Browse most popular courses
-
Reducing your digital footprint46s
Reducing your digital footprint
From: Digital Sustainability: How to Reduce Your Digital Footprint
Video
-
Leveraging generative AI as a product manager50s
Leveraging generative AI as a product manager
From: Generative AI for Product Managers
Video
-
Start listening to your infrastructure1m
Start listening to your infrastructure
From: Learning the Elastic Stack (2020)
Video
-
Take better notes with Microsoft Office apps58s
Take better notes with Microsoft Office apps
From: Smarter Note-Taking with Microsoft 365
Video
-
Understand the hacking of IoT devices1m
Understand the hacking of IoT devices
From: Ethical Hacking: Hacking IoT Devices (2019)
Video
-
Gaining support at work5m
Gaining support at work
From: Leveraging Authenticity in the Workplace
Video
-
Comprehensive guide to completeness and accuracy in SOC 2 auditing: Ensuring reliable and comprehensive evaluations3m
Comprehensive guide to completeness and accuracy in SOC 2 auditing: Ensuring reliable and comprehensive evaluations
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC1.5 - COSO Principle 5: Ensuring accountability for internal control responsibilities in objective pursuit2m
Exploring CC1.5 - COSO Principle 5: Ensuring accountability for internal control responsibilities in objective pursuit
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Next steps39s
Next steps
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring A1.2 - Protecting environment, software, and data: Authorization, design, implementation, and monitoring for objective achievement2m
Exploring A1.2 - Protecting environment, software, and data: Authorization, design, implementation, and monitoring for objective achievement
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC6.8 - Preventing and detecting unauthorized or malicious software: Controls for objective alignment2m
Exploring CC6.8 - Preventing and detecting unauthorized or malicious software: Controls for objective alignment
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC1.4 - COSO Principle 4: Fostering a commitment to competent talent acquisition, development, and retention in alignment with objectives2m
Exploring CC1.4 - COSO Principle 4: Fostering a commitment to competent talent acquisition, development, and retention in alignment with objectives
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC7.5 - Recovering from security incidents: Identifying, developing, and implementing effective recovery activities2m
Exploring CC7.5 - Recovering from security incidents: Identifying, developing, and implementing effective recovery activities
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC4.2 - COSO Principle 17: Timely evaluation and communication of internal control deficiencies for effective corrective action2m
Exploring CC4.2 - COSO Principle 17: Timely evaluation and communication of internal control deficiencies for effective corrective action
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC2.2 - COSO Principle 14: Enhancing internal control through effective internal communication of objectives and responsibilities2m
Exploring CC2.2 - COSO Principle 14: Enhancing internal control through effective internal communication of objectives and responsibilities
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Getting started with SQL for application developers44s
Getting started with SQL for application developers
From: Advanced SQL for Application Development
Video
-
The workplace you inherited1m
The workplace you inherited
From: Leveraging Authenticity in the Workplace
Video
-
Exploring A1.1 - Managing processing capacity: Monitoring, evaluating, and enabling additional capacity for objective fulfillment2m
Exploring A1.1 - Managing processing capacity: Monitoring, evaluating, and enabling additional capacity for objective fulfillment
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC6.1 - Implementing logical access security for protected information assets to meet objectives3m
Exploring CC6.1 - Implementing logical access security for protected information assets to meet objectives
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring technical testing considerations in SOC 2 audits: Navigating cloud-based challenges and evaluating technical evidence2m
Exploring technical testing considerations in SOC 2 audits: Navigating cloud-based challenges and evaluating technical evidence
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Mastering comprehensive testing note documentation in SOC 2 audits: Enhancing clarity for effective review3m
Mastering comprehensive testing note documentation in SOC 2 audits: Enhancing clarity for effective review
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Reviewing and aligning section 3 and section 4 in SOC 2 audits: Ensuring consistency and cohesion for reliable assurance2m
Reviewing and aligning section 3 and section 4 in SOC 2 audits: Ensuring consistency and cohesion for reliable assurance
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC1.1 - COSO Principle 1: Upholding integrity and ethical values2m
Exploring CC1.1 - COSO Principle 1: Upholding integrity and ethical values
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC6.2 - Granting user access: Registering, authorizing, and administering system credentials2m
Exploring CC6.2 - Granting user access: Registering, authorizing, and administering system credentials
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC4.1 - COSO Principle 16: Evaluating component presence and functionality for effective internal control2m
Exploring CC4.1 - COSO Principle 16: Evaluating component presence and functionality for effective internal control
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC5.2 - COSO Principle 11: Selecting and developing technology control activities for objective support2m
Exploring CC5.2 - COSO Principle 11: Selecting and developing technology control activities for objective support
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC9.2 - Managing vendor and business partner risks: Assessing and mitigating risks effectively2m
Exploring CC9.2 - Managing vendor and business partner risks: Assessing and mitigating risks effectively
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC3.2 - COSO Principle 7: Identifying and analyzing risks for effective objective achievement and risk management3m
Exploring CC3.2 - COSO Principle 7: Identifying and analyzing risks for effective objective achievement and risk management
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Applying sample testing and attribute testing in SOC 2 audits3m
Applying sample testing and attribute testing in SOC 2 audits
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC8.1 - Change management for objective alignment: Authorizing, designing, and implementing changes2m
Exploring CC8.1 - Change management for objective alignment: Authorizing, designing, and implementing changes
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Learning Kusto Query Language (KQL)6m
Learning Kusto Query Language (KQL)
From: Microsoft Defender for Office 365
Video
-
Create Cloud App policies7m
Create Cloud App policies
From: Microsoft Defender for Office 365
Video
-
Analyze the health of the system4m
Analyze the health of the system
From: Microsoft Defender for Office 365
Video
-
Scenario: What would you do?2m
Scenario: What would you do?
From: Microsoft Defender for Office 365
Video
-
Validation and testing4m
Validation and testing
From: PyTorch Essential Training: Deep Learning
Video
-
Mathematical functions3m
Mathematical functions
From: PyTorch Essential Training: Deep Learning
Video
-
Google Colaboratory basics3m
Google Colaboratory basics
From: PyTorch Essential Training: Deep Learning
Video
-
Solution: Split tensors to form new tensors1m
Solution: Split tensors to form new tensors
From: PyTorch Essential Training: Deep Learning
Video
-
Solution: Create tensors1m
Solution: Create tensors
From: PyTorch Essential Training: Deep Learning
Video