Channel Avatar

Tom Olzak @UCUVwk67-aItVVAQZiCWka0g@youtube.com

3.7K subscribers - no pronouns :c

This channel provides weekly insights into information secur


05:52
BitLocker: Why and How
03:29
Red and Blue Teams
08:21
Cloud Cost-Benefit Analysis
07:49
Validate Computing Device Integrity
11:14
Cell Phone Security
08:44
Cloud Service Categories
08:32
Cloud Terminology
30:42
Risk Assessment and Management
20:45
Fileless Malware and APT Defense
10:32
Zero Trust Part 2: Architecture
15:32
Secure the Data Lifecycle
07:50
Zero-Trust Part 1 - Objectives and Tenets
09:15
Discovering System Vulenerabilities
15:33
Biometrics: Operation, Planning, and Implementation
13:57
Privileged Account and Session Management
06:30
IT Asset Management (ITAM)
05:51
Homomorphic Encryption
26:26
Identity Use and Identity Lifecycle
10:31
Secure Virtualization
08:43
Communications and Network Security Part 24 – Data Communications (WAN)
19:28
Communications and Network Security Part 23 – Remote Access Security
13:41
Communications and Network Security Part 22 – Remote Collaboration & Email
08:16
Communications and Network Security Part 21 – Secure Voice Communications
07:59
Communications and Network Security Part 20 – Communication Channel and Authentication Protocols
08:14
Communications and Network Security Part 19 – Defense in Depth
05:22
Communications and Network Security Part 18 - Network Access Control (NAC)
20:38
Communications and Network Security Part 17 - Endpoint Security
06:11
Communications and Network Security Part 16 - RF Spread Spectrum
06:29
Communications and Network Security Part 15 - Network Topologies
08:52
Communications and Network Security Part 14 – Network_Cabling
10:21
Communications and Network Security Part 13 - Hardware Device Network Security
17:17
Principles of Cloud Computing
06:15
Communications and Network Security Part 12 - IDS/IPS and SIEM
05:04
Communications and Network Security Part 11 – Network Address Translation (NAT)
10:51
Communications and Network Security Part 10 - Firewalls
06:20
Communications and Network Security Part 9 - Network Types
24:27
Communications and Network Security Part 8 - Wireless Networks
02:47
Communications and Network Security Part 7 - Software-defined Networking (SDN)
03:23
Communications and Network Security Part 6 – Multilayer and Converged Protocols
11:30
Communications and Network Security Part 5 - Network Attacks
10:04
Communications and Network Security Part 4 - IPv4 and IPv6
08:49
Communications and Network Security Part 3: Routing Protocols
11:21
Communications and Network Security Part 2 - OSI and TCP/IP Models
07:50
Communication and Network Security - Part 1: Domain Separation and Segmentation
09:44
Physical Security Part 4 - Environmental Controls
08:20
Physical Secuity Part 3 - Lights, Sensors, and Alarms
11:21
Physical Security Part 2 - Walls, Doors, and Locks
10:45
Physical Security Part 1: Intro and Site Barriers
05:41
Cryptography Part 7 - Steganography
08:26
Cryptography Part 6 - Cryptanalytic Attacks
06:05
Cryptography Part 5: Key Management
07:58
Cryptography Part 4: Hashing
13:06
Cryptography Part 3: Asymmetric Encryption
13:12
Cryptography Part 2: Symmetric Encryption
11:08
Cryptography Part 1 - History
10:40
System Hardening - CISSP
11:11
Security Capabilities of Information Systems - CISSP
07:14
Select Systems Controls Based Upon Requirements - CISSP
08:36
Fundamental Concepts of Security Models - CISSP
07:30
Asset Handling Requirements - CISSP