Hi, what do you want to do?
Global Ethics Solutions
Bribery and Corruption Awareness - Avoiding and Refusing Bribes
Understand that bribery can present itself in both obvious and subtle ways and can result in serious legal implications for both you and your company. This section of the full course explains the basics of how to refuse a bribe, protect...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Security and its building blocks
What Is Security?: Security and its building blocks
r/>
This clip is from the chapter "What Is Security?" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, you will learn how common...
r/>
This clip is from the chapter "What Is Security?" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, you will learn how common...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Making Transmission Control Protocol/Internet Protocol (TCP/IP) Secure
This video shows how to secure TCP/IP to create a strong security program. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA Network+ Certification N10-007: The Total...
Global Ethics Solutions
賄賂與腐敗意識第1部分 - 了解賄賂與腐敗 (Understanding Bribery & Corruption)
贿赂和腐败是严肃的事情。从高级官员的严重腐败到日常不诚实的生意,腐败和贿赂可能对您的组织造成毁灭性的影响,不应该容忍。整个课程的此部分包括实用信息,可帮助个人了解企业中的核心贿赂和腐败问题。
Global Ethics Solutions
Understanding Confidentiality and Intellectual Property Ethical Issues and Problems
This presentation helps viewers understand confidential information, trade secrets, and intellectual property as well as the costs of protecting intellectual property.
Global Ethics Solutions
贿赂与腐败意识第二部分 - 避免和拒绝贿赂(Avoiding and Refusing Bribes)
理解贿赂会以明显和微妙的方式表现出来,并可能对您和您的公司造成严重的法律影响。整个课程的这一部分介绍了如何拒绝贿赂,保护您的声誉以及完全避免潜在情况的基本知识。
Curated Video
Managing Data’s Lifecycle
People often confuse data management with technology management because they only see data in their application. In watching this program, viewers will come to understand that data can be separate from applications and has a...
Curated Video
Salesforce Platform App Builder Certification Training - Workflow
This video introduces you to Workflow.<br<br/>/>
This clip is from the chapter "Process Automation" of the series "Salesforce Platform App Builder Certification Training".This section explains the process automation.
This clip is from the chapter "Process Automation" of the series "Salesforce Platform App Builder Certification Training".This section explains the process automation.
Curated Video
Docker Certified Associate Certification Training Course - Validating Docker Image
This video explains validating Docker image.
<
br/>
This clip is from the chapter "Build, Manage, and Distribute Images" of the series "Docker Certified Associate (DCA) Certification Training Course".This section explains build,...
<
br/>
This clip is from the chapter "Build, Manage, and Distribute Images" of the series "Docker Certified Associate (DCA) Certification Training Course".This section explains build,...
Curated Video
Docker Certified Associate Certification Training Course - Docker Content Trust (DCT)
This video explains Docker Content Trust (DCT).<br<br/>/>
This clip is from the chapter "Docker Security" of the series "Docker Certified Associate (DCA) Certification Training Course".This section explains Docker security.
This clip is from the chapter "Docker Security" of the series "Docker Certified Associate (DCA) Certification Training Course".This section explains Docker security.
Bill Carmody
Ethical Visuals
"The use of visual media should neither intentionally distort the integrity of a message nor promote a false impression or interpretation, which, as a whole, impacts to the credibility of the author." To have an ethical visual, you must...
TLDR News
Britain Scraps the Northern Ireland Protocol? - TLDR News
Northern Ireland has always been a difficult subject when it comes to Brexit, and as the issue was never really solved the problem of the Island of Ireland has re-emerged with Johnson now threatening some radical action in order to solve...
The Wall Street Journal
Transformation Is Personal
Every CEO is dealing with multiple layers of change and disruption, whether in their industry, organization, team, role, or personal life. As senior leaders and human beings, how can they survive and even thrive in that fast-changing...
Packt
Explain the privacy issues raised by artificial intelligence systems : Confidentiality, Availability, and Integrity Attacks
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats.
It’s important to...
It’s important to...
Catalyst University
Cremasteric Reflex | Procedure & Results Interpretation
In this video, I explain the cremasteric reflex. More specifically, we discuss the reflex arc and how to determine whether or not the reflex is present/normal or abnormal.
Curated Video
CISSP®- The CIA Triad - Part 1 - Confidentiality, Integrity, and Availability
This is the first part of a two-part video that explains the CIA triad.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
XKA Digital
Risk only money
John Wagner is Director at Cycas Hospitality and has over 30 years' hotels sector experience with extensive knowledge of European hotel marketing, operations and development having lived and worked in Paris, Prague, London and...
Global Ethics Solutions
Working Sober! Signs and Symptoms of Substance Abuse
This course covers the signs and symptoms of substance abuse. Topics include the cost of substance abuse, signs of drug and alcohol abuse, impact of abuse, and how to understand addiction. This is one part of a four-part basic drug &...
Global Ethics Solutions
Your Responsibility for Confidential and Intellectual Property
This presentation helps employees understand their responsibility for protecting confidential information and intellectual property. It covers the various kinds of intellectual property, common copyright exceptions and limitations, and...
Communication Coach Alex Lyon
Trait Theory of Leadership
We'll look at the Trait Theory of Leadership that identifies the top 5 traits leaders possess and some examples and characteristics of each trait. Trait leadership theory is a common approach across organizational behavior, management...
Curated Video
CISSP®- The CIA Triad - Part 2 - Confidentiality, Integrity, and Availability
This is the second part of a two-part video that explains the CIA triad.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
TLDR News
The Northern Ireland Protocol Fight Explained - TLDR News
This week the UK published a paper that outlined how they want to change the Northern Ireland Protocol, an element of the Brexit Deal they signed only 18 months ago. So in this video we explain what the UK want to change about Northern...
Global Ethics Solutions
Ethics in the Workplace - Part 1: Character and Integrity Principles in the Workplace
Your character is who you are and it matters both on and off the job. Your ethics in the workplace depends on having strong character and integrity that will weather the ethical storms. This section of the full course helps define and...
History Hit
Africa, The Unknown History of Humankind: Africans and pop culture
What are Gus Casely-Hayford's views of Africans in popular culture? How does "word", "symbol", and "song" work together and what makes them so powerful?<br/>
Africa, The Unknown History of Humankind, Part 5
Africa, The Unknown History of Humankind, Part 5