Cover image of Networks & Security

Networks & Security

The Networks and Security collection reflects the cyber security research, education and awareness interests of Plymouth University. In addition to podcasts and tutorials that have been created espec... Read more

Ranked #1

Podcast cover

Developing Cyber Skills: A Job Role Centric Approach

Developing Cyber Skills: A Job Role Centric Approach

Jane Dickinson talks about CompTIA's approach to supporting individuals and businesses with security readiness, includin... Read more

13 Mar 2017

23mins

Ranked #2

Podcast cover

Cyber Attacks

Cyber Attacks

John Finch examines the anatomy of a cyber-attack that caused a breach of public sector data, considering the impact ass... Read more

24 Oct 2016

27mins

Similar Podcasts

Ranked #3

Podcast cover

Careering towards a secure future?

Careering towards a secure future?

Recognising the breadth of cyber security, there is a corresponding recognition of the widening need for skills - from s... Read more

12 Dec 2016

37mins

Ranked #4

Podcast cover

Apprenticeships into Cyber - A Panel Discussion

Apprenticeships into Cyber - A Panel Discussion

Kevin Jones moderates a panel discussion about the role of apprenticeships as a means of entering a career in the domain... Read more

21 Mar 2015

Most Popular Podcasts

Ranked #5

Podcast cover

Vulnerability management

Vulnerability management

Considering the essential role of vulnerability management in maintaining IT security, examining how it can be undermine... Read more

27 Aug 2011

17mins

Ranked #6

Podcast cover

Integrated Compliance and Risk Management using STREAM

Integrated Compliance and Risk Management using STREAM

Richard Mayall shows how a variety of risk and compliance activities can be combined into an Integrated Management Syste... Read more

14 Jun 2014

Ranked #7

Podcast cover

Quantum Cryptography

Quantum Cryptography

From 2000BC, cryptography used substitution ciphers and relied on a key exchange. With Public Key Cryptography, Mathemat... Read more

4 Jan 2016

54mins

Ranked #8

Podcast cover

03 - Basic SQL String Injection

03 - Basic SQL String Injection

This is the third of a series of videos that consider a range of security vulnerabilities. In this video, the concept of... Read more

18 Feb 2011

7mins

Ranked #9

Podcast cover

A look into the Payment Card Industry

A look into the Payment Card Industry

Pete Woodward, Chief Information Officer of Securious Limited, explains what PCI DSS means to SMEs and large corporation... Read more

7 Apr 2016

23mins

Ranked #10

Podcast cover

The IT Security Industry - Survival in the Age of Cyberwarfare

The IT Security Industry - Survival in the Age of Cyberwarfare

First came Stuxnet, then Duqu, followed by Flame, Gauss and Red October. These were all cutting-edge malware used for cy... Read more

19 May 2013

Ranked #11

Podcast cover

Security usability - Principles and perceptions

Security usability - Principles and perceptions

An examination of the need for security features to be usable and understandable for their target audience. [Released u... Read more

21 Nov 2010

15mins

Ranked #12

Podcast cover

Mobile Malware

Mobile Malware

Prof. Steven Furnell outlines the problem of malware on mobile devices, looking at how it has been a long-predicted thre... Read more

16 Dec 2012

Ranked #13

Podcast cover

RFID security

RFID security

An introduction to the general principles of RFID technology and an overview of some of the attacks that this can enable... Read more

29 Sep 2011

9mins

Ranked #14

Podcast cover

Security and Privacy - All under control?

Security and Privacy - All under control?

Privacy settings are available on many devices and services, but the available options can often frustrate attempts to c... Read more

20 Sep 2015

32mins

Ranked #15

Podcast cover

Cyber Security for SMBs

Cyber Security for SMBs

Cyber Security has seen many changes recently with terms such as hactivism, cyber-espionage and cyber-warfare dominating... Read more

21 Jul 2012

Ranked #16

Podcast cover

Bitcoin and other Crypto- currencies – Will they thrive once regulated?

Bitcoin and other Crypto- currencies – Will they thrive once regulated?

Bitcoin has shown that an alternative, decentralized currency is now possible. As there is no central authority, anyone ... Read more

10 May 2014

Ranked #17

Podcast cover

Pursuing Careers in Cyber Security

Pursuing Careers in Cyber Security

This film presents thoughts from various exhibitors at the South West Regional Cyber Day, organised by the Cyber Securit... Read more

4 Apr 2015

Ranked #18

Podcast cover

04 - Password Recovery

04 - Password Recovery

This is the fourth of a series of videos that consider a range of security vulnerabilities. In this video, the Password ... Read more

18 Feb 2011

3mins

Ranked #19

Podcast cover

Testing our Security Defences

Testing our Security Defences

Dr Maria Papadaki from Plymouth University examines how penetration testing can help assess the robustness of our securi... Read more

12 May 2013

Ranked #20

Podcast cover

Harnessing Security Skills and Professionalism

Harnessing Security Skills and Professionalism

Despite increasing demand for cyber security roles, the industry is facing a deficit of skilled practitioners. Amanda Fi... Read more

23 Feb 2014

“Podium: AI tools for podcasters. Generate show notes, transcripts, highlight clips, and more with AI. Try it today at https://podium.page”