824
  • Wireless Sniffing at a Cafe - Duration: 3 minutes, 3 seconds.

    • 3 years ago
    • 3,320 views
    Dave regularly uses the WiFi at a local cafe. It seems harmless, but he should watch out for that unsecured connection
  • Travel Trouble - Duration: 84 seconds.

    • 3 years ago
    • 177 views
    The Cybers take a trip while Burglar Bob takes everything else.
  • Bob's Toxic Attachment - Duration: 101 seconds.

    • 3 years ago
    • 169 views
    Bob receives an urgent email with a suspicious attachment. What should he do?
  • Oscar Pays to Play - Duration: 105 seconds.

    • 3 years ago
    • 169 views
    Oscar makes in-game purchases with his mom's credit card. Who will pay?
  • Bob's Malicious Email - Duration: 2 minutes, 30 seconds.

    • 3 years ago
    • 485 views
    Bob receives an urgent email, but something about it seems fishy.
  • Too Much Information - Duration: 114 seconds.

    • 3 years ago
    • 191 views
    A prospective employer searches for David online. What will she find?
  • Character Introductions - Duration: 3 minutes, 20 seconds.

    • 3 years ago
    • 308 views
    Meet the Cyber Family, some of their friends, and some of their adversaries.
  • Carol Shops Online - Duration: 2 minutes, 30 seconds.

    • 3 years ago
    • 124 views
    Carol goes shopping and discovers some deals that may be too good to be true.
  • Alice Meets Malware - Duration: 2 minutes, 12 seconds.

    • 3 years ago
    • 319 views
    An unknown website wants Alice to download a new video player. What should she do?
  • Alice's Devious Download - Duration: 111 seconds.

    • 3 years ago
    • 180 views
    Whoops! Alice has accidentally downloaded malware onto her mom's computer. What now?
  • Alice's Bully - Duration: 113 seconds.

    • 3 years ago
    • 167 views
    Alice receives threatening messages on an anonymous messaging application. Can anybody help her?
  • Wireless Sniffing at the Airport - Duration: 83 seconds.

    • 3 years ago
    • 141 views
    Arriving home from a business trip, Carol discovers that her bank account has been compromised. What happened?
  • Lesson 30: Interpersonal Issues Online - Duration: 10 minutes.

    • 3 years ago
    • 269 views
    Describes five common interpersonal issues that web users should be aware of:

    1. Anonymity [0:44]
    2. Missing the Communication Context [2:27]
    3. Privacy [4:15]
    4. Everlasting Information [5:27]
    5....
  • Lesson 29: Reading URLs - Duration: 9 minutes, 53 seconds.

    • 3 years ago
    • 346 views
    A crash course on reading URLs (also known as web addresses). Being able to read URLs helps web users to verify that they are visiting authentic web pages instead of malicious counterfeits.
  • Lesson 28: Social Engineering - Duration: 14 minutes.

    • 3 years ago
    • 303 views
    Describes four common social engineering threats:

    1. Instant Messages [2:02]
    2. Fake Antivirus or "Scareware" [3:42]
    3. Emails [5:28]
    4. Phone Calls [11:47]
  • Lesson 27: Social Media and Security - Duration: 10 minutes.

    • 3 years ago
    • 463 views
    Describes two security issues for users of social media:

    1. Burglars on Social Media [0:26]
    2. Phishing Scams and Malware on Social Media [6:30]
  • Lesson 26: Social Media and Privacy - Duration: 9 minutes, 51 seconds.

    • 3 years ago
    • 1,728 views
    Addresses three privacy considerations for social media users:

    1. Friend Gluttony [1:31]
    2. Copying and Pasting [4:33]
    3. Employers [5:22]
  • Lesson 25: Administering Wireless Networks - Duration: 7 minutes, 34 seconds.

    • 3 years ago
    • 278 views
    Covers six tips for administering a home wireless network:

    1. Use a Strong Router Password [1:24]
    2. Enable Wireless Signal Encryption [2:26]
    3. Enable Router Firewalls [3:27]
    4. Disable SSID Broa...
  • Lesson 24: Using Public Wireless Networks - Duration: 9 minutes, 18 seconds.

    • 3 years ago
    • 285 views
    Shares five tips for safer browsing on public WiFi

    1. Refrain from using public networks for private business [0:42]
    2. Obscure your computer screen and keyboard [1:36]
    3. Know whether your connec...
  • Lesson 23: Wireless Internet Security Threats - Duration: 11 minutes.

    • 3 years ago
    • 363 views
    Notice: We recommend that an adult screen this video before sharing it with young children. The fourth section of this video contains a passing reference to a serious and potentially frightening cy...
  • Lesson 22: Wireless Network Basics - Duration: 5 minutes, 26 seconds.

    • 3 years ago
    • 502 views
    Provides a few brief notes on how wireless networks work.
  • Lesson 21: Online Shopping - Duration: 16 minutes.

    • 3 years ago
    • 297 views
    Addresses eleven security issues for online shopping:

    1. Avoiding Malware [0:51]
    2. Using Strong Passwords [2:02]
    3. Using Trusted Computers [2:51]
    4. Unsecure Wireless Networks [3:39]
    5. Maliciou...
  • Lesson 20: Safely Navigating the Web - Duration: 18 minutes.

