Bob, You've Been PhishedBy Kevin Atef, Johnson Chau, & Michael Wong, Cal Poly PomonaGold Prize (First Place) winner, Single Topic Videos, of the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:03:00)
Computer Security 101By Darren Homme, St. Cloud State UniversityHonorable Mentions in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:03:09)
Computing in a Community Environment, Part I: Phishing and VirusesBy Rebecca Boswell, Alex Creswick, Drew Crofton, Nick Drader, & Matthew Fetter, Wake Forest UniversityHonorable Mentions in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:02:44)
Computing in a Community Environment, Part II: Laptop CareBy Rebecca Boswell, Alex Creswick, Drew Crofton, Nick Drader, & Matthew Fetter, Wake Forest UniversityHonorable Mentions in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:02:22)
Computing in a Community Environment, Part III: Legal DownloadingBy Rebecca Boswell, Alex Creswick, Drew Crofton, Nick Drader, & Matthew Fetter, Wake Forest UniversityHonorable Mentions in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:02:10)
Computing in a Community Environment, Part IV: Back Yo Data Up!By Rebecca Boswell, Alex Creswick, Drew Crofton, Nick Drader, & Matthew Fetter, Wake Forest UniversitySilver Prize (Second Place) winner, Single Topic Videos, of the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:01:44)
Gone PhishingBy Nazir Agah, Albert Antiquera, Jesse Cowan, Dwight Phelps, Tim Ingle, & Jason Kott, George Mason UniversityHonorable Mentions in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:02:36)
Guide to TechnologyBy Miguel Berg, University of DelawareHonorable Mentions in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:02:35)
HandsBy Eric Marth, College of William and Mary & Mark Thyrring, University of VirginiaHonorable Mentions in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:00;20)
Laptop TheftBy Adam Stackhouse, College of William & MaryHonorable Mentions in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:01:01)
LocksBy Eric Marth, College of William and Mary & Mark Thyrring, University of VirginiaHonorable Mentions in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:00:32)
Password Strength & SecurityBy James Kulbacki, Cal Poly PomonaHonorable Mentions in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:02:36)
Phished OutBy William Schoettler, University of MichiganHonorable Mentions in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:03:08)
Phishing - Would You Do That?By Alma Cole, Steven Hernandez, Clark Moresbach, & Zack Zeigler, Idaho State UniversityHonorable Mentions in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:03:01)
Phishing for KennyBy Miguel Berg, University of DelawareHonorable Mentions in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:02:56)
Sam Spam, Master DetectiveBy Daniel Bruhn & Ben Simmons, Indiana UniversityHonorable Mentions in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:03:37)
Superhighway SafetyBy Nathan Blair, Savannah College of Art and DesignGold Prize (First Place) winner, Broad Topic Videos, of the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:03:12)
The McCumber CubeBy Kory Godfrey, Idaho State UniversityBronze Prize (Third Place) winner, Broad Topic Videos, of the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:03:00)
VintageBy Eric Marth, College of William and Mary & Mark Thyrring, University of VirginiaHonorable Mentions in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:01:22)
Virus Software By Andrew Centafonte, Doug Standford, Jill Verillo, & Lindsey Wilson, James Madison UniversityHonorable Mentions in the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:00:30)
WastelandBy Eric Marth, College of William and Mary & Mark Thyrring, University of VirginiaSilver Prize (Second Place) winner, Broad Topic Videos, of the Security Awareness Video Contest sponsored by the EDUCAUSE/Internet2 Computer and Network Security Task Force and the National Cyber Security Alliance(00:00:29)
Searching the Web : Introduction to search techniques on the Web; practical approaches to using the Web; how to perform boolean searches; evaluate the usefulness of search engines and evaluate Web resources materials. (00:19:39)
Goto page: 1 2 3 4 5 6 7