MERLOT Materials

Show results for

Filter by

1-19 of 19 results for MERLOT Materials

Created as a training tool for computer forensics technicians, this website provides an abundance of information on the... see more

the U.S. Computer Emergency Readiness Team describes tips and offer advice about common security issues for non-technical... see more

Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired),... see more

Simply put, this is one of my most favorite topics when it comes to talking about computers. In this video we layout the... see more

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of... see more

Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept... see more

Risk analysis is often viewed as a “black art”—part fortune telling, part mathematics. Successful risk analysis, however,... see more

The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical... see more

Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket... see more

Our third video in our Information Security series (part of the Introduction to Computer course) focuses on... see more

These preview video clips feature authoritative experts in information security and assurance. The complete video and the... see more

Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at:... see more

ISP Private Security and Protection, Istanbul, Turkey. There is a lot of info about security sector, and industry. You... see more

No estamos acostumbrados a pensar en las instalaciones industriales como sensibles a problemas de seguridad o, al... see more

Partner Only Material

PowerPoint showing how a network is scanned and information is gathered about target computers

Introducción a los algoritmos criptográficos simétricos

La seguridad de la información es ya una disciplina claramente establecida y que no para de crecer, habida cuenta de su... see more

Esta píldora presenta de manera sucinta en qué consiste la firma digital de los mensajes, qué algoritmos y estructuras... see more

Se presentan las tecnologías básicas mas usuales en cortafuegos (firewalls) desde su base con las redes privadas y... see more