Browse most popular courses
-
Little i innovation every day4m
Little i innovation every day
From: Learning Innovation to Drive Change in Your Role
Video
-
Who are innovators and what do they do?3m
Who are innovators and what do they do?
From: Learning Innovation to Drive Change in Your Role
Video
-
A call to innovate3m
A call to innovate
From: Learning Innovation to Drive Change in Your Role
Video
-
Demystifying innovation3m
Demystifying innovation
From: Learning Innovation to Drive Change in Your Role
Video
-
The fundamentals of programming55s
The fundamentals of programming
From: Programming Foundations: Fundamentals
Video
-
Program management course overview1m
Program management course overview
From: Learning Program Management
Video
-
Review innovation process example3m
Review innovation process example
From: Learning Innovation to Drive Change in Your Role
Video
-
Impact effort matrix4m
Impact effort matrix
From: Learning Innovation to Drive Change in Your Role
Video
-
Implement the solution and make your new future a reality2m
Implement the solution and make your new future a reality
From: Learning Innovation to Drive Change in Your Role
Video
-
Dream up fresh ideas to innovate a new future2m
Dream up fresh ideas to innovate a new future
From: Learning Innovation to Drive Change in Your Role
Video
-
Importance of algorithmic thinking51s
Importance of algorithmic thinking
From: Foundations of Algorithmic Thinking with Python
Video
-
Exploration of algorithmic thinking45s
Exploration of algorithmic thinking
From: Advanced Algorithmic Thinking with Python
Video
-
Reducing your digital footprint46s
Reducing your digital footprint
From: Digital Sustainability: How to Reduce Your Digital Footprint
Video
-
Leveraging generative AI as a product manager50s
Leveraging generative AI as a product manager
From: Generative AI for Product Managers
Video
-
Start listening to your infrastructure1m
Start listening to your infrastructure
From: Learning the Elastic Stack (2020)
Video
-
Take better notes with Microsoft Office apps58s
Take better notes with Microsoft Office apps
From: Smarter Note-Taking with Microsoft 365
Video
-
Configure data source properties2m
Configure data source properties
From: Essential Power BI (Beta)
Video
-
Understand the hacking of IoT devices1m
Understand the hacking of IoT devices
From: Ethical Hacking: Hacking IoT Devices (2019)
Video
-
Learn and apply the innovation process3m
Learn and apply the innovation process
From: Learning Innovation to Drive Change in Your Role
Video
-
You are an innovator3m
You are an innovator
From: Learning Innovation to Drive Change in Your Role
Video
-
Make your dream real by creating an innovation prototype3m
Make your dream real by creating an innovation prototype
From: Learning Innovation to Drive Change in Your Role
Video
-
Small steps to great things1m
Small steps to great things
From: Programming Foundations: Test-Driven Development
Video
-
Choose the problem you want to solve through innovation2m
Choose the problem you want to solve through innovation
From: Learning Innovation to Drive Change in Your Role
Video
-
Gaining support at work5m
Gaining support at work
From: Leveraging Authenticity in the Workplace
Video
-
Comprehensive guide to completeness and accuracy in SOC 2 auditing: Ensuring reliable and comprehensive evaluations3m
Comprehensive guide to completeness and accuracy in SOC 2 auditing: Ensuring reliable and comprehensive evaluations
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC1.5 - COSO Principle 5: Ensuring accountability for internal control responsibilities in objective pursuit2m
Exploring CC1.5 - COSO Principle 5: Ensuring accountability for internal control responsibilities in objective pursuit
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Next steps39s
Next steps
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring A1.2 - Protecting environment, software, and data: Authorization, design, implementation, and monitoring for objective achievement2m
Exploring A1.2 - Protecting environment, software, and data: Authorization, design, implementation, and monitoring for objective achievement
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC6.8 - Preventing and detecting unauthorized or malicious software: Controls for objective alignment2m
Exploring CC6.8 - Preventing and detecting unauthorized or malicious software: Controls for objective alignment
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC1.4 - COSO Principle 4: Fostering a commitment to competent talent acquisition, development, and retention in alignment with objectives2m
Exploring CC1.4 - COSO Principle 4: Fostering a commitment to competent talent acquisition, development, and retention in alignment with objectives
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC7.5 - Recovering from security incidents: Identifying, developing, and implementing effective recovery activities2m
Exploring CC7.5 - Recovering from security incidents: Identifying, developing, and implementing effective recovery activities
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC4.2 - COSO Principle 17: Timely evaluation and communication of internal control deficiencies for effective corrective action2m
Exploring CC4.2 - COSO Principle 17: Timely evaluation and communication of internal control deficiencies for effective corrective action
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Exploring CC2.2 - COSO Principle 14: Enhancing internal control through effective internal communication of objectives and responsibilities2m
Exploring CC2.2 - COSO Principle 14: Enhancing internal control through effective internal communication of objectives and responsibilities
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Getting started with SQL for application developers44s
Getting started with SQL for application developers
From: Advanced SQL for Application Development
Video
-
The importance of trust2m
The importance of trust
From: Why Trust Matters with Rachel Botsman (with Audio Descriptions)
Video
-
The workplace you inherited1m
The workplace you inherited
From: Leveraging Authenticity in the Workplace
Video
-
Exploring A1.1 - Managing processing capacity: Monitoring, evaluating, and enabling additional capacity for objective fulfillment2m
Exploring A1.1 - Managing processing capacity: Monitoring, evaluating, and enabling additional capacity for objective fulfillment
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video