Browse most popular courses
-
Getting started with GDPR compliance58s
Getting started with GDPR compliance
From: GDPR Compliance: Essential Training
Video
-
Introducing Brian Evergreen46s
Introducing Brian Evergreen
From: Autonomous Transformation: Create a More Human Future with AI
Video
-
Introduction to Gemini extensions4m
Introduction to Gemini extensions
From: Prompt Engineering with Gemini
Video
-
Analyzing a multi-modal document with Gemini4m
Analyzing a multi-modal document with Gemini
From: Prompt Engineering with Gemini
Video
-
Using completion sequences and few-shot learning3m
Using completion sequences and few-shot learning
From: Prompt Engineering with Gemini
Video
-
Browsing the web with Gemini2m
Browsing the web with Gemini
From: Prompt Engineering with Gemini
Video
-
AI news and breakthroughs, April 20242m
AI news and breakthroughs, April 2024
From: Digital Marketing Trends
Video
-
Using OAuth 2.0 and OpenID Connect41s
Using OAuth 2.0 and OpenID Connect
From: Web Security: OAuth and OpenID Connect
Video
-
You've been hacked1m
You've been hacked
From: Incident Response: Evidence Collection in Windows
Video
-
Everyone needs a vulnerability management program1m
Everyone needs a vulnerability management program
From: Implementing a Vulnerability Management Lifecycle
Video
-
Overview1m
Overview
From: Google Cloud Professional Machine Learning Engineer Cert Prep: 3 Designing Data Preparation and Processing Systems
Video
-
Make decisions based on reason, not data2m
Make decisions based on reason, not data
From: Autonomous Transformation: Create a More Human Future with AI
Video
-
Planning a vacation with Gemini3m
Planning a vacation with Gemini
From: Prompt Engineering with Gemini
Video
-
Using chain-of-thought reasoning3m
Using chain-of-thought reasoning
From: Prompt Engineering with Gemini
Video
-
Continuing your prompt engineering journey25s
Continuing your prompt engineering journey
From: Prompt Engineering with Gemini
Video
-
Navigating cybersecurity: Essential policies and resources52s
Navigating cybersecurity: Essential policies and resources
From: Cybersecurity: Key Policies and Resources
Video
-
Welcome to this course1m
Welcome to this course
From: Vulnerability Management: Assessing the Risks with CVSS v3.1
Video
-
Essential skills for security operations management46s
Essential skills for security operations management
From: Managing Information Security Operations
Video
-
Pay attention to what you don't do3m
Pay attention to what you don't do
From: Autonomous Transformation: Create a More Human Future with AI
Video
-
Go beyond digital transformation2m
Go beyond digital transformation
From: Autonomous Transformation: Create a More Human Future with AI
Video
-
Improving your writing with Gemini3m
Improving your writing with Gemini
From: Prompt Engineering with Gemini
Video
-
Image recognition and augmentation with Gemini1m
Image recognition and augmentation with Gemini
From: Prompt Engineering with Gemini
Video
-
Searching and summarizing a YouTube video with Gemini2m
Searching and summarizing a YouTube video with Gemini
From: Prompt Engineering with Gemini
Video
-
Improving prompting with examples and quotes2m
Improving prompting with examples and quotes
From: Prompt Engineering with Gemini
Video
-
Overview1m
Overview
From: Google Cloud Professional Machine Learning Engineer Cert Prep: 4 Developing ML Models
Video
-
Overview2m
Overview
From: Google Cloud Professional Machine Learning Engineer Cert Prep: 2 Architecting ML Solution
Video
-
Introduction3m
Introduction
From: Managing and Administering Microsoft Teams by Microsoft Press
Video
-
Managing change with minimal pain56s
Managing change with minimal pain
From: IT Service Management Foundations: Change Management
Video
-
Using OAuth 2.0 and OpenID Connect1m
Using OAuth 2.0 and OpenID Connect
From: Web Security: OAuth and OpenID Connect (2019)
Video
-
Network threat hunting essentials: Staying proactive49s
Network threat hunting essentials: Staying proactive
From: Threat Hunting: Network Data
Video
-
What is prompt hacking?1m
What is prompt hacking?
From: Mitigating Prompt Injection and Prompt Hacking
Video
-
The importance of enforcing security best practices1m
The importance of enforcing security best practices
From: Defending Against and Recovering From Cybersecurity Attacks: Top Safety Practices
Video
-
Offensive penetration testing course overview10m
Offensive penetration testing course overview
From: Offensive Penetration Testing
Video