Instructional Video4:40
Curated Video

What is a RAG Report? ...or a Traffic Light Report?

10th - Higher Ed
RAG Report, or Traffic Light Report. It is widely used by project managers and it stands for Red Amber Green. But what is a RAG Report?
Instructional Video4:51
Curated Video

What is Risk Tolerance? Project Management in Under 5

10th - Higher Ed
No one would tolerate a project that is too risky! So, what is risk tolerance?
Instructional Video4:33
Curated Video

What is Issue Management? Project Management in Under 5

10th - Higher Ed
Issues arise all the time on projects. So, what is Issue Management?
Instructional Video10:50
Curated Video

The Role of a Project Manager: Project Management Responsibilities

10th - Higher Ed
The role of a Project Manager is a big one. There's a lot to do, just to keep on top of the basics. But have you ever thought of what is included? Have you ever asked yourself, 'What do Project managers actually do?' In this video, Mike...
Instructional Video10:20
Curated Video

Risk Management - 5 Tips to Do it Right

10th - Higher Ed
Shift Happens! Things go wrong. So, as a project manager, you need to be able to manage risks.
Instructional Video10:49
Curated Video

What to Put in Your Risk Register (Risk Log)

10th - Higher Ed
Risk Management is one of the core skills of project management. And your Risk Register - or Risk Log - is the primary tool you'll use. Risk registers come in many forms, but they all have two principal purposes: - creating transparency...
Instructional Video11:08
Curated Video

Risk Management for Cyber Security Managers - Business Continuity and Disaster Recovery Plans

Higher Ed
This video elaborates on how an organization can develop a plan for continuity or recovery when a cyber-attack occurs.
Instructional Video3:07
Curated Video

Risk Management for Cyber Security Managers - Risk Acceptance and Risk Rejection

Higher Ed
In this lesson, you will learn the options when we cannot mitigate risk, transfer risk, or avoid a hazard.
Instructional Video3:32
Curated Video

Risk Management for Cyber Security Managers - Risk Avoidance

Higher Ed
This is the second way we can respond to a certain kind of risk and learn how to avoid risks at all costs.
Instructional Video3:34
Curated Video

Risk Management for Cyber Security Managers - Risk Management Processes

Higher Ed
In this lesson, we will discuss the general cyber risk management cycle.
Instructional Video5:16
Curated Video

Risk Management for Cyber Security Managers - Risk Identification

Higher Ed
We will look at the first step in cyber risk management: cyber risk identification.
Instructional Video7:12
Curated Video

Risk Management for Cyber Security Managers - Types of Risks

Higher Ed
In this lesson, we will look at the different risks that a company, an organization, or a system might face from a business perspective.
Instructional Video3:36
Curated Video

Risk Management for Cyber Security Managers - What Is Risk?

Higher Ed
This video explains what constitutes a risk in terms of a business, a functioning system, or all kinds of assets.
Instructional Video2:35
Curated Video

Risk Management for Cyber Security Managers - What Is Vulnerability Management?

Higher Ed
This lesson will discuss identifying, assessing, treating, and reporting security vulnerabilities.
Instructional Video1:22
Curated Video

Risk Management for Cyber Security Managers - Section Preview-3

Higher Ed
In this video, you will learn more about the different vulnerabilities an organization can face and how to eliminate them as much as possible.
Instructional Video4:41
Curated Video

Risk Management for Cyber Security Managers - Third-Party Cyber Risk Management

Higher Ed
This video elaborates on the various options for transferring or outsourcing risk management to a third party or a vendor.
Instructional Video1:52
Curated Video

Risk Management for Cyber Security Managers - Risk Monitoring

Higher Ed
In the final video of this section, we will discuss monitoring risks, how we can go about watching them, and if we can keep a close tab on risks with this process.
Instructional Video0:46
Curated Video

Risk Management for Cyber Security Managers - Section Preview-1

Higher Ed
This video briefly outlines what you will learn in this section.
Instructional Video3:14
Curated Video

Risk Management for Cyber Security Managers - Risk Management as a Profession

Higher Ed
In this video, the author discusses the pros and cons of risk management as a profession and how to go about it for those interested in this.
Instructional Video2:09
Curated Video

Risk Management for Cyber Security Managers - Introduction to the Course

Higher Ed
This brief introductory video overviews the course and briefly outlines cyber risk management concepts.
Instructional Video13:06
Curated Video

What is the Riskiest Region in the US as the Climate Changes

9th - Higher Ed
Climate Change is increasing the frequency and severity of natural disasters all around the world. And in the United States, more and more people seem to be moving to the places that are projected to be most impacted by climate change,...
Instructional Video2:49
Curated Video

Genetic Modification

6th - 12th
Genetic Modification allows scientists to manipulate the genetic information of cells, even swapping characteristics between different species. But it is a process which has caused a lot of controversy. Biology - Cells And DNA - Learning...
Instructional Video3:01
Curated Video

Frontier Oil Exploration

6th - 12th
Dwindling oil supplies mean exploration drilling is moving to far-flung reaches of the Earth. What difficulties does this pose, and what could the environmental impacts be? Earth Science - Earth's Resources - Learning Points. In the USA,...
Instructional Video3:21
Curated Video

Natural Versus Artificial

6th - 12th
Are all artificial chemicals bad for our health? Revealing the health implications of natural and artificial chemicals, and the natural chemicals which can be deadly. Chemistry - Chemical Industries - Learning Points. All matter consists...