Instructional Video7:59
Curated Video

How Your Gut Bacteria Controls Your Mood

Higher Ed
Your intestines has about 39 trillion microorganisms in it. And yes I said trillion. We call this collection of organisms the microbiome and it consists of mostly bacteria, but also viruses and fungi. Collectively it weighs about 3...
Instructional Video7:48
Curated Video

Depression is an Illness, Not a Weakness

Higher Ed
Major depression is an illness and not a weakness or failure. This video shows you how depression develops in the brain. I also talk about how long depression lasts. Depression is more than sadness or a temporary funk. Since it's beyond...
Instructional Video4:20
The Business Professor

Categories of Manager Control

Higher Ed
Control or controlling is a core function of manageers. Whare the Categories of Manager Control? Controlling can be defined as that function of management which helps to seek planned results from the subordinates, managers and at all...
Instructional Video2:00
Curated Video

Human Body /Brain Song/Human Body Systems

Pre-K - 8th
Learn about the anatomy of the human brain with this fun educational music video and parents. Brought to you by KLT. Don't forget to sing along.
Instructional Video15:58
friEdTech

Record a Hangout with YouTube Live or What Happened to Hangouts on Air

Higher Ed
This video shows how to recapture the seemingly missing feature of Google Hangout on Air and how to take advantage of and understand the features.
Instructional Video5:46
Curated Video

HTML: HTML Media: Images, Audio and Video

Pre-K - Higher Ed
Media makes the web exciting. In this video, you will learn the HTML code to display images, play audio and display videos on a web page.
Instructional Video22:16
Curated Video

Risk Management

Higher Ed
Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings. These risks stem from a variety of sources including financial uncertainties, legal liabilities, technology...
Instructional Video6:30
Curated Video

Risk Management Implementation Requirements

Higher Ed
The video shows how to Identify the risk, Assess the risk,Treat the risk,Monitor and Report on the risk
Instructional Video12:38
Curated Video

Risk Management and DPIA Process

Higher Ed
This section provides information that will help you gain knowledge on the GDPR DPIA process, methodologies to conduct a DPIA and practical approaches on how to protect data via anonymization and psudo- anonymization techniques.
Instructional Video4:50
Curated Video

Risk Treatment and Residual Risks

Higher Ed
The basic methods for risk management—avoidance, retention, sharing, transferring, and loss prevention and reduction
Instructional Video10:38
Curated Video

Introduction to IT and Cybersecurity: Application Security Controls

Higher Ed
Part 15/16 of Introduction to IT and Cybersecurity series: This video provides an overview of security controls that are implemented in applications. The speaker explains the three types of controls: input controls, processing controls,...
Instructional Video17:44
Curated Video

Introduction to IT and Cybersecurity: Information Protection

Higher Ed
Part 14/16 of Introduction to IT and Cybersecurity series: In this video, the presenter discusses the various approaches and controls that can be implemented to protect information. The video explains how an organization's internal...
Instructional Video7:35
Curated Video

Modern Web Design with HTML5, CSS3, and JavaScript - Creating a slideshow with Bootstrap Carousel

Higher Ed
This video shows how to create a slideshow with Bootstrap carousel. This clip is from the chapter "Exploring Rapid Web Design with the Bootstrap 4 Frontend Framework" of the series "Modern Web Design with HTML5, CSS3, and...
Instructional Video11:21
Curated Video

Modern Web Design with HTML5, CSS3, and JavaScript - Adding a Slideshow with the Bootstrap Carousel Component

Higher Ed
This video explains how to add a slideshow with the Bootstrap carousel component. This clip is from the chapter "Exploring Rapid Web Design with the Bootstrap 4 Frontend Framework" of the series "Modern Web Design with HTML5, CSS3, and...
Instructional Video4:52
Curated Video

Structural Design Patterns in Modern C++ - Introduction to the Composite Pattern

Higher Ed
This video introduces you to the composite pattern. This clip is from the chapter "Composite Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the composite design pattern. It also explores...
Instructional Video27:54
Curated Video

SOC 2 | Everything you need to know

Higher Ed
Why is SOC 2 Compliance Important? Compliance with SOC 2 requirements indicates that an organization maintains a high level of information security. Strict compliance requirements (tested through on-site audits) can help ensure sensitive...
Instructional Video4:18
Curated Video

Modern Web Design with HTML5, CSS3, and JavaScript - Adding and Tags in HTML

Higher Ed
This video shows how to add the and tags in HTML. This clip is from the chapter "Creating Web Pages with HTML5" of the series "Modern Web Design with HTML5, CSS3, and JavaScript".This section demonstrates how to create web pages with HTML5.
Instructional Video5:04
Curated Video

Modern Web Design with HTML5, CSS3, and JavaScript - Meta Tag in HTML

Higher Ed
This video introduces you to the meta tag in HTML. This clip is from the chapter "HTML Challenges" of the series "Modern Web Design with HTML5, CSS3, and JavaScript".This section presents some HTML challenges.
Instructional Video6:17
Curated Video

Transition from ISO 27001-2013 to ISO 27001-2022 controls

Higher Ed
In this video, we will be discussing the transition from ISO 27001-2013 to ISO 27001-2022 controls. ISO 27001 is a globally recognized standard for information security management systems. The 2013 version of the standard has been in use...
Instructional Video3:39
Curated Video

Mapping ISO 27001-2022 controls to NIST CSF subcategories

Higher Ed
In this video, we will explore the process of mapping ISO 27001-2022 controls to NIST CSF subcategories. ISO 27001-2022 is a widely recognized standard for information security management, while NIST CSF is a framework that provides...
Instructional Video5:27
Curated Video

Mapping ISO 27001- 2013 and ISO 27001- 2022 ANNEX A controls

Higher Ed
In this video, we will be discussing the process of mapping ISO 27001-2013 and ISO 27001-2022 ANNEX A controls. ISO 27001 is a globally recognized standard for information security management systems, and it provides a framework for...
Instructional Video5:08
Curated Video

ISO 27002-2022 Control Examples

Higher Ed
In this video, we will be exploring ISO 27002-2022 control examples. ISO 27002-2022 is a globally recognized standard for information security management systems. It provides a framework for organizations to establish, implement,...
Instructional Video10:49
Curated Video

How can ISO 27002- 2022 support ISMS certification

Higher Ed
In this video, we will explore how ISO 27002-2022 can support ISMS certification. ISO 27002-2022 is a standard that provides guidelines for information security management systems (ISMS). It outlines best practices for managing and...
Instructional Video1:16
Curated Video

Planning Domain (ISO 27001)

Higher Ed
In this video, we will be discussing the Planning Domain of ISO 27001, which is a globally recognized standard for information security management. The Planning Domain is the first step in implementing an effective information security...