Browse most popular courses
-
Reducing your digital footprint46s
Reducing your digital footprint
From: Digital Sustainability: How to Reduce Your Digital Footprint
Video
-
Leveraging generative AI as a product manager50s
Leveraging generative AI as a product manager
From: Generative AI for Product Managers
Video
-
Start listening to your infrastructure1m
Start listening to your infrastructure
From: Learning the Elastic Stack (2020)
Video
-
Take better notes with Microsoft Office apps58s
Take better notes with Microsoft Office apps
From: Smarter Note-Taking with Microsoft 365
Video
-
Understand the hacking of IoT devices1m
Understand the hacking of IoT devices
From: Ethical Hacking: Hacking IoT Devices (2019)
Video
-
The workplace you inherited1m
The workplace you inherited
From: Leveraging Authenticity in the Workplace
Video
-
Exploring CC6.1 - Implementing logical access security for protected information assets to meet objectives3m
Exploring CC6.1 - Implementing logical access security for protected information assets to meet objectives
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC6.2 - Granting user access: Registering, authorizing, and administering system credentials2m
Exploring CC6.2 - Granting user access: Registering, authorizing, and administering system credentials
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring A1.1 - Managing processing capacity: Monitoring, evaluating, and enabling additional capacity for objective fulfillment2m
Exploring A1.1 - Managing processing capacity: Monitoring, evaluating, and enabling additional capacity for objective fulfillment
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC1.1 - COSO Principle 1: Upholding integrity and ethical values2m
Exploring CC1.1 - COSO Principle 1: Upholding integrity and ethical values
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC5.2 - COSO Principle 11: Selecting and developing technology control activities for objective support2m
Exploring CC5.2 - COSO Principle 11: Selecting and developing technology control activities for objective support
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC4.1 - COSO Principle 16: Evaluating component presence and functionality for effective internal control2m
Exploring CC4.1 - COSO Principle 16: Evaluating component presence and functionality for effective internal control
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Reviewing and aligning section 3 and section 4 in SOC 2 audits: Ensuring consistency and cohesion for reliable assurance2m
Reviewing and aligning section 3 and section 4 in SOC 2 audits: Ensuring consistency and cohesion for reliable assurance
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Mastering comprehensive testing note documentation in SOC 2 audits: Enhancing clarity for effective review3m
Mastering comprehensive testing note documentation in SOC 2 audits: Enhancing clarity for effective review
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring technical testing considerations in SOC 2 audits: Navigating cloud-based challenges and evaluating technical evidence2m
Exploring technical testing considerations in SOC 2 audits: Navigating cloud-based challenges and evaluating technical evidence
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC9.2 - Managing vendor and business partner risks: Assessing and mitigating risks effectively2m
Exploring CC9.2 - Managing vendor and business partner risks: Assessing and mitigating risks effectively
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC3.2 - COSO Principle 7: Identifying and analyzing risks for effective objective achievement and risk management3m
Exploring CC3.2 - COSO Principle 7: Identifying and analyzing risks for effective objective achievement and risk management
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Applying sample testing and attribute testing in SOC 2 audits3m
Applying sample testing and attribute testing in SOC 2 audits
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC8.1 - Change management for objective alignment: Authorizing, designing, and implementing changes2m
Exploring CC8.1 - Change management for objective alignment: Authorizing, designing, and implementing changes
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Scenario: What would you do?2m
Scenario: What would you do?
From: Microsoft Defender for Office 365
Video
-
Analyze the health of the system4m
Analyze the health of the system
From: Microsoft Defender for Office 365
Video
-
Learning Kusto Query Language (KQL)6m
Learning Kusto Query Language (KQL)
From: Microsoft Defender for Office 365
Video
-
Create Cloud App policies7m
Create Cloud App policies
From: Microsoft Defender for Office 365
Video
-
Google Colaboratory basics3m
Google Colaboratory basics
From: PyTorch Essential Training: Deep Learning
Video
-
Validation and testing4m
Validation and testing
From: PyTorch Essential Training: Deep Learning
Video
-
Mathematical functions3m
Mathematical functions
From: PyTorch Essential Training: Deep Learning
Video
-
Solution: Split tensors to form new tensors1m
Solution: Split tensors to form new tensors
From: PyTorch Essential Training: Deep Learning
Video
-
Solution: Create tensors1m
Solution: Create tensors
From: PyTorch Essential Training: Deep Learning
Video
-
Creating tensors like other tensors2m
Creating tensors like other tensors
From: PyTorch Essential Training: Deep Learning
Video
-
Introduction to the DL training process2m
Introduction to the DL training process
From: PyTorch Essential Training: Deep Learning
Video
-
PyTorch Essential Training: Deep Learning1h 21m
PyTorch Essential Training: Deep Learning
By: Terezija Semenski
Course
-
Leading extroverts2m
Leading extroverts
From: Leading and Motivating People with Different Personalities
Video
-
Leading ambiverts1m
Leading ambiverts
From: Leading and Motivating People with Different Personalities
Video
-
Motivating competitive people2m
Motivating competitive people
From: Leading and Motivating People with Different Personalities
Video
-
Logistic regression algorithm1m
Logistic regression algorithm
From: Applied Machine Learning: Algorithms
Video
-
Challenge: Design a decision tree model25s
Challenge: Design a decision tree model
From: Applied Machine Learning: Algorithms
Video
-
Applied machine learning: Algorithms49s
Applied machine learning: Algorithms
From: Applied Machine Learning: Algorithms
Video
-
Challenge: Construct a logistic regression model12s
Challenge: Construct a logistic regression model
From: Applied Machine Learning: Algorithms
Video
-
Solution: Construct a logistic regression model4m
Solution: Construct a logistic regression model
From: Applied Machine Learning: Algorithms
Video
-
Linear regression algorithm4m
Linear regression algorithm
From: Applied Machine Learning: Algorithms
Video
-
OpenAI: Getting started3m
OpenAI: Getting started
From: Integrating Generative AI into JavaScript Web Projects
Video