5:52 Using AI&LLM to create assignments with HTML output to use in Canvas, websites, other LMS systems Eric Magidson 211 views - 11 months ago
8:04 Downloading and Installing Kali Linux on VMWare Fusion with Apple Silicone (2025) Eric Magidson 6.3K views - 1 year ago
7:21 Downloading and Installing Kali Linux for VMWare Workstation Pro on Windows (2025) Eric Magidson 6.7K views - 1 year ago
4:00 Downloading and Installing VMWare Workstation Pro to a Windows (2025) Eric Magidson 35.2K views - 1 year ago
2:46 Creating a Broadcom Support Account to download VMWare Fusion or Workstation Pro (2025) Eric Magidson 4.5K views - 1 year ago
17:32 Future-Proofing Oregon's Cybersecurity Workforce - Statewide Degree Program Eric Magidson 164 views - 1 year ago
8:22 Download and Install Older Versions of Kali Linux to Use with Linux Basics for Hackers First Edition Eric Magidson 2.4K views - 1 year ago
10:43 Part 6 - 9.0 Managing the Maze - Governance, Compliance, Risk Management Eric Magidson 80 views - 1 year ago
14:19 Part 5 - 9.0 Managing the Maze - Governance, Compliance, Risk Management Eric Magidson 64 views - 1 year ago
13:15 Part 4 - 9.0 Managing the Maze - Governance, Compliance, Risk Management Eric Magidson 51 views - 1 year ago
12:17 Part 3 - 9.0 Managing the Maze - Governance, Compliance, Risk Management Eric Magidson 59 views - 1 year ago
13:32 Part 2 - 9.0 Managing the Maze - Governance, Compliance, Risk Management Eric Magidson 76 views - 1 year ago
9:19 Part 1 - 9.0 Managing the Maze - Governance, Compliance, Risk Management Eric Magidson 87 views - 1 year ago
11:17 Part 6 - 8.0 Cumulus Security - Cloud Computing and Security Eric Magidson 118 views - 1 year ago
14:39 Part 5 - 8.0 Cumulus Security - Cloud Computing and Security Eric Magidson 83 views - 1 year ago
14:17 Part 4 - 8.0 Cumulus Security - Cloud Computing and Security Eric Magidson 54 views - 1 year ago
14:38 Part 3 - 8.0 Cumulus Security - Cloud Computing and Security Eric Magidson 73 views - 1 year ago
16:38 Part 2 - 8.0 Cumulus Security - Cloud Computing and Security Eric Magidson 64 views - 1 year ago
14:43 Part 1 - 8.0 Cumulus Security - Cloud Computing and Security Eric Magidson 77 views - 1 year ago
21:51 Part 5 - 7.0 Fortify the Foundation - Network and Endpoint Security Eric Magidson 271 views - 1 year ago
11:22 Part 4 - 7.0 Fortify the Foundation - Network and Endpoint Security Eric Magidson 95 views - 1 year ago
16:35 Part 3 - 7.0 Fortify the Foundation - Network and Endpoint Security Eric Magidson 180 views - 1 year ago
19:56 Part 2 - 7.0 Fortify the Foundation - Network and Endpoint Security Eric Magidson 97 views - 1 year ago
10:52 Part 1 - 7.0 Fortify the Foundation - Network and Endpoint Security Eric Magidson 138 views - 1 year ago
18:21 Part 5 - 6.0 Digital Locksmithing - Cryptography and Encryption Eric Magidson 53 views - 1 year ago
11:51 Part 4 - 6.0 Digital Locksmithing - Cryptography and Encryption Eric Magidson 80 views - 1 year ago
19:36 Part 3 - 6.0 Digital Locksmithing - Cryptography and Encryption Eric Magidson 102 views - 1 year ago
14:15 Part 2 - 6.0 Digital Locksmithing - Cryptography and Encryption Eric Magidson 89 views - 1 year ago
14:17 Part 1 - 6.0 Digital Locksmithing - Cryptography and Encryption Eric Magidson 95 views - 1 year ago
15:34 Part 4 - 5.0 Inside the Empire - Authentication, Authorization, and Access Controls Eric Magidson 76 views - 1 year ago
11:02 Part 3 - 5.0 Inside the Empire - Authentication, Authorization, and Access Controls Eric Magidson 198 views - 1 year ago
15:28 Part 2 - 5.0 Inside the Empire - Authentication, Authorization, and Access Controls Eric Magidson 75 views - 1 year ago
9:29 Part 1 - 5.0 Inside the Empire - Authentication, Authorization, and Access Controls Eric Magidson 123 views - 1 year ago
16:49 Part 4 - 4.0 Fortress Fundamentals - Training, Passwords, Privacy and Physical Security Eric Magidson 62 views - 1 year ago
16:27 Part 3 - 4.0 Fortress Fundamentals - Training, Passwords, Privacy and Physical Security Eric Magidson 71 views - 1 year ago
18:55 Part 2 - 4.0 Fortress Fundamentals - Training, Passwords, Privacy and Physical Security Eric Magidson 69 views - 1 year ago
17:30 Part 1 - 4.0 Fortress Fundamentals - Training, Passwords, Privacy and Physical Security Eric Magidson 116 views - 1 year ago
16:54 Part 5 - 3.0 Through the Hacker's Lens - Cyber Threat, Vulnerabilities, and Attacks Eric Magidson 82 views - 1 year ago
16:52 Part 4 - 3.0 Through the Hacker's Lens - Cyber Threat, Vulnerabilities, and Attacks Eric Magidson 85 views - 1 year ago
13:58 Part 3 - 3.0 Through the Hacker's Lens - Cyber Threat, Vulnerabilities, and Attacks Eric Magidson 162 views - 1 year ago
15:10 Part 2 - 3.0 Through the Hacker's Lens - Cyber Threat, Vulnerabilities, and Attacks Eric Magidson 141 views - 1 year ago
15:28 Part 1 - 3.0 Through the Hacker's Lens - Cyber Threat, Vulnerabilities, and Attacks Eric Magidson 149 views - 1 year ago
15:09 Part 4 - 2.0 Binary Sleuths and Social Architects: Exploring OSINT and Social Engineering Eric Magidson 84 views - 1 year ago
11:48 Part 3 - 2.0 Binary Sleuths and Social Architects: Exploring OSINT and Social Engineering Eric Magidson 99 views - 1 year ago
10:27 Part 2 - 2.0 Binary Sleuths and Social Architects: Exploring OSINT and Social Engineering Eric Magidson 122 views - 1 year ago
11:59 Part 1 - 2.0 Binary Sleuths and Social Architects: Exploring OSINT and Social Engineering Eric Magidson 146 views - 1 year ago
16:43 Part 4 - 1.0 Digital Defenders - Introduction to Cybersecurity Eric Magidson 147 views - 1 year ago
15:34 Part 3 - 1.0 Digital Defenders - Introduction to Cybersecurity Eric Magidson 162 views - 1 year ago
15:25 Part 2 - 1.0 Digital Defenders - Introduction to Cybersecurity Eric Magidson 170 views - 1 year ago
11:59 Part 1 - 1.0 Digital Defenders - Introduction to Cybersecurity Eric Magidson 786 views - 1 year ago
11:37 Working Together to Improve Cybersecurity Education in Oregon Eric Magidson 66 views - 2 years ago