Discover
Business Information Management

Business Information Management
Author: Plymouth University
Subscribed: 11Played: 31Subscribe
Share
Description
Our portfolio includes Business Studies, Business Administration, Tourism and Hospitality Management and Public Services Management. There are strong vocational elements within these courses and many students gain experience working in placements relevant to their future career structure.
11 Episodes
Reverse
Hugh Conway, Lecturer in Marketing, School of Management and Dr John White, Associate Professor, School of Management discuss the MSc Marketing Management and Strategy course at Plymouth University
[Released under Creative Commons Attribution-NonCommercial-ShareAlike 2.0 UK: England & Wales licence.]
Microsoft Placement Interviews by Kellie Smith for Plymouth Business School [Released under Creative Commons Attribution-NonCommercial-ShareAlike 2.0 UK: England & Wales licence.]
This is the eighth of a series of videos that consider a range of security vulnerabilities. In this video we look at a weakness in a multi-factor authentication mechanism. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
This is the ninth of a series of videos that consider a range of security vulnerabilities. In this video we look at a weakness in a multi-factor authentication mechanism. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
This is the seventh of a series of videos that consider a range of security vulnerabilities. In this video we look at how credentials are transferred using basic HTTP authentication. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
This is the sixth of a series of videos that consider a range of security vulnerabilities. In this video we look at how to gain administrative access to a website. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
This is the fifth of a series of videos that consider a range of security vulnerabilities. In this video we manipulate server side file handling. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
This is the fourth of a series of videos that consider a range of security vulnerabilities. In this video, the Password Recovery mechanism is introduced. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
This is the third of a series of videos that consider a range of security vulnerabilities. In this video, the concept of SQL Injection is introduced. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
This is the second of a series of videos that consider a range of security vulnerabilities. In this video, the concept of HTTP Splitting is introduced. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
This is the first of a series of videos that consider a range of security vulnerabilities. In this video, the use of WebGoat and WebScarab is introduced. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
Comments
Top Podcasts
The Best New Comedy Podcast Right Now – June 2024The Best News Podcast Right Now – June 2024The Best New Business Podcast Right Now – June 2024The Best New Sports Podcast Right Now – June 2024The Best New True Crime Podcast Right Now – June 2024The Best New Joe Rogan Experience Podcast Right Now – June 20The Best New Dan Bongino Show Podcast Right Now – June 20The Best New Mark Levin Podcast – June 2024