Browse most popular courses
-
Make decisions based on reason, not data2m
Make decisions based on reason, not data
From: Autonomous Transformation: Create a More Human Future with AI
Video
-
Continuing your prompt engineering journey25s
Continuing your prompt engineering journey
From: Prompt Engineering with Gemini
Video
-
Using chain-of-thought reasoning3m
Using chain-of-thought reasoning
From: Prompt Engineering with Gemini
Video
-
Planning a vacation with Gemini3m
Planning a vacation with Gemini
From: Prompt Engineering with Gemini
Video
-
Navigating cybersecurity: Essential policies and resources52s
Navigating cybersecurity: Essential policies and resources
From: Cybersecurity: Key Policies and Resources
Video
-
Welcome to this course1m
Welcome to this course
From: Vulnerability Management: Assessing the Risks with CVSS v3.1
Video
-
Essential skills for security operations management46s
Essential skills for security operations management
From: Managing Information Security Operations
Video
-
Overview1m
Overview
From: Google Cloud Professional Machine Learning Engineer Cert Prep: 4 Developing ML Models
Video
-
Overview2m
Overview
From: Google Cloud Professional Machine Learning Engineer Cert Prep: 2 Architecting ML Solution
Video
-
Introduction3m
Introduction
From: Managing and Administering Microsoft Teams by Microsoft Press
Video
-
Managing change with minimal pain56s
Managing change with minimal pain
From: IT Service Management Foundations: Change Management
Video
-
Having personal agility in business analysis2m
Having personal agility in business analysis
From: Business Analysis Skills to Develop for Future Success
Video
-
Having business agility in business analysis4m
Having business agility in business analysis
From: Business Analysis Skills to Develop for Future Success
Video
-
Why new tools and processes don't get adopted2m
Why new tools and processes don't get adopted
From: Improving Technical Project Success with Change Management
Video
-
Understand what makes a conversation difficult3m
Understand what makes a conversation difficult
From: Having Difficult Conversations
Video
-
Deal with resistance during a difficult conversation3m
Deal with resistance during a difficult conversation
From: Having Difficult Conversations
Video
-
Avoid exaggeration and escalation in difficult conversations3m
Avoid exaggeration and escalation in difficult conversations
From: Having Difficult Conversations
Video
-
Learn the magic phrase to test for resistance3m
Learn the magic phrase to test for resistance
From: Having Difficult Conversations
Video
-
Scrum roles: The scrum master1m
Scrum roles: The scrum master
From: Agile Software Development
Video
-
Choose the problem you want to solve through innovation2m
Choose the problem you want to solve through innovation
From: Learning Innovation to Drive Change in Your Role
Video
-
The importance of trust2m
The importance of trust
From: Why Trust Matters with Rachel Botsman (with Audio Descriptions)
Video
-
Going beyond the basics in Node1m
Going beyond the basics in Node
From: Node.js: Web Servers, Tests, and Deployment
Video
-
Artificial intelligence beyond engineering (Beta)1h 22m
Artificial intelligence beyond engineering (Beta)
By: Paula García Esteban
Course
-
Use Copilot in OneNote31s
Use Copilot in OneNote
From: Copilot in OneNote: Smarter Note-Taking with AI
Video
-
Create a to-do list1m
Create a to-do list
From: Copilot in OneNote: Smarter Note-Taking with AI
Video
-
Exploring CC9.1 - Mitigating business disruption risks: Identifying, selecting, and developing risk mitigation activities2m
Exploring CC9.1 - Mitigating business disruption risks: Identifying, selecting, and developing risk mitigation activities
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC5.1 - COSO Principle 10: Selecting and developing control activities to mitigate risks to achieve acceptable levels2m
Exploring CC5.1 - COSO Principle 10: Selecting and developing control activities to mitigate risks to achieve acceptable levels
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC7.1 - Detecting and monitoring procedures: Identifying configuration changes and vulnerabilities for objective alignment2m
Exploring CC7.1 - Detecting and monitoring procedures: Identifying configuration changes and vulnerabilities for objective alignment
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC3.4 - COSO Principle 9: Evaluating changes that significantly impact the internal control system2m
Exploring CC3.4 - COSO Principle 9: Evaluating changes that significantly impact the internal control system
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC6.4 - Securing physical access: Restricting facilities and protected information assets to authorized personnel2m
Exploring CC6.4 - Securing physical access: Restricting facilities and protected information assets to authorized personnel
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring C1.1 - Safeguarding confidential information: Identification and maintenance for objective alignment2m
Exploring C1.1 - Safeguarding confidential information: Identification and maintenance for objective alignment
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC2.3 - COSO Principle 15: Facilitating external communication for effective functioning of internal control3m
Exploring CC2.3 - COSO Principle 15: Facilitating external communication for effective functioning of internal control
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC7.3 - Evaluating security events: Preventing and addressing failures to achieve objectives2m
Exploring CC7.3 - Evaluating security events: Preventing and addressing failures to achieve objectives
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video