Curated Video
How Your Gut Bacteria Controls Your Mood
Your intestines has about 39 trillion microorganisms in it. And yes I said trillion. We call this collection of organisms the microbiome and it consists of mostly bacteria, but also viruses and fungi. Collectively it weighs about 3...
Curated Video
Depression is an Illness, Not a Weakness
Major depression is an illness and not a weakness or failure. This video shows you how depression develops in the brain. I also talk about how long depression lasts. Depression is more than sadness or a temporary funk. Since it's beyond...
The Business Professor
Categories of Manager Control
Control or controlling is a core function of manageers. Whare the Categories of Manager Control? Controlling can be defined as that function of management which helps to seek planned results from the subordinates, managers and at all...
Curated Video
Human Body /Brain Song/Human Body Systems
Learn about the anatomy of the human brain with this fun educational music video and parents. Brought to you by KLT. Don't forget to sing along.
friEdTech
Record a Hangout with YouTube Live or What Happened to Hangouts on Air
This video shows how to recapture the seemingly missing feature of Google Hangout on Air and how to take advantage of and understand the features.
Curated Video
HTML: HTML Media: Images, Audio and Video
Media makes the web exciting. In this video, you will learn the HTML code to display images, play audio and display videos on a web page.
Curated Video
Risk Management
Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings. These risks stem from a variety of sources including financial uncertainties, legal liabilities, technology...
Curated Video
Risk Management Implementation Requirements
The video shows how to Identify the risk, Assess the risk,Treat the risk,Monitor and Report on the risk
Curated Video
Risk Management and DPIA Process
This section provides information that will help you gain knowledge on the GDPR DPIA process, methodologies to conduct a DPIA and practical approaches on how to protect data via anonymization and psudo- anonymization techniques.
Curated Video
Risk Treatment and Residual Risks
The basic methods for risk management—avoidance, retention, sharing, transferring, and loss prevention and reduction
Curated Video
Introduction to IT and Cybersecurity: Application Security Controls
Part 15/16 of Introduction to IT and Cybersecurity series: This video provides an overview of security controls that are implemented in applications. The speaker explains the three types of controls: input controls, processing controls,...
Curated Video
Introduction to IT and Cybersecurity: Information Protection
Part 14/16 of Introduction to IT and Cybersecurity series: In this video, the presenter discusses the various approaches and controls that can be implemented to protect information. The video explains how an organization's internal...
Curated Video
Modern Web Design with HTML5, CSS3, and JavaScript - Creating a slideshow with Bootstrap Carousel
This video shows how to create a slideshow with Bootstrap carousel. This clip is from the chapter "Exploring Rapid Web Design with the Bootstrap 4 Frontend Framework" of the series "Modern Web Design with HTML5, CSS3, and...
Curated Video
Modern Web Design with HTML5, CSS3, and JavaScript - Adding a Slideshow with the Bootstrap Carousel Component
This video explains how to add a slideshow with the Bootstrap carousel component. This clip is from the chapter "Exploring Rapid Web Design with the Bootstrap 4 Frontend Framework" of the series "Modern Web Design with HTML5, CSS3, and...
Curated Video
Structural Design Patterns in Modern C++ - Introduction to the Composite Pattern
This video introduces you to the composite pattern. This clip is from the chapter "Composite Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the composite design pattern. It also explores...
Curated Video
SOC 2 | Everything you need to know
Why is SOC 2 Compliance Important? Compliance with SOC 2 requirements indicates that an organization maintains a high level of information security. Strict compliance requirements (tested through on-site audits) can help ensure sensitive...
Curated Video
Modern Web Design with HTML5, CSS3, and JavaScript - Adding and Tags in HTML
This video shows how to add the and tags in HTML. This clip is from the chapter "Creating Web Pages with HTML5" of the series "Modern Web Design with HTML5, CSS3, and JavaScript".This section demonstrates how to create web pages with HTML5.
Curated Video
Modern Web Design with HTML5, CSS3, and JavaScript - Meta Tag in HTML
This video introduces you to the meta tag in HTML. This clip is from the chapter "HTML Challenges" of the series "Modern Web Design with HTML5, CSS3, and JavaScript".This section presents some HTML challenges.
Curated Video
Transition from ISO 27001-2013 to ISO 27001-2022 controls
In this video, we will be discussing the transition from ISO 27001-2013 to ISO 27001-2022 controls. ISO 27001 is a globally recognized standard for information security management systems. The 2013 version of the standard has been in use...
Curated Video
Mapping ISO 27001-2022 controls to NIST CSF subcategories
In this video, we will explore the process of mapping ISO 27001-2022 controls to NIST CSF subcategories. ISO 27001-2022 is a widely recognized standard for information security management, while NIST CSF is a framework that provides...
Curated Video
Mapping ISO 27001- 2013 and ISO 27001- 2022 ANNEX A controls
In this video, we will be discussing the process of mapping ISO 27001-2013 and ISO 27001-2022 ANNEX A controls. ISO 27001 is a globally recognized standard for information security management systems, and it provides a framework for...
Curated Video
ISO 27002-2022 Control Examples
In this video, we will be exploring ISO 27002-2022 control examples. ISO 27002-2022 is a globally recognized standard for information security management systems. It provides a framework for organizations to establish, implement,...
Curated Video
How can ISO 27002- 2022 support ISMS certification
In this video, we will explore how ISO 27002-2022 can support ISMS certification. ISO 27002-2022 is a standard that provides guidelines for information security management systems (ISMS). It outlines best practices for managing and...
Curated Video
Planning Domain (ISO 27001)
In this video, we will be discussing the Planning Domain of ISO 27001, which is a globally recognized standard for information security management. The Planning Domain is the first step in implementing an effective information security...