Browse most popular courses
-
Gaining support at work5m
Gaining support at work
From: Leveraging Authenticity in the Workplace
Video
-
Exploring CC1.5 - COSO Principle 5: Ensuring accountability for internal control responsibilities in objective pursuit2m
Exploring CC1.5 - COSO Principle 5: Ensuring accountability for internal control responsibilities in objective pursuit
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Comprehensive guide to completeness and accuracy in SOC 2 auditing: Ensuring reliable and comprehensive evaluations3m
Comprehensive guide to completeness and accuracy in SOC 2 auditing: Ensuring reliable and comprehensive evaluations
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring A1.2 - Protecting environment, software, and data: Authorization, design, implementation, and monitoring for objective achievement2m
Exploring A1.2 - Protecting environment, software, and data: Authorization, design, implementation, and monitoring for objective achievement
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Next steps39s
Next steps
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC1.4 - COSO Principle 4: Fostering a commitment to competent talent acquisition, development, and retention in alignment with objectives2m
Exploring CC1.4 - COSO Principle 4: Fostering a commitment to competent talent acquisition, development, and retention in alignment with objectives
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC7.5 - Recovering from security incidents: Identifying, developing, and implementing effective recovery activities2m
Exploring CC7.5 - Recovering from security incidents: Identifying, developing, and implementing effective recovery activities
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC6.8 - Preventing and detecting unauthorized or malicious software: Controls for objective alignment2m
Exploring CC6.8 - Preventing and detecting unauthorized or malicious software: Controls for objective alignment
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC4.2 - COSO Principle 17: Timely evaluation and communication of internal control deficiencies for effective corrective action2m
Exploring CC4.2 - COSO Principle 17: Timely evaluation and communication of internal control deficiencies for effective corrective action
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC2.2 - COSO Principle 14: Enhancing internal control through effective internal communication of objectives and responsibilities2m
Exploring CC2.2 - COSO Principle 14: Enhancing internal control through effective internal communication of objectives and responsibilities
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Getting started with SQL for application developers44s
Getting started with SQL for application developers
From: Advanced SQL for Application Development
Video
-
Configure permissions and roles4m
Configure permissions and roles
From: Microsoft Defender for Office 365
Video
-
Exchange Online Policies (EOP) anti-spam policies9m
Exchange Online Policies (EOP) anti-spam policies
From: Microsoft Defender for Office 365
Video
-
Scenario: What would you do?2m
Scenario: What would you do?
From: Microsoft Defender for Office 365
Video
-
Scenario: What would you do?3m
Scenario: What would you do?
From: Microsoft Defender for Office 365
Video
-
Accessing the Defender Portal5m
Accessing the Defender Portal
From: Microsoft Defender for Office 365
Video
-
Different ways to create tensors3m
Different ways to create tensors
From: PyTorch Essential Training: Deep Learning
Video
-
Moving tensors between CPUs and GPUs2m
Moving tensors between CPUs and GPUs
From: PyTorch Essential Training: Deep Learning
Video
-
Creating a tensor GPU example1m
Creating a tensor GPU example
From: PyTorch Essential Training: Deep Learning
Video
-
Automatic differentiation (Autograd)6m
Automatic differentiation (Autograd)
From: PyTorch Essential Training: Deep Learning
Video
-
Creating tensors from random samples2m
Creating tensors from random samples
From: PyTorch Essential Training: Deep Learning
Video
-
Leading and motivating people with different personalities50s
Leading and motivating people with different personalities
From: Leading and Motivating People with Different Personalities
Video
-
Create new and better results with your team1m
Create new and better results with your team
From: Leading and Motivating People with Different Personalities
Video
-
What motivates people?1m
What motivates people?
From: Leading and Motivating People with Different Personalities
Video
-
What is personality?2m
What is personality?
From: Leading and Motivating People with Different Personalities
Video
-
Leading people with varying levels of openness to experience2m
Leading people with varying levels of openness to experience
From: Leading and Motivating People with Different Personalities
Video
-
Leading people who are high and low in emotional stability2m
Leading people who are high and low in emotional stability
From: Leading and Motivating People with Different Personalities
Video
-
Solution: Develop a linear regression model2m
Solution: Develop a linear regression model
From: Applied Machine Learning: Algorithms
Video
-
Check Run lifecycle and status4m
Check Run lifecycle and status
From: Integrating Generative AI into JavaScript Web Projects
Video
-
Create an assistant5m
Create an assistant
From: Integrating Generative AI into JavaScript Web Projects
Video
-
Define tools and parameters4m
Define tools and parameters
From: Integrating Generative AI into JavaScript Web Projects
Video
-
Psychological safety: Clear blocks to problem-solving and innovation1m
Psychological safety: Clear blocks to problem-solving and innovation
From: Psychological Safety: Clear Blocks to Innovation, Collaboration, and Risk-Taking
Video
-
Securing systems and applications1m
Securing systems and applications
From: SSCP Cert Prep: 7 Systems and Application Security
Video
-
Using GitHub Codespaces2m
Using GitHub Codespaces
From: Java Cheat Codes: Most Popular Functions
Video
-
Showing up authentically4m
Showing up authentically
From: Leveraging Authenticity in the Workplace
Video