    • 3 years ago
    • 309 views
    Discusses four web safety issues:

    1. Handling Files [0:25]
    2. Accepting Cookies [8:03]
    3. HTTPS [12:01]
    4. Browsing History [14:56]
  • Lesson 19: How Web Browsing works - Duration: 11 minutes.

    • 3 years ago
    • 417 views
    An introduction explaining how computers interact with the web.
  • Lesson 18: Layers of Defense Against Malware - Duration: 8 minutes, 51 seconds.

    • 3 years ago
    • 385 views
    Describes five layers of defense against malware:

    1. Backing Up Data [0:44]
    2. Using a Firewall [1:47]
    3. Installing Software Patches [4:21]
    4. Using Antivirus Software [5:41]
    5. User Education [7...
  • Lesson 17: Sources of Malware - Duration: 13 minutes.

    • 3 years ago
    • 396 views
    Describes eight common sources of malware:

    1. Removable Media [0:27]
    2. Documents and Executables [3:31]
    3. Internet Downloads [5:00]
    4. Network Connections [6:07]
    5. Email Attachments [7:57]
    6. D...
  • Lesson 15: Varieties of Malware - Duration: 7 minutes, 40 seconds.

    • 3 years ago
    • 505 views
    Introduces four different kinds of malware:

    1. Viruses [0:40]
    2. Worms [1:55]
    3. Trojan Horses [3:07]
    4. Bots [4:04]
  • Lesson 16: Functions of Malware - Duration: 10 minutes.

    • 3 years ago
    • 467 views
    Describes seven common functions of malware:

    1. Overwhelming System Resources [0:59]
    2. Running Malicious Adware [2:46]
    3. Running Spyware [4:06]
    4. Running Ransomware [4:47]
    5. Creating Backdoors...
  • Lesson 14: Email Security - Duration: 12 minutes.

    • 3 years ago
    • 1,134 views
    Discusses six common email threats:

    1. Eavesdropping [0:24]
    2. Spamming and Phishing [1:35]
    3. Spoofing [3:23]
    4. Malicious Email Attachments [5:13]
    5. Replying and Forwarding Issues [6:37]
    6. Car...
  • Lesson 13: How Email Works - Duration: 10 minutes.

    • 3 years ago
    • 53,423 views
    Describes the paths that emails follow across the Internet.
  • Lesson 12: Managing Passwords - Duration: 6 minutes, 48 seconds.

    • 3 years ago
    • 450 views
    Provides tips for managing passwords, including the following:

    1. securely record your passwords [0:51]
    2. rank your passwords [2:18]
    3. use password management software [4:19]
  • Lesson 11: Creating Strong Passwords - Duration: 6 minutes, 42 seconds.

    • 3 years ago
    • 581 views
    Provides tips for creating strong, memorable passwords.
  • Lesson 10: Common Password Threats - Duration: 20 minutes.

    • 3 years ago
    • 598 views
    Introduces the following common password threats:

    1. user disclosure [1:05]
    2. social engineering [3:01]
    3. phishing [3:55]
    4. key logging [6:10]
    5. wireless sniffing [8:45]
    6. brute force guessin...
  • Lesson 9: Passwords and Hash Functions - Duration: 8 minutes, 17 seconds.

    • 3 years ago
    • 626 views
    Discusses why passwords are so prevalent today and how organizations use hash functions to secure stored passwords.
  • Lesson 8: Demystifying the Internet (Part 3) - Duration: 13 minutes.

    • 3 years ago
    • 484 views
    Describes how information is routed across the Internet.
  • Lesson 7: Demystifying the Internet (Part 2) - Duration: 13 minutes.

    • 3 years ago
    • 570 views
    Describes the basic structure of the whole Internet. Also describes the basic structure of small, individual networks like home wireless networks or office networks.
  • Lesson 6: Demystifying the Internet (Part 1) - Duration: 6 minutes, 53 seconds.

    • 3 years ago
    • 594 views
    Introduces some helpful concepts for understanding the Internet.
  • Lesson 5: Demystifying Computers (Part 2) - Duration: 6 minutes, 46 seconds.

    • 3 years ago
    • 645 views
    Describes what happens when users turn on a computer and when they run an application.
  • Lesson 4: Demystifying Computers (Part 1) - Duration: 14 minutes.

    • 3 years ago
    • 1,017 views
    Identifies the basic parts of a computer in plain English. Describes four layers of a computer system:
    1. Users
    2. Hardware
    3. Operating System
    4. Applications
  • Lesson 3: Cyber Security Terminology - Duration: 15 minutes.

    • 3 years ago
    • 2,604 views
    Presents new vocabulary terms in context with true stories about cyber attacks.
  • Lesson 2: Why Study Cyber Security - Duration: 6 minutes, 30 seconds.

    • 3 years ago
    • 1,871 views
    Sketches some reasons why everyday people would want to study cyber security.
  • Lesson 1: Avoiding Plagiarism - Duration: 5 minutes, 12 seconds.

    • 3 years ago
    • 2,826 views
    A brief introduction to plagiarism. This video gives some tips for avoiding plagiarism of ideas and language.
to add this to Watch Later

Add to

Loading playlists...