Instructional Video2:11
Global Ethics Solutions

Bribery and Corruption Awareness - Avoiding and Refusing Bribes

Higher Ed
Understand that bribery can present itself in both obvious and subtle ways and can result in serious legal implications for both you and your company. This section of the full course explains the basics of how to refuse a bribe, protect...
Instructional Video13:41
Curated Video

Web Security: Common Vulnerabilities And Their Mitigation - Security and its building blocks

Higher Ed
What Is Security?: Security and its building blocks
r/>
This clip is from the chapter "What Is Security?" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, you will learn how common...
Instructional Video4:26
Packt

CompTIA Network+ Certification N10-007: The Total Course - Making Transmission Control Protocol/Internet Protocol (TCP/IP) Secure

Higher Ed
This video shows how to secure TCP/IP to create a strong security program. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA Network+ Certification N10-007: The Total...
Instructional Video1:48
Global Ethics Solutions

賄賂與腐敗意識第1部分 - 了解賄賂與腐敗 (Understanding Bribery & Corruption)

Higher Ed
贿赂和腐败是严肃的事情。从高级官员的严重腐败到日常不诚实的生意,腐败和贿赂可能对您的组织造成毁灭性的影响,不应该容忍。整个课程的此部分包括实用信息,可帮助个人了解企业中的核心贿赂和腐败问题。
Instructional Video2:47
Global Ethics Solutions

Understanding Confidentiality and Intellectual Property Ethical Issues and Problems

Higher Ed
This presentation helps viewers understand confidential information, trade secrets, and intellectual property as well as the costs of protecting intellectual property.
Instructional Video2:07
Global Ethics Solutions

贿赂与腐败意识第二部分 - 避免和拒绝贿赂(Avoiding and Refusing Bribes)

Higher Ed
理解贿赂会以明显和微妙的方式表现出来,并可能对您和您的公司造成严重的法律影响。整个课程的这一部分介绍了如何拒绝贿赂,保护您的声誉以及完全避免潜在情况的基本知识。
Instructional Video9:15
Curated Video

Managing Data’s Lifecycle

6th - Higher Ed
People often confuse data management with technology management because they only see data in their application. In watching this program, viewers will come to understand that data can be separate from applications and has a...
Instructional Video8:51
Curated Video

Salesforce Platform App Builder Certification Training - Workflow

Higher Ed
This video introduces you to Workflow.<br<br/>/>

This clip is from the chapter "Process Automation" of the series "Salesforce Platform App Builder Certification Training".This section explains the process automation.
Instructional Video2:33
Curated Video

Docker Certified Associate Certification Training Course - Validating Docker Image

Higher Ed
This video explains validating Docker image.
<
br/>
This clip is from the chapter "Build, Manage, and Distribute Images" of the series "Docker Certified Associate (DCA) Certification Training Course".This section explains build,...
Instructional Video3:10
Curated Video

Docker Certified Associate Certification Training Course - Docker Content Trust (DCT)

Higher Ed
This video explains Docker Content Trust (DCT).<br<br/>/>

This clip is from the chapter "Docker Security" of the series "Docker Certified Associate (DCA) Certification Training Course".This section explains Docker security.
Instructional Video2:00
Bill Carmody

Ethical Visuals

Higher Ed
"The use of visual media should neither intentionally distort the integrity of a message nor promote a false impression or interpretation, which, as a whole, impacts to the credibility of the author." To have an ethical visual, you must...
Instructional Video10:24
TLDR News

Britain Scraps the Northern Ireland Protocol? - TLDR News

12th - Higher Ed
Northern Ireland has always been a difficult subject when it comes to Brexit, and as the issue was never really solved the problem of the Island of Ireland has re-emerged with Johnson now threatening some radical action in order to solve...
Instructional Video19:53
The Wall Street Journal

Transformation Is Personal

Higher Ed
Every CEO is dealing with multiple layers of change and disruption, whether in their industry, organization, team, role, or personal life. As senior leaders and human beings, how can they survive and even thrive in that fast-changing...
Instructional Video2:27
Packt

Explain the privacy issues raised by artificial intelligence systems : Confidentiality, Availability, and Integrity Attacks

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats.



It’s important to...
Instructional Video3:05
Catalyst University

Cremasteric Reflex | Procedure & Results Interpretation

Higher Ed
In this video, I explain the cremasteric reflex. More specifically, we discuss the reflex arc and how to determine whether or not the reflex is present/normal or abnormal.
Instructional Video15:45
Curated Video

CISSP®- The CIA Triad - Part 1 - Confidentiality, Integrity, and Availability

Higher Ed
This is the first part of a two-part video that explains the CIA triad.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Instructional Video1:11
XKA Digital

Risk only money

Higher Ed
John Wagner is Director at Cycas Hospitality and has over 30 years' hotels sector experience with extensive knowledge of European hotel marketing, operations and development having lived and worked in Paris, Prague, London and...
Instructional Video2:18
Global Ethics Solutions

Working Sober! Signs and Symptoms of Substance Abuse

Higher Ed
This course covers the signs and symptoms of substance abuse. Topics include the cost of substance abuse, signs of drug and alcohol abuse, impact of abuse, and how to understand addiction. This is one part of a four-part basic drug &...
Instructional Video3:35
Global Ethics Solutions

Your Responsibility for Confidential and Intellectual Property

Higher Ed
This presentation helps employees understand their responsibility for protecting confidential information and intellectual property. It covers the various kinds of intellectual property, common copyright exceptions and limitations, and...
Instructional Video7:16
Communication Coach Alex Lyon

Trait Theory of Leadership

Higher Ed
We'll look at the Trait Theory of Leadership that identifies the top 5 traits leaders possess and some examples and characteristics of each trait. Trait leadership theory is a common approach across organizational behavior, management...
Instructional Video12:59
Curated Video

CISSP®- The CIA Triad - Part 2 - Confidentiality, Integrity, and Availability

Higher Ed
This is the second part of a two-part video that explains the CIA triad.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Instructional Video8:23
TLDR News

The Northern Ireland Protocol Fight Explained - TLDR News

12th - Higher Ed
This week the UK published a paper that outlined how they want to change the Northern Ireland Protocol, an element of the Brexit Deal they signed only 18 months ago. So in this video we explain what the UK want to change about Northern...
Instructional Video3:09
Global Ethics Solutions

Ethics in the Workplace - Part 1: Character and Integrity Principles in the Workplace

Higher Ed
Your character is who you are and it matters both on and off the job. Your ethics in the workplace depends on having strong character and integrity that will weather the ethical storms. This section of the full course helps define and...
Instructional Video5:45
History Hit

Africa, The Unknown History of Humankind: Africans and pop culture

12th - Higher Ed
What are Gus Casely-Hayford's views of Africans in popular culture? How does "word", "symbol", and "song" work together and what makes them so powerful?<br/>
Africa, The Unknown History of Humankind, Part 5