Hi, what do you want to do?
Organizational Communication Channel
Leadership and Storytelling Benefits
There lots of benefits to storytelling, especially for leaders. It's a key communication skill for leaders and this video looks at all of the ways telling stories help leaders. From Johnson and Hackman's book on leadership.
Schooling Online
Virginia Woolf's A Room of One's Own - Theme of Truth and Integrity in Writing
What is textual integrity? Virginia Woolf has the answer: it’s the Holy Grail for writers, especially those who write fiction! In her essay A Room of One’s Own, Woolf explains why truth and integrity are crucial, and how writers can...
Curated Video
Introduction to IT and Cybersecurity: IT Control Frameworks (ISO, NIST)
Part 10/16 of Introduction to IT and Cybersecurity series: This video discusses the major IT control frameworks and their use in maintaining the effectiveness and efficiency of operations, financial governance, reporting, and compliance...
Curated Video
Threats and Vulnerabilities
In cybersecurity, a vulnerability is a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system. After exploiting a vulnerability, a cyberattack can run malicious code, install malware and even...
Curated Video
LAB 1: How to Compare Hashes
I will show you how you can download a file and make sure its the original file by comparing the hashes
Curated Video
How important is authenticity?
This video is about the importance of being authentic as a leader. The speaker also provides six tips for being authentic at work, including exploring your values, changing your habits, being self-aware, being vulnerable, being...
Curated Video
Information security for use of cloud services control
In this video, we will be discussing the importance of information security when using cloud services. With the rise of cloud computing, it is crucial to understand the potential risks and how to mitigate them. We will cover topics such...
Curated Video
ISMS policy example
In this video, we will be discussing an example of an ISMS policy. An ISMS policy is a set of guidelines and procedures that an organization follows to ensure the confidentiality, integrity, and availability of its information assets. We...
Curated Video
Five attributes in ISO 27002
In this video, we will be discussing the five key attributes outlined in ISO 27002. ISO 27002 is a globally recognized standard for information security management systems. These attributes include confidentiality, integrity,...
Curated Video
Why organizations need an ISMS (ISO 27001)
In this video, we will explore the importance of an Information Security Management System (ISMS) for organizations. Specifically, we will focus on the ISO 27001 standard, which outlines the requirements for an effective ISMS. We will...
Schooling Online
Destroying Drama: Arthur Miller, The Crucible - Theme of Individual and Collective Power
Is it better to stand as an individual or join forces with the majority?
This lesson explores the theme of individuality and collective power in Arthur Miller’s ‘The Crucible’. Explore what happened in Salem when the community’s...
This lesson explores the theme of individuality and collective power in Arthur Miller’s ‘The Crucible’. Explore what happened in Salem when the community’s...
Global Ethics Solutions
Discovering Sources of Ethical Dilemmas
No matter who you are or what you do for a living, there is always a possibility that an ethical dilemma can occur. The key to overcoming these dilemmas is identifying and understanding the source. In this course you will learn about...
Global Ethics Solutions
Wroking Sober! Intervention and Getting Help with Workplace Substance Abuse Problems
Substance abuse and addiction can have severe emotional, behavioral, and physical effects. This course teaches about the signs of addiction and helps participants learn the effects of substance abuse on the person and the workplace. This...
Global Ethics Solutions
Confidentiality and Intellectual Property Tips and Actions for Success (Part 3)
Learn helpful tips for protecting confidential information and guidelines for reporting abuse.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Hashing
Hashes provide assurance of data integrity using fascinating mathematical calculations. Passwords are a very common use for hashing.
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Confidentiality, Availability, and Integrity Attacks
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats.
It’s important to...
It’s important to...
Schooling Online
Destroying Drama: Arthur Miller, The Crucible - Theme of Reputation and Integrity
This lesson explores the theme of reputation and integrity in Arthur Miller’s ‘The Crucible’. Unpack why some characters chose to stay true to themselves, while others lied to save their reputations.
Join us and learn how to analyse...
Join us and learn how to analyse...
Science360
Fresh Water in the Arctic -- Changing Planet
Scientists are concerned that melting Arctic sea ice will increase the amount of fresh water in the Beaufort Gyre, which could spill out into the Atlantic and cause major climate shifts in North America and Western...
TLDR News
The Northern Ireland Protocol Dispute: Will the UK Trigger Article 16? - TLDR News
With key UK Government figures continuing to criticise the Northern Ireland Protocol they agreed to less than a year ago, some have predicted that Boris Johnson might trigger Article 16, and unilaterally suspend the Protocol and checks...
Global Ethics Solutions
Confidentiality and Intellectual Property Tips and Actions for Success
Learn helpful tips for protecting confidential information and guidelines for reporting abuse.
Catalyst University
Transverse Ligament Stress Test | Rationale & Interpretation
In this video, I explain and demonstrate the transverse ligament stress test, which is used to assess integrity of the transverse cervical ligament. More specifically, we cover its rationale, interpretation of results, and psychometric...
Global Ethics Solutions
Working Sober! Insights Into Substance Abuse in the Workplace
Drugs and alcohol in the workplace is a rising concern. With an estimated seventy seven percent of illegal drug use occurring with people who are employed, an employee drug and alcohol abuse policy is important. This course provides...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Electricity
CISSP Domain 3: System Architecture and Engineering: Electricity.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Curated Video
Describe cyber attacks that could affect a computer system or network : Overview of Network Security
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...