Browse most popular courses
-
Introducing Brian Evergreen46s
Introducing Brian Evergreen
From: Autonomous Transformation: Create a More Human Future with AI
Video
-
Introduction to Gemini extensions4m
Introduction to Gemini extensions
From: Prompt Engineering with Gemini
Video
-
Browsing the web with Gemini2m
Browsing the web with Gemini
From: Prompt Engineering with Gemini
Video
-
Using completion sequences and few-shot learning3m
Using completion sequences and few-shot learning
From: Prompt Engineering with Gemini
Video
-
Analyzing a multi-modal document with Gemini4m
Analyzing a multi-modal document with Gemini
From: Prompt Engineering with Gemini
Video
-
AI news and breakthroughs, April 20242m
AI news and breakthroughs, April 2024
From: Digital Marketing Trends
Video
-
Using OAuth 2.0 and OpenID Connect41s
Using OAuth 2.0 and OpenID Connect
From: Web Security: OAuth and OpenID Connect
Video
-
You've been hacked1m
You've been hacked
From: Incident Response: Evidence Collection in Windows
Video
-
Everyone needs a vulnerability management program1m
Everyone needs a vulnerability management program
From: Implementing a Vulnerability Management Lifecycle
Video
-
Overview1m
Overview
From: Google Cloud Professional Machine Learning Engineer Cert Prep: 3 Designing Data Preparation and Processing Systems
Video
-
Vision planning in business analysis3m
Vision planning in business analysis
From: Business Analysis Skills to Develop for Future Success
Video
-
Building your business analysis skill sets1m
Building your business analysis skill sets
From: Business Analysis Skills to Develop for Future Success
Video
-
Upgrade your online meetings with Teams Premium1m
Upgrade your online meetings with Teams Premium
From: Learning Microsoft Teams Premium
Video
-
Improving change culture in your organization3m
Improving change culture in your organization
From: Improving Technical Project Success with Change Management
Video
-
Staffing your change management team1m
Staffing your change management team
From: Improving Technical Project Success with Change Management
Video
-
Find your why in a difficult conversation2m
Find your why in a difficult conversation
From: Having Difficult Conversations
Video
-
Personal vs. professional conflicts3m
Personal vs. professional conflicts
From: Having Difficult Conversations
Video
-
Learning break: Story of personal conflict2m
Learning break: Story of personal conflict
From: Having Difficult Conversations
Video
-
Learn best practices to prepare for a difficult conversation3m
Learn best practices to prepare for a difficult conversation
From: Having Difficult Conversations
Video
-
Scrum artifacts: The sprint backlog and increment1m
Scrum artifacts: The sprint backlog and increment
From: Agile Software Development
Video
-
Little i innovation every day4m
Little i innovation every day
From: Learning Innovation to Drive Change in Your Role
Video
-
Who are innovators and what do they do?3m
Who are innovators and what do they do?
From: Learning Innovation to Drive Change in Your Role
Video
-
A call to innovate3m
A call to innovate
From: Learning Innovation to Drive Change in Your Role
Video
-
Demystifying innovation3m
Demystifying innovation
From: Learning Innovation to Drive Change in Your Role
Video
-
The fundamentals of programming55s
The fundamentals of programming
From: Programming Foundations: Fundamentals
Video
-
Program management course overview1m
Program management course overview
From: Learning Program Management
Video
-
Reducing your digital footprint46s
Reducing your digital footprint
From: Digital Sustainability: How to Reduce Your Digital Footprint
Video
-
Leveraging generative AI as a product manager50s
Leveraging generative AI as a product manager
From: Generative AI for Product Managers
Video
-
Start listening to your infrastructure1m
Start listening to your infrastructure
From: Learning the Elastic Stack (2020)
Video
-
Take better notes with Microsoft Office apps58s
Take better notes with Microsoft Office apps
From: Smarter Note-Taking with Microsoft 365
Video
-
Understand the hacking of IoT devices1m
Understand the hacking of IoT devices
From: Ethical Hacking: Hacking IoT Devices (2019)
Video
-
Understand the Copilot subscriptions1m
Understand the Copilot subscriptions
From: Copilot in OneNote: Smarter Note-Taking with AI
Video
-
Generate a project plan1m
Generate a project plan
From: Copilot in OneNote: Smarter Note-Taking with AI
Video
-
The workplace you inherited1m
The workplace you inherited
From: Leveraging Authenticity in the Workplace
Video
-
Exploring A1.1 - Managing processing capacity: Monitoring, evaluating, and enabling additional capacity for objective fulfillment2m
Exploring A1.1 - Managing processing capacity: Monitoring, evaluating, and enabling additional capacity for objective fulfillment
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC6.1 - Implementing logical access security for protected information assets to meet objectives3m
Exploring CC6.1 - Implementing logical access security for protected information assets to meet objectives
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring technical testing considerations in SOC 2 audits: Navigating cloud-based challenges and evaluating technical evidence2m
Exploring technical testing considerations in SOC 2 audits: Navigating cloud-based challenges and evaluating technical evidence
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Mastering comprehensive testing note documentation in SOC 2 audits: Enhancing clarity for effective review3m
Mastering comprehensive testing note documentation in SOC 2 audits: Enhancing clarity for effective review
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Reviewing and aligning section 3 and section 4 in SOC 2 audits: Ensuring consistency and cohesion for reliable assurance2m
Reviewing and aligning section 3 and section 4 in SOC 2 audits: Ensuring consistency and cohesion for reliable assurance
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video