Instructional Video6:16
Organizational Communication Channel

Leadership and Storytelling Benefits

Higher Ed
There lots of benefits to storytelling, especially for leaders. It's a key communication skill for leaders and this video looks at all of the ways telling stories help leaders. From Johnson and Hackman's book on leadership.
Instructional Video14:18
Schooling Online

Virginia Woolf's A Room of One's Own - Theme of Truth and Integrity in Writing

3rd - Higher Ed
What is textual integrity? Virginia Woolf has the answer: it’s the Holy Grail for writers, especially those who write fiction! In her essay A Room of One’s Own, Woolf explains why truth and integrity are crucial, and how writers can...
Instructional Video11:12
Curated Video

Introduction to IT and Cybersecurity: IT Control Frameworks (ISO, NIST)

Higher Ed
Part 10/16 of Introduction to IT and Cybersecurity series: This video discusses the major IT control frameworks and their use in maintaining the effectiveness and efficiency of operations, financial governance, reporting, and compliance...
Instructional Video8:42
Curated Video

Threats and Vulnerabilities

Higher Ed
In cybersecurity, a vulnerability is a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system. After exploiting a vulnerability, a cyberattack can run malicious code, install malware and even...
Instructional Video3:00
Curated Video

LAB 1: How to Compare Hashes

Higher Ed
I will show you how you can download a file and make sure its the original file by comparing the hashes
Instructional Video11:37
Curated Video

How important is authenticity?

Higher Ed
This video is about the importance of being authentic as a leader. The speaker also provides six tips for being authentic at work, including exploring your values, changing your habits, being self-aware, being vulnerable, being...
Instructional Video2:22
Curated Video

Information security for use of cloud services control

Higher Ed
In this video, we will be discussing the importance of information security when using cloud services. With the rise of cloud computing, it is crucial to understand the potential risks and how to mitigate them. We will cover topics such...
Instructional Video3:19
Curated Video

ISMS policy example

Higher Ed
In this video, we will be discussing an example of an ISMS policy. An ISMS policy is a set of guidelines and procedures that an organization follows to ensure the confidentiality, integrity, and availability of its information assets. We...
Instructional Video3:55
Curated Video

Five attributes in ISO 27002

Higher Ed
In this video, we will be discussing the five key attributes outlined in ISO 27002. ISO 27002 is a globally recognized standard for information security management systems. These attributes include confidentiality, integrity,...
Instructional Video6:04
Curated Video

Why organizations need an ISMS (ISO 27001)

Higher Ed
In this video, we will explore the importance of an Information Security Management System (ISMS) for organizations. Specifically, we will focus on the ISO 27001 standard, which outlines the requirements for an effective ISMS. We will...
Instructional Video9:48
Schooling Online

Destroying Drama: Arthur Miller, The Crucible - Theme of Individual and Collective Power

3rd - Higher Ed
Is it better to stand as an individual or join forces with the majority?

This lesson explores the theme of individuality and collective power in Arthur Miller’s ‘The Crucible’. Explore what happened in Salem when the community’s...
Instructional Video5:13
Global Ethics Solutions

Discovering Sources of Ethical Dilemmas

Higher Ed
No matter who you are or what you do for a living, there is always a possibility that an ethical dilemma can occur. The key to overcoming these dilemmas is identifying and understanding the source. In this course you will learn about...
Instructional Video3:22
Global Ethics Solutions

Wroking Sober! Intervention and Getting Help with Workplace Substance Abuse Problems

Higher Ed
Substance abuse and addiction can have severe emotional, behavioral, and physical effects. This course teaches about the signs of addiction and helps participants learn the effects of substance abuse on the person and the workplace. This...
Instructional Video3:46
Global Ethics Solutions

Confidentiality and Intellectual Property Tips and Actions for Success (Part 3)

Higher Ed
Learn helpful tips for protecting confidential information and guidelines for reporting abuse.
Instructional Video8:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Hashing

Higher Ed
Hashes provide assurance of data integrity using fascinating mathematical calculations. Passwords are a very common use for hashing.
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Instructional Video2:27
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Confidentiality, Availability, and Integrity Attacks

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats.



It’s important to...
Instructional Video13:45
Schooling Online

Destroying Drama: Arthur Miller, The Crucible - Theme of Reputation and Integrity

3rd - Higher Ed
This lesson explores the theme of reputation and integrity in Arthur Miller’s ‘The Crucible’. Unpack why some characters chose to stay true to themselves, while others lied to save their reputations.

Join us and learn how to analyse...
Instructional Video31:02
Science360

Fresh Water in the Arctic -- Changing Planet

12th - Higher Ed
Scientists are concerned that melting Arctic sea ice will increase the amount of fresh water in the Beaufort Gyre, which could spill out into the Atlantic and cause major climate shifts in North America and Western...
Instructional Video6:50
TLDR News

The Northern Ireland Protocol Dispute: Will the UK Trigger Article 16? - TLDR News

12th - Higher Ed
With key UK Government figures continuing to criticise the Northern Ireland Protocol they agreed to less than a year ago, some have predicted that Boris Johnson might trigger Article 16, and unilaterally suspend the Protocol and checks...
Instructional Video3:47
Global Ethics Solutions

Confidentiality and Intellectual Property Tips and Actions for Success

Higher Ed
Learn helpful tips for protecting confidential information and guidelines for reporting abuse.
Instructional Video4:38
Catalyst University

Transverse Ligament Stress Test | Rationale & Interpretation

Higher Ed
In this video, I explain and demonstrate the transverse ligament stress test, which is used to assess integrity of the transverse cervical ligament. More specifically, we cover its rationale, interpretation of results, and psychometric...
Instructional Video1:59
Global Ethics Solutions

Working Sober! Insights Into Substance Abuse in the Workplace

Higher Ed
Drugs and alcohol in the workplace is a rising concern. With an estimated seventy seven percent of illegal drug use occurring with people who are employed, an employee drug and alcohol abuse policy is important. This course provides...
Instructional Video5:35
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Electricity

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Electricity.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Instructional Video3:24
Curated Video

Describe cyber attacks that could affect a computer system or network : Overview of Network Security

Higher Ed
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...