21st Century Learning and Teaching
586.2K views | +4 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Learning IT-Security', 'YouTube'. Clear
Scooped by Gust MEES
Scoop.it!

Security Concerns Surrounding Web Browsers | Learning basics of CyberSecurity | Video

This video provides an in depth look at web browsers, how they are utilized and the security concerns that go along with their usage. At the end of the video...


Learn more:


https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/


Gust MEES's insight:
This video provides an in depth look at web browsers, how they are utilized and the security concerns that go along with their usage. At the end of the video...


Learn more:


https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybersecurity 101 - YouTube

The Internet is fundamentally insecure. However, there are simple things you can do to protect yourself and your information. Learn what they are in NOVA’s C...
Gust MEES's insight:

The Internet is fundamentally insecure. However, there are simple things you can do to protect yourself and your information. Learn what they are in NOVA’s C...


No comment yet.
Scooped by Gust MEES
Scoop.it!

Virtual private network (VPN) : un tunnel sécurisé

Le VPN (virtual private network) est une technologie qui permet aux employés de se connecter à distance et en toute sécurité à leur réseau d'entreprise via l...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

Gust MEES's curator insight, October 15, 2013 11:35 AM

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 

Amandine Duffoux's curator insight, October 16, 2013 2:35 PM

Une excellente vidéo de vulgarisation présentant le principe du VPN. Très bien si vous voulez savoir comment ça marche de manière très simplifiée.

Scooped by Gust MEES
Scoop.it!

Les logiciels malveillants

Les logiciels malveillants prennent des formes très diversifiées : virus, vers, chevaux de Troie... Dans tout les cas, il convient de rester vigilant et de n...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Moving Beyond Antivirus with Network Threat Protection

Today's evolved malware requires more than antivirus on the endpoint. Proactive protection involves a layered defense that includes Network Threat Protection...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/12/best-addresses-to-stay-informed-about-it-security-and-cyber-security/

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

http://gustmees.wordpress.com/2012/12/30/why-and-how-teachers-should-start-learning-and-teaching-cyber-security/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Scooped by Gust MEES
Scoop.it!

Learning Cybersecurity: DDOS on the VideoLAN downloads infrastructure

The April 23, 2013 we experienced a major DDOS on our infrastructures this how it looked like from logstalgia. https://code.google.com/p/logstalgia/
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=DDos

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

 

Scooped by Gust MEES
Scoop.it!

Learning basics of Cyber-Security: Cybercrime Goes Mobile

With widespread popularity of mobile devices corporate espionage has never been so easy. See how a simple app can transform a smartphone into an espionage to...
Gust MEES's insight:

A MUST see and Mac users ===> OPEN YOUR EYES!!!

 

Read also:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BBC-Public-WiFi-Security

 

https://gustmeesfr.wordpress.com/2012/05/31/securite-internet-guide-pratique/

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 

 

Zhao KQiang's curator insight, March 27, 2014 6:48 AM

one of interesting information, the video shows the security risk in daily life using smart phone. It is easy to call public to aware about the mobile security, also it contains lots of data which are useful 

Scooped by Gust MEES
Scoop.it!

Learning basics of IT-Security: A day in the life of IT security

Find out how IT security take back control of the endpoint in this animation Learn more about Endpoint Control, the issues affecting organisations and how yo...

 

=============================================

 

Gust MEES

Read also my FREE courses here:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

=============================================

 

Melf's curator insight, April 18, 2014 9:13 AM

Here you see some facts about how companies lack in security.

Some points like file sharing and getting worms are a really big issue. If there is no protection against that the company may be in danger. If all people have about 3 devices and they arent protected, you cant stop this.

Melf's curator insight, April 25, 2014 9:02 AM

I think that people should pay more attention to this because there are more victims every day. Not only persons but also companies could get trouble with not paying attention to your data.

Melf's curator insight, April 25, 2014 9:07 AM

Im very afraid of losing data myself. I saw a commercial once that someone took over the identity of another person. I hope that people pay more attention and try to be more safe in the future.

Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

The Role of Cryptography - Part 1

The topic delves into Cryptography in some detail. It is taken from one of the 5 day courses created by InfoSec Skills - CISMP - "The Certificate in Informat...

Via Frederic GOUTH
No comment yet.
Scooped by Gust MEES
Scoop.it!

Information security training for new employees | CyberSecurity | EDUcation

This animation was developed for partial fulfillment of MSc. computer science, systems security management (IS0729) module. This animation presents basic set...
Gust MEES's insight:
This animation was developed for partial fulfillment of MSc. computer science, systems security management (IS0729) module. This animation presents basic set...
elisajames's comment, December 5, 2014 2:57 AM
thanks for this sharing its really informative
Scooped by Gust MEES
Scoop.it!

Cyber Codes | Cryptography

Do you trust the security of your email, text messages, and browser history? Learn how trustworthy online communication actually is and how encryption can pr...
Gust MEES's insight:

Do you trust the security of your email, text messages, and browser history? Learn how trustworthy online communication actually is and how encryption can pr...


No comment yet.
Scooped by Gust MEES
Scoop.it!

Vulnerabilites

Nous savons que pour réduire les risques il faut travailler sur les vulnérablités. Quelles sont les vulnérabilités associées aux systèmes d'information?
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

PHISHING: See how easily freaks can take over your life

http://www.safeinternetbanking.be/ Would you panic while internet crooks took over your life? We put one real victim through the test. We scared the hell out...
Gust MEES's insight:

 

PHISHING: See how easily freaks can take over your life!!!

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

Jason Toy's curator insight, July 11, 2013 5:44 AM

People are still more scared of being mugged on the way home or fear that a burglar will break into their home while they are sleeping. This..THIS..right here is where the terror should be felt. The odds of this happening are much greater and people need to take the blinders off.

Christ Is My Savior Ministries's curator insight, July 19, 2013 9:58 PM

Please be careful while on-line.

Christ Is My Savior Ministries's comment, July 19, 2013 9:58 PM
Please be careful while on-line.
Scooped by Gust MEES
Scoop.it!

Targeted Attacks - Security Spotlight Series: Episode Five

Tune in to watch Security Spotlight's fifth episode, on Targeted Attacks. In these attacks cybercriminals target a specific person or company to obtain speci...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Sophos - IT Security | YouTube Channel Videos

Sophos focuses on delivering the best IT security and data protection for businesses. We produced our first encryption and antivirus products in the 1980s. T...
Gust MEES's insight:

 

Visual IT-Security, Cyber-Security... Learn through videos, it's easy to understand...

 

Check also:

 

https://gustmees.wordpress.com/2012/05/26/visual-it-securitylearn-with-videos/

 

Gust MEES's curator insight, April 23, 2013 10:34 AM

 

Visual IT-Security, Cyber-Security... Learn through videos, it's easy to understand...

 

Check also:

 

https://gustmees.wordpress.com/2012/05/26/visual-it-securitylearn-with-videos/

 

 

Scooped by Gust MEES
Scoop.it!

BBC - Public WiFi Security: BBC pirate un réseau Wi-FI

Gust MEES's insight:

A MUST see and Mac users ===> OPEN YOUR EYES!!!

 

Read also:

 

https://gustmeesfr.wordpress.com/2012/05/31/securite-internet-guide-pratique/

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

The Role of Cryptography - Part 5

The topic delves into Cryptography in some detail. It is taken from one of the 5 day courses created by InfoSec Skills - CISMP - "The Certificate in Informat...

Via Frederic GOUTH
No comment yet.