Browse most popular courses
-
Importance of algorithmic thinking51s
Importance of algorithmic thinking
From: Foundations of Algorithmic Thinking with Python
Video
-
Exploration of algorithmic thinking45s
Exploration of algorithmic thinking
From: Advanced Algorithmic Thinking with Python
Video
-
The importance of trust2m
The importance of trust
From: Why Trust Matters with Rachel Botsman (with Audio Descriptions)
Video
-
Going beyond the basics in Node1m
Going beyond the basics in Node
From: Node.js: Web Servers, Tests, and Deployment
Video
-
Program management course overview1m
Program management course overview
From: Learning Program Management
Video
-
Gaining support at work5m
Gaining support at work
From: Leveraging Authenticity in the Workplace
Video
-
Exploring CC1.5 - COSO Principle 5: Ensuring accountability for internal control responsibilities in objective pursuit2m
Exploring CC1.5 - COSO Principle 5: Ensuring accountability for internal control responsibilities in objective pursuit
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Comprehensive guide to completeness and accuracy in SOC 2 auditing: Ensuring reliable and comprehensive evaluations3m
Comprehensive guide to completeness and accuracy in SOC 2 auditing: Ensuring reliable and comprehensive evaluations
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring A1.2 - Protecting environment, software, and data: Authorization, design, implementation, and monitoring for objective achievement2m
Exploring A1.2 - Protecting environment, software, and data: Authorization, design, implementation, and monitoring for objective achievement
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Next steps39s
Next steps
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC1.4 - COSO Principle 4: Fostering a commitment to competent talent acquisition, development, and retention in alignment with objectives2m
Exploring CC1.4 - COSO Principle 4: Fostering a commitment to competent talent acquisition, development, and retention in alignment with objectives
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC7.5 - Recovering from security incidents: Identifying, developing, and implementing effective recovery activities2m
Exploring CC7.5 - Recovering from security incidents: Identifying, developing, and implementing effective recovery activities
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC6.8 - Preventing and detecting unauthorized or malicious software: Controls for objective alignment2m
Exploring CC6.8 - Preventing and detecting unauthorized or malicious software: Controls for objective alignment
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC4.2 - COSO Principle 17: Timely evaluation and communication of internal control deficiencies for effective corrective action2m
Exploring CC4.2 - COSO Principle 17: Timely evaluation and communication of internal control deficiencies for effective corrective action
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC2.2 - COSO Principle 14: Enhancing internal control through effective internal communication of objectives and responsibilities2m
Exploring CC2.2 - COSO Principle 14: Enhancing internal control through effective internal communication of objectives and responsibilities
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Getting started with SQL for application developers44s
Getting started with SQL for application developers
From: Advanced SQL for Application Development
Video
-
Configure permissions and roles4m
Configure permissions and roles
From: Microsoft Defender for Office 365
Video
-
Exchange Online Policies (EOP) anti-spam policies9m
Exchange Online Policies (EOP) anti-spam policies
From: Microsoft Defender for Office 365
Video
-
Scenario: What would you do?2m
Scenario: What would you do?
From: Microsoft Defender for Office 365
Video
-
Scenario: What would you do?3m
Scenario: What would you do?
From: Microsoft Defender for Office 365
Video
-
Accessing the Defender Portal5m
Accessing the Defender Portal
From: Microsoft Defender for Office 365
Video
-
Different ways to create tensors3m
Different ways to create tensors
From: PyTorch Essential Training: Deep Learning
Video
-
Moving tensors between CPUs and GPUs2m
Moving tensors between CPUs and GPUs
From: PyTorch Essential Training: Deep Learning
Video
-
Creating a tensor GPU example1m
Creating a tensor GPU example
From: PyTorch Essential Training: Deep Learning
Video
-
Automatic differentiation (Autograd)6m
Automatic differentiation (Autograd)
From: PyTorch Essential Training: Deep Learning
Video
-
Creating tensors from random samples2m
Creating tensors from random samples
From: PyTorch Essential Training: Deep Learning
Video
-
Leading and motivating people with different personalities50s
Leading and motivating people with different personalities
From: Leading and Motivating People with Different Personalities
Video
-
Create new and better results with your team1m
Create new and better results with your team
From: Leading and Motivating People with Different Personalities
Video
-
What motivates people?1m
What motivates people?
From: Leading and Motivating People with Different Personalities
Video
-
What is personality?2m
What is personality?
From: Leading and Motivating People with Different Personalities
Video
-
Leading people with varying levels of openness to experience2m
Leading people with varying levels of openness to experience
From: Leading and Motivating People with Different Personalities
Video
-
Leading people who are high and low in emotional stability2m
Leading people who are high and low in emotional stability
From: Leading and Motivating People with Different Personalities
Video
-
Cancel dynamization in columns in Power Query1m
Cancel dynamization in columns in Power Query
From: Essential Power BI (Beta)
Video
-
Solution: Develop a linear regression model2m
Solution: Develop a linear regression model
From: Applied Machine Learning: Algorithms
Video