointsecurity.com/images/CISSP/CISSP_SG_RM.pptx.