Instructional Video27:54
Curated Video

SOC 2 | Everything you need to know

Higher Ed
Why is SOC 2 Compliance Important? Compliance with SOC 2 requirements indicates that an organization maintains a high level of information security. Strict compliance requirements (tested through on-site audits) can help ensure sensitive...
Instructional Video2:41
Curated Video

Security Best Practices

Higher Ed
This video will help you follow a cyber security hygiene in your personal and business life
Instructional Video2:37
Curated Video

Famous Cyber Security Frameworks

Higher Ed
Users need standards for information technology (IT) systems in order to use IT successfully and run their organizations' operations. To connect goods created by several suppliers and transfer software, data, and applications from one...
Instructional Video3:25
Curated Video

Introduction to IT and Cybersecurity: Privacy and GDPR

Higher Ed
Part 16/16 of Introduction to IT and Cybersecurity series: The video is a discussion on the importance of privacy and how it is protected by laws and regulations, particularly the General Data Protection Regulation (GDPR) in the European...
Instructional Video1:27
Curated Video

Introduction to IT and Cybersecurity: Enterprise Resource Planning (ERP)

Higher Ed
Part 11/16 of Introduction to IT and Cybersecurity series: The video discusses ERP (Enterprise Resource Planning) software. The video highlights SAP and Oracle as the two leading providers of ERP software with the highest market share.
Instructional Video2:45
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - Other Visualization Tools (HighCharts, D3, and More)

Higher Ed
This video explains the other visualization tools in Amazon QuickSight. This clip is from the chapter "Domain 5: Visualization" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn how to...
Instructional Video2:05
Curated Video

ICT readiness for business continuity control

Higher Ed
In this video, we will be discussing the importance of ICT readiness for business continuity control. With the increasing reliance on technology in today's business world, it is crucial to have a plan in place to ensure that your...
Instructional Video3:39
Curated Video

Mapping ISO 27001-2022 controls to NIST CSF subcategories

Higher Ed
In this video, we will explore the process of mapping ISO 27001-2022 controls to NIST CSF subcategories. ISO 27001-2022 is a widely recognized standard for information security management, while NIST CSF is a framework that provides...
Instructional Video3:44
Curated Video

What has been added and removed from the ISO 27001 standard

Higher Ed
In this video, we will be discussing the changes that have been made to the ISO 27001 standard. We will be exploring what has been added and removed from the latest version of the standard, and how these changes may impact your...
Instructional Video5:07
Curated Video

Support and Operation Domain (ISO 27001)

Higher Ed
In this video, we will be discussing the Support and Operation Domain of the ISO 27001 standard. This domain is crucial for ensuring the effective implementation and maintenance of an information security management system. We will cover...
Instructional Video2:05
Curated Video

Structure of ISO 27001 2022 Standard

Higher Ed
In this video, we will be discussing the structure of the ISO 27001 2022 standard. ISO 27001 is an internationally recognized standard for information security management systems. The 2022 version of the standard has been updated to...
Instructional Video6:04
Curated Video

Why organizations need an ISMS (ISO 27001)

Higher Ed
In this video, we will explore the importance of an Information Security Management System (ISMS) for organizations. Specifically, we will focus on the ISO 27001 standard, which outlines the requirements for an effective ISMS. We will...
Instructional Video5:40
Curated Video

Statement of Applicability (SoA) in ISO 27001

Higher Ed
In this video, we will be discussing the Statement of Applicability (SoA) in ISO 27001. The SoA is a crucial document that outlines the controls that an organization has implemented to manage their information security risks. We will...
Instructional Video5:32
Curated Video

ISO 27001 2022 People controls

Higher Ed
In this video, we will be discussing the ISO 27001 2022 People controls. ISO 27001 is a globally recognized standard for information security management systems. The 2022 version of the standard includes updated controls for managing the...
Instructional Video9:35
Mister Simplify

PRINCE2 Project Management Basics - Simplest Explanation Ever

12th - Higher Ed
PRINCE 2 is the leading Project Management framework used the world over to manage projects of various sizes and complexities. PRINCE 2 has 2 qualifications - The PRINCE 2 Foundation and the PRINCE 2 Practitioner. This video tries to...
Instructional Video6:53
Mister Simplify

McGregor XY Theory of Management - Simplest Explanation Ever

12th - Higher Ed
McGregor's Theory of Management is one of the fundamental motivational theories management which ties human psychology with management. We look at theory x and theory y and simplify the concept for you.
Instructional Video7:30
Mister Simplify

Lewin's Force Field Analysis Model - Simplest Explanation Ever

12th - Higher Ed
Change Management is always a challenging aspect of running a business and derive profit out of it. Lewin's Force Field Analysis Model lends a helping hand to businesses when it comes to weighing the prospect of change management in...
Instructional Video8:49
Mister Simplify

Handy's Organisational Culture Model - Simplest Explanation Ever

12th - Higher Ed
Charles Handy's Model is a way to categorise organisational cultures. Understanding organisational cultures goes a long way in ensuring employee satisfaction and motivation in business today.
Instructional Video1:07
Curated Video

Monitoring activities control

Higher Ed
In this video, we will be discussing the importance of monitoring activities control in any organization. We will explore the various methods and tools used to monitor and control activities, including software solutions and manual...
Instructional Video2:31
Curated Video

Data leakage prevention control

Higher Ed
In this video, we will be discussing data leakage prevention control. Data leakage is a serious concern for businesses of all sizes, as it can lead to the loss of sensitive information, financial loss, and damage to a company's...
Instructional Video2:22
Curated Video

Configuration management control

Higher Ed
In this video, we will be discussing the importance of configuration management control in software development. Configuration management control is the process of identifying, organizing, and controlling changes to software and hardware...
Instructional Video2:03
Curated Video

Physical security monitoring control

Higher Ed
In this video, we will be discussing physical security monitoring control. We will explore the importance of physical security in protecting your assets and how monitoring control can help you achieve this. We will also discuss the...
Instructional Video2:22
Curated Video

Information security for use of cloud services control

Higher Ed
In this video, we will be discussing the importance of information security when using cloud services. With the rise of cloud computing, it is crucial to understand the potential risks and how to mitigate them. We will cover topics such...
Instructional Video2:56
Curated Video

Threat intelligence control

Higher Ed
In this video, we will be discussing the importance of threat intelligence control in today's digital landscape. With cyber threats becoming more sophisticated and frequent, it is crucial for organizations to have a proactive approach to...