Browse most popular courses
-
Brian Evergreen introduces "Autonomous Transformation"1m
Brian Evergreen introduces "Autonomous Transformation"
From: Autonomous Transformation: Create a More Human Future with AI
Video
-
Transform the current leadership system3m
Transform the current leadership system
From: Autonomous Transformation: Create a More Human Future with AI
Video
-
Autonomous Transformation: Create a More Human Future with AI15m
Autonomous Transformation: Create a More Human Future with AI
By: Next Big Idea Club
Course
-
Envision your organization's future2m
Envision your organization's future
From: Autonomous Transformation: Create a More Human Future with AI
Video
-
Reformatting your data nicely2m
Reformatting your data nicely
From: Prompt Engineering with Gemini
Video
-
Pay attention to what you don't do3m
Pay attention to what you don't do
From: Autonomous Transformation: Create a More Human Future with AI
Video
-
Go beyond digital transformation2m
Go beyond digital transformation
From: Autonomous Transformation: Create a More Human Future with AI
Video
-
Improving your writing with Gemini3m
Improving your writing with Gemini
From: Prompt Engineering with Gemini
Video
-
Image recognition and augmentation with Gemini1m
Image recognition and augmentation with Gemini
From: Prompt Engineering with Gemini
Video
-
Searching and summarizing a YouTube video with Gemini2m
Searching and summarizing a YouTube video with Gemini
From: Prompt Engineering with Gemini
Video
-
Improving prompting with examples and quotes2m
Improving prompting with examples and quotes
From: Prompt Engineering with Gemini
Video
-
Welcome to threat hunting49s
Welcome to threat hunting
From: Threat Hunting Essential Training
Video
-
A security mindset49s
A security mindset
From: Managed Detection and Response (MDR) Fundamentals
Video
-
The solution to access management38s
The solution to access management
From: Learning Identity Governance
Video
-
The importance of identity and access management1m
The importance of identity and access management
From: Introduction to Identity and Access Management
Video
-
Anyone can suffer a ransomware or other cyberattack1m
Anyone can suffer a ransomware or other cyberattack
From: Crisis Communication Planning After a Ransomware or Other Cybersecurity Attack
Video
-
Using OAuth 2.0 and OpenID Connect1m
Using OAuth 2.0 and OpenID Connect
From: Web Security: OAuth and OpenID Connect (2019)
Video
-
Network threat hunting essentials: Staying proactive49s
Network threat hunting essentials: Staying proactive
From: Threat Hunting: Network Data
Video
-
What is prompt hacking?1m
What is prompt hacking?
From: Mitigating Prompt Injection and Prompt Hacking
Video
-
The importance of enforcing security best practices1m
The importance of enforcing security best practices
From: Defending Against and Recovering From Cybersecurity Attacks: Top Safety Practices
Video
-
Offensive penetration testing course overview10m
Offensive penetration testing course overview
From: Offensive Penetration Testing
Video
-
Overview1m
Overview
From: Google Cloud Professional Machine Learning Engineer Cert Prep: 6 Monitoring, Optimizing, and Maintaining ML Solutions
Video
-
Overview1m
Overview
From: Google Cloud Professional Machine Learning Engineer Cert Prep: 5 Automating and Orchestrating ML Pipelines
Video
-
Course and Google Professional Machine Learning Engineer exam overview3m
Course and Google Professional Machine Learning Engineer exam overview
From: Google Cloud Professional Machine Learning Engineer Cert Prep: 1 Framing ML Problems
Video
-
The art of generative AI: Balancing creativity and ethics58s
The art of generative AI: Balancing creativity and ethics
From: Generative AI Skills for Creative Content: Opportunities, Issues, and Ethics
Video
-
User experience for non-designers1m
User experience for non-designers
From: User Experience (UX) for Non-Designers
Video
-
Building and utilizing backlogs3m
Building and utilizing backlogs
From: Business Analysis Skills to Develop for Future Success
Video
-
Employing constant reprioritization4m
Employing constant reprioritization
From: Business Analysis Skills to Develop for Future Success
Video
-
Digital comfort in business analysis3m
Digital comfort in business analysis
From: Business Analysis Skills to Develop for Future Success
Video
-
Determining your internal change management capability2m
Determining your internal change management capability
From: Improving Technical Project Success with Change Management
Video
-
Four leadership concerns4m
Four leadership concerns
From: Improving Technical Project Success with Change Management
Video
-
Improve your technical project success rate39s
Improve your technical project success rate
From: Improving Technical Project Success with Change Management
Video
-
Preparing the business for change management2m
Preparing the business for change management
From: Improving Technical Project Success with Change Management
Video
-
How change management increases adoption3m
How change management increases adoption
From: Improving Technical Project Success with Change Management
Video
-
Institutionalizing the change3m
Institutionalizing the change
From: Improving Technical Project Success with Change Management
Video
-
Prepare for a difficult conversation2m
Prepare for a difficult conversation
From: Having Difficult Conversations
Video
-
Use radical listening to stay present3m
Use radical listening to stay present
From: Having Difficult Conversations
Video
-
Learn what to do and not to do in a difficult conversation3m
Learn what to do and not to do in a difficult conversation
From: Having Difficult Conversations
Video
-
Learn the blueprint for a difficult conversation3m
Learn the blueprint for a difficult conversation
From: Having Difficult Conversations
Video
-
Identify the power structure and patterns in conflict3m
Identify the power structure and patterns in conflict
From: Having Difficult Conversations
Video
-
Scaling frameworks, continued4m
Scaling frameworks, continued
From: Agile Software Development
Video