Browse most popular courses
-
Using OAuth 2.0 and OpenID Connect41s
Using OAuth 2.0 and OpenID Connect
From: Web Security: OAuth and OpenID Connect
Video
-
You've been hacked1m
You've been hacked
From: Incident Response: Evidence Collection in Windows
Video
-
Everyone needs a vulnerability management program1m
Everyone needs a vulnerability management program
From: Implementing a Vulnerability Management Lifecycle
Video
-
Overview1m
Overview
From: Google Cloud Professional Machine Learning Engineer Cert Prep: 3 Designing Data Preparation and Processing Systems
Video
-
Welcome to threat hunting49s
Welcome to threat hunting
From: Threat Hunting Essential Training
Video
-
A security mindset49s
A security mindset
From: Managed Detection and Response (MDR) Fundamentals
Video
-
The solution to access management38s
The solution to access management
From: Learning Identity Governance
Video
-
The importance of identity and access management1m
The importance of identity and access management
From: Introduction to Identity and Access Management
Video
-
Anyone can suffer a ransomware or other cyberattack1m
Anyone can suffer a ransomware or other cyberattack
From: Crisis Communication Planning After a Ransomware or Other Cybersecurity Attack
Video
-
Vision planning in business analysis3m
Vision planning in business analysis
From: Business Analysis Skills to Develop for Future Success
Video
-
Building your business analysis skill sets1m
Building your business analysis skill sets
From: Business Analysis Skills to Develop for Future Success
Video
-
Upgrade your online meetings with Teams Premium1m
Upgrade your online meetings with Teams Premium
From: Learning Microsoft Teams Premium
Video
-
Improving change culture in your organization3m
Improving change culture in your organization
From: Improving Technical Project Success with Change Management
Video
-
Staffing your change management team1m
Staffing your change management team
From: Improving Technical Project Success with Change Management
Video
-
Find your why in a difficult conversation2m
Find your why in a difficult conversation
From: Having Difficult Conversations
Video
-
Personal vs. professional conflicts3m
Personal vs. professional conflicts
From: Having Difficult Conversations
Video
-
Learning break: Story of personal conflict2m
Learning break: Story of personal conflict
From: Having Difficult Conversations
Video
-
Learn best practices to prepare for a difficult conversation3m
Learn best practices to prepare for a difficult conversation
From: Having Difficult Conversations
Video
-
Scrum artifacts: The sprint backlog and increment1m
Scrum artifacts: The sprint backlog and increment
From: Agile Software Development
Video
-
Little i innovation every day4m
Little i innovation every day
From: Learning Innovation to Drive Change in Your Role
Video
-
Who are innovators and what do they do?3m
Who are innovators and what do they do?
From: Learning Innovation to Drive Change in Your Role
Video
-
A call to innovate3m
A call to innovate
From: Learning Innovation to Drive Change in Your Role
Video
-
Demystifying innovation3m
Demystifying innovation
From: Learning Innovation to Drive Change in Your Role
Video
-
The art of generative AI: Balancing creativity and ethics58s
The art of generative AI: Balancing creativity and ethics
From: Generative AI Skills for Creative Content: Opportunities, Issues, and Ethics
Video
-
The fundamentals of programming55s
The fundamentals of programming
From: Programming Foundations: Fundamentals
Video
-
User experience for non-designers1m
User experience for non-designers
From: User Experience (UX) for Non-Designers
Video
-
Program management course overview1m
Program management course overview
From: Learning Program Management
Video
-
Navigating cybersecurity: Essential policies and resources52s
Navigating cybersecurity: Essential policies and resources
From: Cybersecurity: Key Policies and Resources
Video
-
Welcome to this course1m
Welcome to this course
From: Vulnerability Management: Assessing the Risks with CVSS v3.1
Video
-
Essential skills for security operations management46s
Essential skills for security operations management
From: Managing Information Security Operations
Video
-
Using OAuth 2.0 and OpenID Connect1m
Using OAuth 2.0 and OpenID Connect
From: Web Security: OAuth and OpenID Connect (2019)
Video
-
Network threat hunting essentials: Staying proactive49s
Network threat hunting essentials: Staying proactive
From: Threat Hunting: Network Data
Video
-
What is prompt hacking?1m
What is prompt hacking?
From: Mitigating Prompt Injection and Prompt Hacking
Video
-
Offensive penetration testing course overview10m
Offensive penetration testing course overview
From: Offensive Penetration Testing
Video
-
The importance of enforcing security best practices1m
The importance of enforcing security best practices
From: Defending Against and Recovering From Cybersecurity Attacks: Top Safety Practices
Video