Instructional Video9:35
Mister Simplify

PRINCE2 Project Management Basics - Simplest Explanation Ever

12th - Higher Ed
PRINCE 2 is the leading Project Management framework used the world over to manage projects of various sizes and complexities. PRINCE 2 has 2 qualifications - The PRINCE 2 Foundation and the PRINCE 2 Practitioner. This video tries to...
Instructional Video6:53
Mister Simplify

McGregor XY Theory of Management - Simplest Explanation Ever

12th - Higher Ed
McGregor's Theory of Management is one of the fundamental motivational theories management which ties human psychology with management. We look at theory x and theory y and simplify the concept for you.
Instructional Video7:30
Mister Simplify

Lewin's Force Field Analysis Model - Simplest Explanation Ever

12th - Higher Ed
Change Management is always a challenging aspect of running a business and derive profit out of it. Lewin's Force Field Analysis Model lends a helping hand to businesses when it comes to weighing the prospect of change management in...
Instructional Video8:49
Mister Simplify

Handy's Organisational Culture Model - Simplest Explanation Ever

12th - Higher Ed
Charles Handy's Model is a way to categorise organisational cultures. Understanding organisational cultures goes a long way in ensuring employee satisfaction and motivation in business today.
Instructional Video1:07
Curated Video

Monitoring activities control

Higher Ed
In this video, we will be discussing the importance of monitoring activities control in any organization. We will explore the various methods and tools used to monitor and control activities, including software solutions and manual...
Instructional Video2:31
Curated Video

Data leakage prevention control

Higher Ed
In this video, we will be discussing data leakage prevention control. Data leakage is a serious concern for businesses of all sizes, as it can lead to the loss of sensitive information, financial loss, and damage to a company's...
Instructional Video2:22
Curated Video

Configuration management control

Higher Ed
In this video, we will be discussing the importance of configuration management control in software development. Configuration management control is the process of identifying, organizing, and controlling changes to software and hardware...
Instructional Video2:03
Curated Video

Physical security monitoring control

Higher Ed
In this video, we will be discussing physical security monitoring control. We will explore the importance of physical security in protecting your assets and how monitoring control can help you achieve this. We will also discuss the...
Instructional Video2:05
Curated Video

ICT readiness for business continuity control

Higher Ed
In this video, we will be discussing the importance of ICT readiness for business continuity control. With the increasing reliance on technology in today's business world, it is crucial to have a plan in place to ensure that your...
Instructional Video2:22
Curated Video

Information security for use of cloud services control

Higher Ed
In this video, we will be discussing the importance of information security when using cloud services. With the rise of cloud computing, it is crucial to understand the potential risks and how to mitigate them. We will cover topics such...
Instructional Video2:56
Curated Video

Threat intelligence control

Higher Ed
In this video, we will be discussing the importance of threat intelligence control in today's digital landscape. With cyber threats becoming more sophisticated and frequent, it is crucial for organizations to have a proactive approach to...
Instructional Video4:23
Curated Video

Transition timelines for ISO 27001

Higher Ed
In this video, we will be discussing transition timelines for ISO 27001. ISO 27001 is an international standard that outlines the requirements for an information security management system. As organizations strive to maintain compliance...
Instructional Video3:19
Curated Video

ISMS policy example

Higher Ed
In this video, we will be discussing an example of an ISMS policy. An ISMS policy is a set of guidelines and procedures that an organization follows to ensure the confidentiality, integrity, and availability of its information assets. We...
Instructional Video3:39
Curated Video

Mapping ISO 27001-2022 controls to NIST CSF subcategories

Higher Ed
In this video, we will explore the process of mapping ISO 27001-2022 controls to NIST CSF subcategories. ISO 27001-2022 is a widely recognized standard for information security management, while NIST CSF is a framework that provides...
Instructional Video13:34
Curated Video

ISO 27001-2022 and NIST CSF controls

Higher Ed
In this video, we will be discussing the ISO 27001-2022 and NIST CSF controls. These controls are essential for ensuring the security of your organization's information and data. We will explore the different types of controls, their...
Instructional Video3:44
Curated Video

What has been added and removed from the ISO 27001 standard

Higher Ed
In this video, we will be discussing the changes that have been made to the ISO 27001 standard. We will be exploring what has been added and removed from the latest version of the standard, and how these changes may impact your...
Instructional Video5:07
Curated Video

Support and Operation Domain (ISO 27001)

Higher Ed
In this video, we will be discussing the Support and Operation Domain of the ISO 27001 standard. This domain is crucial for ensuring the effective implementation and maintenance of an information security management system. We will cover...
Instructional Video2:05
Curated Video

Structure of ISO 27001 2022 Standard

Higher Ed
In this video, we will be discussing the structure of the ISO 27001 2022 standard. ISO 27001 is an internationally recognized standard for information security management systems. The 2022 version of the standard has been updated to...
Instructional Video1:10
Curated Video

Leadership Domain (ISO 27001)

Higher Ed
In this video, we will be discussing the Leadership Domain of the ISO 27001 standard. This domain is crucial for establishing and maintaining an effective information security management system within an organization. We will cover the...
Instructional Video1:20
Curated Video

Context of the Organization (ISO 27001)

Higher Ed
In this video, we will be discussing the importance of context of the organization in ISO 27001. Context of the organization refers to the internal and external factors that can impact an organization's information security management...
Instructional Video6:04
Curated Video

Why organizations need an ISMS (ISO 27001)

Higher Ed
In this video, we will explore the importance of an Information Security Management System (ISMS) for organizations. Specifically, we will focus on the ISO 27001 standard, which outlines the requirements for an effective ISMS. We will...
Instructional Video1:50
Curated Video

The ISO 27000 family of standards

Higher Ed
In this video, we will be discussing the ISO 27000 family of standards. These standards provide a framework for information security management systems, helping organizations to protect their sensitive information and data. We will...
Instructional Video5:40
Curated Video

Statement of Applicability (SoA) in ISO 27001

Higher Ed
In this video, we will be discussing the Statement of Applicability (SoA) in ISO 27001. The SoA is a crucial document that outlines the controls that an organization has implemented to manage their information security risks. We will...
Instructional Video5:32
Curated Video

ISO 27001 2022 People controls

Higher Ed
In this video, we will be discussing the ISO 27001 2022 People controls. ISO 27001 is a globally recognized standard for information security management systems. The 2022 version of the standard includes updated controls for managing the...