Browse most popular courses
-
Define your profile2m
Define your profile
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Create a plan1m
Create a plan
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Address cyber incidents2m
Address cyber incidents
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Build cybersecurity into your business1m
Build cybersecurity into your business
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Understand what you have2m
Understand what you have
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Get back to normal3m
Get back to normal
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Guard your network2m
Guard your network
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Determine your tier3m
Determine your tier
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Secure your system3m
Secure your system
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Prioritize your biggest risks2m
Prioritize your biggest risks
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Set your cyber strategy3m
Set your cyber strategy
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Leverage the NIST CSF to protect what matters most30s
Leverage the NIST CSF to protect what matters most
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Oracle's data management strategy6m
Oracle's data management strategy
From: Oracle Cloud Data Management Foundations Workshop
Video
-
Cornerstones of cybersecurity2m
Cornerstones of cybersecurity
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
What you should know38s
What you should know
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Oracle Base Database Service overview16m
Oracle Base Database Service overview
From: Oracle Base Database Services Professional Workshop
Video
-
Roll out your guidance2m
Roll out your guidance
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Keep everyone in the loop2m
Keep everyone in the loop
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Know when things are off2m
Know when things are off
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Understand your cyber risks2m
Understand your cyber risks
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Leverage the cybersecurity framework3m
Leverage the cybersecurity framework
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Cybersecurity framework fundamentals2m
Cybersecurity framework fundamentals
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
AI and the cloud43s
AI and the cloud
From: Generative AI and Predictive AI in the Cloud: Foundational Concepts and Scenarios
Video
-
Cloud-based generative AI32s
Cloud-based generative AI
From: Understanding Generative AI in Cloud Computing: Services and Use Cases
Video
-
How to make wiser business decisions1m
How to make wiser business decisions
From: Finance for Non-Financial Managers (2015)
Video
-
Using AI to be a faster, better, stronger designer48s
Using AI to be a faster, better, stronger designer
From: Design to Code: Using AI to Build Faster
Video
-
Intro to artificial intelligence (AI) on Google44s
Intro to artificial intelligence (AI) on Google
From: Leveraging Cloud-Based Machine Learning on Google Cloud Platform: Real World Applications
Video
-
Planning and implementing non-functional requirements53s
Planning and implementing non-functional requirements
From: Non-Functional Requirements in the Cloud Part 2: Planning and Implementation
Video
-
Introduction to Google Workspace49s
Introduction to Google Workspace
From: Google Workspace Administration: Management and Reporting
Video
-
Enterprise-ready GCP38s
Enterprise-ready GCP
From: Google Cloud Platform for Enterprise Essential Training
Video
-
Kicking off your GCP development46s
Kicking off your GCP development
From: Google Cloud Platform (GCP) Essential Training for Developers
Video
-
Learning the Google Cloud Build platform54s
Learning the Google Cloud Build platform
From: Google Cloud Build: Test, Deploy, and Manage Code
Video
-
Understanding Google Compute Engine1m
Understanding Google Compute Engine
From: GCP: Deploy and Manage Linux Virtual Machine Instances
Video
-
AWS landing zone for your enterprise45s
AWS landing zone for your enterprise
From: Designing an AWS Landing Zone for Your Enterprise
Video
-
Introduction to data collection methods43s
Introduction to data collection methods
From: Creating Dashboards in Google Cloud Platform for Small Businesses
Video
-
Develop apps using Java with MicroProfile37s
Develop apps using Java with MicroProfile
From: Cloud-Native Development Using Java with Eclipse MicroProfile
Video
-
Dependency management in DevOps46s
Dependency management in DevOps
From: Azure for DevOps: Dependency Management
Video
-
Exploring Azure OpenAI Studio44s
Exploring Azure OpenAI Studio
From: Azure AI Studio First Look
Video
-
The competition in AI from Google38s
The competition in AI from Google
From: Building a React Project with Google Bard and the PalM2 API
Video
-
Accelerate your web development process46s
Accelerate your web development process
From: ChatGPT for Web Developers
Video
-
Getting a job in Web3 and Blockchain35s
Getting a job in Web3 and Blockchain
From: How to Get a Job in Web3 and Blockchain
Video
-
Identity is at the center of cybersecurity1m
Identity is at the center of cybersecurity
From: Cybersecurity Careers: Become an Identity and Access Management Manager
Video
-
To maintain longevity, you need to keep learning59s
To maintain longevity, you need to keep learning
From: Advance Your Cybersecurity Career
Video
-
Your secret weapon1m
Your secret weapon
From: How to Build an Analytics Portfolio that Gets You Your Next Job
Video
-
The importance of understanding exposure1m
The importance of understanding exposure
From: Photography Foundations: Exposure (part 1)
Video
-
Benefits of Rust for enterprise35s
Benefits of Rust for enterprise
From: Rust for Java Developers
Video