Search Materials
Sort materials by
Search Materials
Get more information on the MERLOT Editors' Choice Award in a new window.
Get more information on the MERLOT Classics Award in a new window.
Get more information on the JOLT Award in a new window.
Go to Search Page
Go to Partner Benefits
View material results for all categories

MERLOT II






        

Refine Your Search:

 
Materials 1 - 10 shown of 16 results

Encryption

A video discussion of encryption over the Internet for beginners
Material Type: Presentation
Author: Corinne Hoisington
Date Added: Mar 30, 2005 Date Modified: Oct 25, 2012
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Encryption"
User Rating for material titled "Encryption"
Member Comments for material titled "Encryption"
Bookmark Collections for material titled "Encryption"
Course ePortfolios for material titled "Encryption"
Learning Exercises for material titled "Encryption"
Accessibility Info for material titled "Encryption"
About this material:
Peer review 5 rating
Peer Reviews 5 rating
User review 2 average rating
User Rating 2 user rating
Discussion (1 Comment)
In (5)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

US-CERT Cyber Security Tips

the U.S. Computer Emergency Readiness Team describes tips and offer advice about common security issues for non-technical... see more
Material Type: Presentation
Author: United States Computer Emergency Readiness Team
Date Added: Apr 27, 2005 Date Modified: Feb 05, 2014
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "US-CERT Cyber Security Tips"
User Rating for material titled "US-CERT Cyber Security Tips"
Member Comments for material titled "US-CERT Cyber Security Tips"
Bookmark Collections for material titled "US-CERT Cyber Security Tips"
Course ePortfolios for material titled "US-CERT Cyber Security Tips"
Learning Exercises for material titled "US-CERT Cyber Security Tips"
Accessibility Info for material titled "US-CERT Cyber Security Tips"
About this material:
Peer review 5 rating
Peer Reviews 5 rating
User review 4 average rating
User Rating 4 user rating
Discussion (1 Comment)
In (5)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

An Overview of Steganography for the Computer Forensics Examiner

Created as a training tool for computer forensics technicians, this website provides an abundance of information on the art... see more
Material Type: Presentation
Author: Gary Kessler
Date Added: Dec 01, 2007 Date Modified: Feb 17, 2012
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "An Overview of Steganography for the Computer Forensics Examiner"
User Rating for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Member Comments for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Bookmark Collections for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Course ePortfolios for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Learning Exercises for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Accessibility Info for material titled "An Overview of Steganography for the Computer Forensics Examiner"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security Principles: An Overview

These preview video clips feature authoritative experts in information security and assurance. The complete video and the... see more
Material Type: Presentation
Author: Matt Rose
Date Added: Jan 16, 2003 Date Modified: Jan 15, 2014
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security Principles: An Overview"
User Rating for material titled "Information Security Principles: An Overview"
Member Comments for material titled "Information Security Principles: An Overview"
Bookmark Collections for material titled "Information Security Principles: An Overview"
Course ePortfolios for material titled "Information Security Principles: An Overview"
Learning Exercises for material titled "Information Security Principles: An Overview"
Accessibility Info for material titled "Information Security Principles: An Overview"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
In (4)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

1SP Ozel Guvenlik Sirketleri Istanbul

ISP Private Security and Protection, Istanbul, Turkey. There is a lot of info about security sector, and industry. You can... see more
Material Type: Presentation
Author: Ozel Guvenlik
Date Added: Aug 19, 2013 Date Modified: Mar 28, 2014
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
User Rating for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Member Comments for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Bookmark Collections for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Course ePortfolios for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Learning Exercises for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Accessibility Info for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

How your network can be scanned

PowerPoint showing how a network is scanned and information is gathered about target computers
Material Type: Presentation
Author: Steve Mallard
Date Added: Jul 07, 2012 Date Modified: Jul 07, 2012
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "How your network can be scanned"
User Rating for material titled "How your network can be scanned"
Member Comments for material titled "How your network can be scanned"
Bookmark Collections for material titled "How your network can be scanned"
Course ePortfolios for material titled "How your network can be scanned"
Learning Exercises for material titled "How your network can be scanned"
Accessibility Info for material titled "How your network can be scanned"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:01): Introduction

Simply put, this is one of my most favorite topics when it comes to talking about computers. In this video we layout the... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Sep 21, 2014
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:01): Introduction"
User Rating for material titled "Information Security (06:01): Introduction"
Member Comments for material titled "Information Security (06:01): Introduction"
Bookmark Collections for material titled "Information Security (06:01): Introduction"
Course ePortfolios for material titled "Information Security (06:01): Introduction"
Learning Exercises for material titled "Information Security (06:01): Introduction"
Accessibility Info for material titled "Information Security (06:01): Introduction"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:02): Physical Security

The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Sep 21, 2014
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:02): Physical Security"
User Rating for material titled "Information Security (06:02): Physical Security"
Member Comments for material titled "Information Security (06:02): Physical Security"
Bookmark Collections for material titled "Information Security (06:02): Physical Security"
Course ePortfolios for material titled "Information Security (06:02): Physical Security"
Learning Exercises for material titled "Information Security (06:02): Physical Security"
Accessibility Info for material titled "Information Security (06:02): Physical Security"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:03): Authentication

Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication.... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Sep 21, 2014
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:03): Authentication"
User Rating for material titled "Information Security (06:03): Authentication"
Member Comments for material titled "Information Security (06:03): Authentication"
Bookmark Collections for material titled "Information Security (06:03): Authentication"
Course ePortfolios for material titled "Information Security (06:03): Authentication"
Learning Exercises for material titled "Information Security (06:03): Authentication"
Accessibility Info for material titled "Information Security (06:03): Authentication"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:04): Protecting Your Data

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Jan 14, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:04): Protecting Your Data"
User Rating for material titled "Information Security (06:04): Protecting Your Data"
Member Comments for material titled "Information Security (06:04): Protecting Your Data"
Bookmark Collections for material titled "Information Security (06:04): Protecting Your Data"
Course ePortfolios for material titled "Information Security (06:04): Protecting Your Data"
Learning Exercises for material titled "Information Security (06:04): Protecting Your Data"
Accessibility Info for material titled "Information Security (06:04): Protecting Your Data"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)
RSS

Results page 1 of 2
2  Next Next Arrow
Jump to page