This is an alert ×
Michigan Cyber Range
Merit Secure Sandbox Webinar
43:06

Merit Secure Sandbox Webinar

Learn about Merit Secure Sandbox during this informative webinar, presented by Dr. William "Joe" Adams, Merit's Vice President of Research and Cyber Security, this webinar covers: What is Merit Secure Sandbox? How does M..

Michigan Cyber Range Interviews
04:18

Michigan Cyber Range Interviews

MICHIGAN CYBER RANGE http://www.merit.edu/cyberrange/ Dr. Joe Adams, Merit Network Executive Director of Research and Michigan Cyber Security, and Merit Network President and CEO, Dr. Don Welch, discuss the Michigan Cybe..

Michigan Cyber Range Introduction
03:06

Michigan Cyber Range Introduction

MICHIGAN CYBER RANGE http://www.merit.edu/cyberrange/ The Premier Cybersecurity Learning Environment- Prevention Through Practice and Education. Merit Network is a partner in building a world-class cyber range to help p..

Spies Among Us
14:35

Spies Among Us

Watch the latest in the Michigan Cyber Range film series, Spies Among Us. This film tackles the timely topic of ransomeware, a type of malicious software that blocks access to the victim's data until a ransom is paid. Vi..

The Day After: The Adventures of the EveryDay Cyber Hero
08:29

The Day After: The Adventures of the EveryDay Cyber Hero

The story of two IT employees in the aftermath of a major cybersecurity incident. One prepared properly beforehand, becoming a hero at his company. The other had no plan in place, operating in chaos and becoming the butt..

The Importance of Cybersecurity in Your Organization
04:25

The Importance of Cybersecurity in Your Organization

Today's organizations are doing more and more business online. Securing your website, email safety and secure web browsing is crucial. When employees aren't trained properly, it leaves the door open for hackers.

The Way of the Consultant
12:39

The Way of the Consultant

When a vicious cyber attack brings a small business to its knees, the victims recruit the help of a grey hat cyber Ninja. The intriguing plot dives into incident response.

Search this collection

Sub-collections