Instructional Videos

Module Organization

The content shown in these videos is presented in a logical progression of topics that allows for a foundation to be constructed and context to be built upon as the reader progresses through the chapters.  The videos are designed to correspond to the chapters in the book.  However, individual videos can be used to teach a particular concept.

These videos are designed to be used in multiple grade levels including college.  The levels of discussion and the difficulty of the assessment can vary depending on the purpose and the level of the students.

The videos can be found on our IowaCyber YouTube Channel or our IowaCyber Vimeo Channel. Downloadable videos can be access through the Teacher/Educator Materials page.


TopicName/DescriptionChapter InfoVideo Links
Avoiding PlagiarismA brief introduction to plagiarism. This video gives some tips for avoiding plagiarism of ideas and language. This video discusses both idea plagiarism and language plagiarism. [5:11]Pre–Chapter 1YouTube

Vimeo
Why Study Cyber SecurityThis is an introduction video discussing what cyber security is and why it is important. It also tears down the media’s perception of cyber criminals and sketches some reasons why everyday people would want to study cyber security. [6:29]Pre-Chapter 1YouTube

Vimeo
Cyber Security TerminologyThis video utilizes the information security vocabulary through various vignettes. [15:47]Chapter 1YouTube

Vimeo
Demystifying Computers Part 1Take apart a computer and examine some of the bigger parts that interact with each other. It goes through all four layers mentioned in the textbook: users, hardware, operating system, and applications. [14:16]Chapter 2YouTube

Vimeo
Demystifying Computers Part 2Begin examining how software interacts with computers. Discusses what happens when you turn on a computer and run an application (how layers interact with each other). [6:45]Chapter 2YouTube

Vimeo
Demystifying the Internet Part 1Examines the Internet – What is it? How does it work? Discusses how the Internet works, Internet service providers, Internet protocol; demonstrates how the Internet is a network of computer networks bound together. [6:52]Chapter 2YouTube

Vimeo
Demystifying the Internet Part 2Hierarchical structure of the Internet and how devices are assigned IP addresses. Describes the basic structure of the whole Internet. Also describes the basic structure of small, individual networks like home wireless networks or office networks. [13:08]Chapter 2YouTube

Vimeo
Demystifying the Internet Part 3Explores how information travels through the Internet. [13:13]Chapter 2YouTube

Vimeo
Passwords and Hash FunctionsBegin talking about passwords. Discusses why passwords are so prevalent today. Explains hash functions and how organizations use hash functions to secure stored passwords. Shows a mathematical illustration of how a function can be ‘irreversible’ (like how hash functions are intractable). [8:16]Chapter 3YouTube

Vimeo
Common Password ThreatsIntroduces common password threats and tricks that hackers use against you to get your user names and passwords. Strategies on how to avoid them/minimize the threats. Explains ten common password threats: user disclosure, social engineering, phishing, key logging, wireless sniffing, brute force guessing, dictionary attacks, password files not encrypted, exposed passwords with known hash values, security questions. [20:41]Chapter 3YouTube

Vimeo
Creating Strong PasswordsProvides tips for creating strong, memorable passwords. [6:41]Chapter 3YouTube

Vimeo
Managing PasswordsHow to manage passwords in a practical manner. Tips include how to securely record your passwords, how to rank your passwords, and how to use password management software. [6:47]Chapter 3YouTube

Vimeo
How Email WorksDescribes the paths that emails follow across the internet. Clarifies how email systems work in order to learn how to defend yourself from certain kinds of cyber attacks. Goes through application and web–based UAs, MTA, SMTP, and MIME headers. Also explains how to view full headers. [10:12]Chapter 4YouTube

Vimeo
Email SecuritySecurity threats and privacy issues that come through email and how to avoid/minimize these threats. Goes through eavesdropping, spamming, phishing, spoofing, malicious email attachments, replying/forwarding issues, and Carbon Copy (CC)/Blind Carbon Copy (BCC) issues. [12:35]Chapter 4YouTube

Vimeo
Kinds of MalwareMalicious Software – the differences between virus, worm, Trojan horse, and bot. [7:39]Chapter 5YouTube

Vimeo
Functions of MalwareDescribes what malware can do to your computer and goes through the seven most common functions of malware: overwhelming system resources, running malicious adware, running spyware, running ransomware, creating backdoors, disabling security functions, and creating botnets. [10:23]Chapter 5YouTube

Vimeo
Sources of MalwareEight common sources of malware: removable media, documents and executables, Internet downloads, network connections, email attachments, drive–by downloads, pop–ups, malicious advertisements. Also, briefly discusses security patches and firewalls. [13:38]Chapter 5YouTube

Vimeo
Layers of Defense Against MalwareThis video introduces the layers of defense that can be used to prevent/minimize a malware attack including: backing up data, using a firewall, installing software patches, using antivirus software, and user education. [8:50]Chapter 6YouTube

Vimeo
How Web Browsing WorksWeb browsing and how your computer interacts with it. Discusses Figure 7.1 in textbook. Looks at HTML code seen in Figure 7.3 in the textbook. [11:38]Chapter 7YouTube

Vimeo
Safely Navigating the WebSecurity topics relevant to web browsing. Handling files in web browser (Figure 7.4), accepting cookies from a website, using the more secure version of HTTP, keeping/deleting web browser history. [18:08]Chapter 7YouTube

Vimeo
Online ShoppingMost common security issues faced when shopping online [16:30]Chapter 8YouTube

Vimeo
How Wireless Networks WorkIntroduction to wireless networks and how they work. [5:25]Chapter 9YouTube

Vimeo
Wireless Internet Security ThreatsIntroduces common security threats that wireless users face.
**CONTENT ADVISORY** We recommend that an adult screen this video before sharing it with young children. The fourth section of this video contains a passing reference to a serious and potentially frightening cyber crime revolving around crimes against children beginning at [9:50]. [11:32]
Chapter 9YouTube

Vimeo
Using Public Wireless NetworksWhat users can do to safely, or more securely, use public wireless networks. [9:17]Chapter 9YouTube

Vimeo
Administering Wireless NetworksSecuring your home wireless network. [7:34]Chapter 9YouTube

Vimeo
Social Media and PrivacyPrivacy issues on social media. Addresses three privacy considerations for social media users: Friend Gluttony, Copying & Pasting, Employers. [9:50]Chapter 10YouTube

Vimeo
Social Media – SecurityHow privacy tradeoffs on social media can lead to tradeoffs in personal security. How burglars can use social media to target their victims. How social media is used for malware attacks. [10:31]Chapter 10YouTube

Vimeo
Social EngineeringIntroduction into social engineering and four common threats associated with it. [14:46]Chapter 11YouTube

Vimeo
Reading URLsA crash course on reading URLs (also known as web addresses). Being able to read URLs helps web users to verify that they are visiting authentic web pages instead of malicious counterfeits. [9:52]Chapter 11YouTube

Vimeo
Interpersonal IssuesSocial threats faced online – being aware of these five common interpersonal issues facing web users: anonymity, missing the communication context, privacy, everlasting information, credibility . [10:50]Chapter 12YouTube

Vimeo