Instructional Video8:34
Curated Video

How we Work: Geert Hofstede's 6 Cross-Organization Cultural Dimensions

10th - Higher Ed
In the 1980s, the Dutch cultural psychologist Geert Hofstede returned to the study of culture, but focused on an analysis of organizational practices. The authors identified six cross-organizational dimensions that separate and define...
Instructional Video5:18
Curated Video

Power in Organizations: The Power of Governance

10th - Higher Ed
In this video, we will look at the power organizations derive from their governance structures and processes.
Instructional Video9:16
Curated Video

Henry Mintzberg's 4 plus 2 Organizational Types

10th - Higher Ed
In his 1979 book, The Structuring of Organizations, Henry Mintzberg classified organizational structures into four organizational types, depending on the complexity of the organization’s operations, and the pace of change it needs to...
Instructional Video5:35
Curated Video

What Happens To Your Mind if You Don't Sleep

Higher Ed
What happens to your mind if you don't sleep? Not enough sleep affects your memory. One of the things that can happen if you don’t sleep it changes your thinking abilities and impairs your memory. The first way sleep deprivation impairs...
Instructional Video2:34
The Business Professor

Types of Organizational Learning

Higher Ed
What are the Types of Organizational Learning? single loop, double loop, deutero learning, Organizational learning theory is a branch of organizational studies that seeks to understand how organizations acquire and use knowledge to...
Instructional Video3:49
Vlogbrothers

Health Care Overhaul Summarized Via MASSIVE PIG

6th - 11th
In which John sweats through his shirt while discussing the American health care system and various proposals for reform, including the public option, nonprofit health insurance cooperatives, and continuing to feed the pig.
Instructional Video10:38
Curated Video

Introduction to IT and Cybersecurity: Application Security Controls

Higher Ed
Part 15/16 of Introduction to IT and Cybersecurity series: This video provides an overview of security controls that are implemented in applications. The speaker explains the three types of controls: input controls, processing controls,...
Instructional Video10:57
Curated Video

Types of project risks and how to prepare a contingency plan

Higher Ed
This video discusses types of project management and the importance of preparing a contingency plan for business projects. The video explains the various risks associated with business projects, including budget, schedule, and...
Instructional Video27:54
Curated Video

SOC 2 | Everything you need to know

Higher Ed
Why is SOC 2 Compliance Important? Compliance with SOC 2 requirements indicates that an organization maintains a high level of information security. Strict compliance requirements (tested through on-site audits) can help ensure sensitive...
Instructional Video6:17
Curated Video

Transition from ISO 27001-2013 to ISO 27001-2022 controls

Higher Ed
In this video, we will be discussing the transition from ISO 27001-2013 to ISO 27001-2022 controls. ISO 27001 is a globally recognized standard for information security management systems. The 2013 version of the standard has been in use...
Instructional Video6:04
Curated Video

Why organizations need an ISMS (ISO 27001)

Higher Ed
In this video, we will explore the importance of an Information Security Management System (ISMS) for organizations. Specifically, we will focus on the ISO 27001 standard, which outlines the requirements for an effective ISMS. We will...
Instructional Video4:33
Curated Video

MITRE ATTACK for iPhone

Higher Ed
In this video, we will be discussing MITRE ATTACK for Mobile Applications. MITRE ATT&CK is a globally recognized framework that helps organizations understand and categorize various types of cyber threats. In this video, we will be...
Instructional Video15:13
Curated Video

ISO 27001- 2022 Organizational controls

Higher Ed
In this video, we will be discussing the ISO 27001-2022 organizational controls. ISO 27001 is an international standard that outlines the requirements for an information security management system (ISMS). The 2022 version of the standard...
Instructional Video2:31
Curated Video

Data leakage prevention control

Higher Ed
In this video, we will be discussing data leakage prevention control. Data leakage is a serious concern for businesses of all sizes, as it can lead to the loss of sensitive information, financial loss, and damage to a company's...
Instructional Video1:55
Curated Video

Information deletion control

Higher Ed
In this video, we will be discussing the importance of information deletion control. With the increasing amount of data being collected and stored, it is crucial to have proper measures in place to ensure that sensitive information is...
Instructional Video2:22
Curated Video

Configuration management control

Higher Ed
In this video, we will be discussing the importance of configuration management control in software development. Configuration management control is the process of identifying, organizing, and controlling changes to software and hardware...
Instructional Video3:19
Curated Video

ISMS policy example

Higher Ed
In this video, we will be discussing an example of an ISMS policy. An ISMS policy is a set of guidelines and procedures that an organization follows to ensure the confidentiality, integrity, and availability of its information assets. We...
Instructional Video1:10
Curated Video

Leadership Domain (ISO 27001)

Higher Ed
In this video, we will be discussing the Leadership Domain of the ISO 27001 standard. This domain is crucial for establishing and maintaining an effective information security management system within an organization. We will cover the...
Instructional Video1:20
Curated Video

Context of the Organization (ISO 27001)

Higher Ed
In this video, we will be discussing the importance of context of the organization in ISO 27001. Context of the organization refers to the internal and external factors that can impact an organization's information security management...
Instructional Video17:40
Curated Video

Setting up an ISMS in ISO 27001

Higher Ed
In this video, we will guide you through the process of setting up an Information Security Management System (ISMS) in accordance with the ISO 27001 standard. We will cover the key steps involved in establishing an effective ISMS,...
Instructional Video5:44
Curated Video

ISO 27001 2022 Physical controls

Higher Ed
In this video, we will be discussing the physical controls outlined in the ISO 27001 2022 standard. Physical controls are an essential aspect of information security, as they help protect against physical threats such as theft, damage,...
Instructional Video1:34
Science360

Airplane disease transmission!

12th - Higher Ed
There’s nothing like being stuffed into a cramped, hot airplane cabin to make you feel sick. NSF-funded researchers at Florida State University say passenger movement patterns in these cabins actually can make you sick. In response to...
Instructional Video3:52
Mazz Media

Lab Safety: Radiation (Safety Procedures)

6th - 8th
In this live-action program viewers will learn overexposure to radiation can cause serious biological and environmental damage and this means that mandatory safety procedures must be followed at all times. Students will come to...
Instructional Video6:27
Executive Finance

Introduction to Cryptocurrency and Ethical Decision Making in the Industry

Higher Ed
The video is an introductory lesson for a course on cryptocurrency. The teacher shares their personal experience in the crypto space, starting from the early days of Bitcoin to the emergence of new investment opportunities. The lesson...