DiscoverBusiness Information Management
Business Information Management
Claim Ownership

Business Information Management

Author: Plymouth University

Subscribed: 11Played: 31
Share

Description

Our portfolio includes Business Studies, Business Administration, Tourism and Hospitality Management and Public Services Management. There are strong vocational elements within these courses and many students gain experience working in placements relevant to their future career structure.
11 Episodes
Reverse
Hugh Conway, Lecturer in Marketing, School of Management and Dr John White, Associate Professor, School of Management discuss the MSc Marketing Management and Strategy course at Plymouth University [Released under Creative Commons Attribution-NonCommercial-ShareAlike 2.0 UK: England & Wales licence.]
Placements2011

Placements2011

2011-07-1917:50

Microsoft Placement Interviews by Kellie Smith for Plymouth Business School [Released under Creative Commons Attribution-NonCommercial-ShareAlike 2.0 UK: England & Wales licence.]
This is the eighth of a series of videos that consider a range of security vulnerabilities. In this video we look at a weakness in a multi-factor authentication mechanism. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
This is the ninth of a series of videos that consider a range of security vulnerabilities. In this video we look at a weakness in a multi-factor authentication mechanism. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
This is the seventh of a series of videos that consider a range of security vulnerabilities. In this video we look at how credentials are transferred using basic HTTP authentication. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
This is the sixth of a series of videos that consider a range of security vulnerabilities. In this video we look at how to gain administrative access to a website. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
This is the fifth of a series of videos that consider a range of security vulnerabilities. In this video we manipulate server side file handling. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
04 - Password Recovery

04 - Password Recovery

2011-02-1803:18

This is the fourth of a series of videos that consider a range of security vulnerabilities. In this video, the Password Recovery mechanism is introduced. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
This is the third of a series of videos that consider a range of security vulnerabilities. In this video, the concept of SQL Injection is introduced. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
02 - HTTP Splitting

02 - HTTP Splitting

2011-02-1815:52

This is the second of a series of videos that consider a range of security vulnerabilities. In this video, the concept of HTTP Splitting is introduced. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
This is the first of a series of videos that consider a range of security vulnerabilities. In this video, the use of WebGoat and WebScarab is introduced. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]