Catalyst University
Sharp-Purser Test | Rationale & Interpretation
In this video, I explain and demonstrate the Sharp-Purser test, which is used to assess integrity of the transverse cervical ligament. More specifically, we cover its rationale, interpretation of results, and psychometric properties.
XKA Digital
Be honest about what you know
Kelly is the Director of Tellus Mater Foundation, the private family foundation dedicated to capital market reform, sustainable capitalism and systems change as a means of preserving natural capital. She is also the founder and Managing...
Schooling Online
Destroying Drama: Arthur Miller, The Crucible - Building Paragraphs Part 2
Learn how to write brilliant analytical paragraphs to discuss themes (and much more) in Arthur Miller’s ‘The Crucible’! Watch us build two structured body paragraphs that would fit right into an extended response. The paragraphs will...
Global Ethics Solutions
Bribery and Corruption Awareness - Understanding Bribery and Corruption
Bribery and corruption is serious business. From the grand corruption of high-level officials to the everyday dishonest favors in business, corruption and bribery can be devastating to your organization and should not be tolerated. This...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - IP Security (IPsec)
The IPsec network security protocol suite can be used to secure any type of network traffic through integrity, authentication and encryption. Many VPNs use IPsec to establish an encrypted network tunnel. This clip is from the chapter...
Institute for New Economic Thinking
The Collapse of American Prestige: Part 5 of INET's Interview with Charles Ferguson
The effects of the financial crisis have been global and severe, and are generating a global distrust of America, says Charles Ferguson, the director of the new documentary film "Inside Job"
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - IPSec and PGP
CISSP Domain 3: System Architecture and Engineering: IPSec and PGP. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Digital signatures
CISSP Domain 3: System Architecture and Engineering: Digital signatures. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - The CIA triad
CISM Domain 1: Information Security Governance: The CIA triad This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security Governance Video Boot Camp...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Hashing
CISSP Domain 3: System Architecture and Engineering: Hashing. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering Video...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - The CIA Triad - Part 1 - Confidentiality, Integrity, and Availability
This is the first part of a two-part video that explains the CIA triad. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - MAC, HMAC, SSL, and TLS
CISSP Domain 3: System Architecture and Engineering: MAC, HMAC, SSL, and TLS. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Global Ethics Solutions
Bribery and Corruption Awareness - Avoiding and Refusing Bribes
Understand that bribery can present itself in both obvious and subtle ways and can result in serious legal implications for both you and your company. This section of the full course explains the basics of how to refuse a bribe, protect...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Security and its building blocks
What Is Security?: Security and its building blocks This clip is from the chapter "What Is Security?" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, you will learn how common security attacks...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Making Transmission Control Protocol/Internet Protocol (TCP/IP) Secure
This video shows how to secure TCP/IP to create a strong security program. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA Network+ Certification N10-007: The Total...
Global Ethics Solutions
賄賂與腐敗意識第1部分 - 了解賄賂與腐敗 (Understanding Bribery & Corruption)
贿赂和腐败是严肃的事情。从高级官员的严重腐败到日常不诚实的生意,腐败和贿赂可能对您的组织造成毁灭性的影响,不应该容忍。整个课程的此部分包括实用信息,可帮助个人了解企业中的核心贿赂和腐败问题。
Global Ethics Solutions
Understanding Confidentiality and Intellectual Property Ethical Issues and Problems
This presentation helps viewers understand confidential information, trade secrets, and intellectual property as well as the costs of protecting intellectual property.
Global Ethics Solutions
贿赂与腐败意识第二部分 - 避免和拒绝贿赂(Avoiding and Refusing Bribes)
理解贿赂会以明显和微妙的方式表现出来,并可能对您和您的公司造成严重的法律影响。整个课程的这一部分介绍了如何拒绝贿赂,保护您的声誉以及完全避免潜在情况的基本知识。
Mazz Media
Managing Data’s Lifecycle
People often confuse data management with technology management because they only see data in their application. In watching this program, viewers will come to understand that data can be separate from applications and has a lifecycle....
Curated Video
Salesforce Platform App Builder Certification Training - Workflow
This video introduces you to Workflow. This clip is from the chapter "Process Automation" of the series "Salesforce Platform App Builder Certification Training".This section explains the process automation.
Curated Video
Docker Certified Associate Certification Training Course - Validating Docker Image
This video explains validating Docker image. This clip is from the chapter "Build, Manage, and Distribute Images" of the series "Docker Certified Associate (DCA) Certification Training Course".This section explains build, manage, and...
Curated Video
Docker Certified Associate Certification Training Course - Docker Content Trust (DCT)
This video explains Docker Content Trust (DCT). This clip is from the chapter "Docker Security" of the series "Docker Certified Associate (DCA) Certification Training Course".This section explains Docker security.
Bill Carmody
Ethical Visuals
"The use of visual media should neither intentionally distort the integrity of a message nor promote a false impression or interpretation, which, as a whole, impacts to the credibility of the author." To have an ethical visual, you must...
TLDR News
Britain Scraps the Northern Ireland Protocol? - TLDR News
Northern Ireland has always been a difficult subject when it comes to Brexit, and as the issue was never really solved the problem of the Island of Ireland has re-emerged with Johnson now threatening some radical action in order to solve...