1. EachPod

Excelsior Life - Podcast

Excelsior Life

Excelsior Life: Distance EDU on Demand is an academic podcast series exploring a variety of education, business, and technology topics. Individual shows include ‘Excelsior LIVE,’ an interview series, and ‘Today in Cybersecurity,’ a daily podcast show airing each October during National Cybersecurity Month.

Education Learning College
Update frequency
every 6 days
Average duration
11 minutes
Episodes
97
Years Active
2013 - 2016
Share to:
Excelsior LIVE: Ethics of Using Games

Excelsior LIVE: Ethics of Using Games

Karen Schrier is an Assistant Professor of Media Arts at Marist College and Director of the Games and Emerging Media program. She joins the podcast to discuss some of the ethical issues around the us…
00:08:01  |   Mon 15 Aug 2016
Excelsior LIVE: Tina Goodyear on the need for alternative education quality assurance

Excelsior LIVE: Tina Goodyear on the need for alternative education quality assurance

Tina Goodyear, , joins the podcast to discuss recent efforts exploring the need for a quality assurance entity (QAE) for alternative education providers, such as coding bootcamps. The project, led by…
00:07:31  |   Mon 25 Jul 2016
Excelsior LIVE: Nick Fortugno on storytelling for learning

Excelsior LIVE: Nick Fortugno on storytelling for learning

Nick Fortugno is recognized around the world as a leading game designer, narrative and story expert as well as an entrepreneur of digital and real-world games. The chief creative officer of Playmatic…
00:13:32  |   Thu 30 Jun 2016
Excelsior LIVE: Clark Aldrich on teaching and learning via short simulations

Excelsior LIVE: Clark Aldrich on teaching and learning via short simulations

Clark Aldrich, one of the top educational simulation designers in the world and the founder and Managing Partner of Clark Aldrich Designs, joins the podcast to discuss the game changing nature of sho…
00:16:07  |   Thu 23 Jun 2016
Excelsior LIVE: Tina Goodyear on “The Case for CACE”

Excelsior LIVE: Tina Goodyear on “The Case for CACE”

Tina Goodyear, COO of the Presidents’ Forum, joins Excelsior Live to discuss the new Consortium for the Assessment of College Equivalency, which brings together six institutions with expertise in Pri…
00:11:05  |   Fri 10 Jun 2016
Excelsior LIVE: Avery Rueb on good game design

Excelsior LIVE: Avery Rueb on good game design

In part two of the interview with the co-founders of Affordance Studio, Avery Rueb, discusses his Revoluionary Learning 2016 presentation: Brainstorm Cards: Playing a Card Game to Learn about Good Ga…
00:07:06  |   Tue 31 May 2016
Excelsior LIVE: Pascal Nataf and Avery Rueb on teaching academics to think like game designers

Excelsior LIVE: Pascal Nataf and Avery Rueb on teaching academics to think like game designers

Pascal Nataf, co-founder of Affordance Studio, a serious game company based in Montreal and a Quebec Entrepreneur of the Year finalist joins Excelsior LIVE to discuss all things educational gaming. I…
00:22:37  |   Tue 31 May 2016
Excelsior LIVE: Dorcey Applyrs on public health and economic development

Excelsior LIVE: Dorcey Applyrs on public health and economic development

Dorcey Applyrs, DrPH, MPH, faculty program director for Excelsior College, discusses the reciprocal relationship between public health and economic development.
00:06:22  |   Mon 02 May 2016
Excelsior LIVE: Braddock on Excelsior College Student Success Center

Excelsior LIVE: Braddock on Excelsior College Student Success Center

In this audio-only version of this Excelsior LIVE broadcast, Glenn Braddock, PhD, executive director of the new , discusses the new initiative, the differences between academic coaches and academic a…
00:08:28  |   Fri 26 Feb 2016
Today in Cybersecurity: Virtualization Security

Today in Cybersecurity: Virtualization Security

Once an organization begins employing virtualization, they become less secure unless they utilize fault tolerance to keep things running in the event of the loss of a physical server running multiple…
00:06:57  |   Fri 30 Oct 2015
Today in Cybersecurity: Insider versus Outsider Threats

Today in Cybersecurity: Insider versus Outsider Threats

Threats come from inside through employees or vendors, and from the outside through hackers or infected websites. Both types of threats should be considered and policies and procedures developed for …
00:06:41  |   Thu 29 Oct 2015
Today in Cybersecurity: Physical Security

Today in Cybersecurity: Physical Security

Physical security has to do with all aspects of making sure that information systems are protected from anything in their physical environment. of the National Cybersecurity Institute explains.
00:07:16  |   Wed 28 Oct 2015
Today in Cybersecurity: Honeypots

Today in Cybersecurity: Honeypots

A honeypot is a computer on a network that is deliberately vulnerable, in order to lure attackers away from other more critical systems. This keeps the attacker busy giving attention to a systems tha…
00:06:14  |   Tue 27 Oct 2015
Today in Cybersecurity: Separation of Duties

Today in Cybersecurity: Separation of Duties

Separation of duties, together with the principle of least privilege, are two important areas to address in order to reduce or eliminate fraud and protect the organization. One individual should not …
00:06:25  |   Mon 26 Oct 2015
Today in Cybersecurity: The Principle of Least Privilege

Today in Cybersecurity: The Principle of Least Privilege

An individual should only be given the least amount of privilege necessary to do their job. Granting more access than is necessary can lead to unnecessary security violations. of the National Cybers…
00:06:34  |   Fri 23 Oct 2015
Today in Cybersecurity:  Access Control

Today in Cybersecurity: Access Control

Access control is applied to packets on a network, connections between computers, and users and their ability to access files and folders on company systems. Controlling access is essential to securi…
00:06:29  |   Thu 22 Oct 2015
Today in Cybersecurity: The Cloud

Today in Cybersecurity: The Cloud

What is the cloud? Where is it located? How is our data protected while in the cloud? What happens when there is a problem within the cloud provider? Why is it important to read the cloud license agr…
00:06:27  |   Wed 21 Oct 2015
Today in Cybersecurity: Penetration Testing

Today in Cybersecurity: Penetration Testing

Penetration testing is a process in which we try to infiltrate computers or devices on a network from the outside or the inside, typically using a black box test or a white box test. of the National…
00:07:37  |   Tue 20 Oct 2015
Today in Cybersecurity: Baselining

Today in Cybersecurity: Baselining

Baselining is a technique we use to enhance our security and alert us that something is not right and may need further investigation. Any behavior that does not fit the baseline should be considered …
00:06:48  |   Mon 19 Oct 2015
Today in Cybersecurity: Disaster Recovery and Business Continuity

Today in Cybersecurity: Disaster Recovery and Business Continuity

Disaster recovery is part of business continuity, and is concerned with getting essential services for the organization up and running as fast as possible after a disaster. Business continuity is con…
00:06:37  |   Fri 16 Oct 2015
Disclaimer: The podcast and artwork embedded on this page are the property of . This content is not affiliated with or endorsed by eachpod.com.