The Business Professor
How to Calculate Capitalization_
How do you calculate a business's capitalization? Market capitalization refers to how much a company is worth as determined by the stock market. It is defined as the total market value of all outstanding shares. To calculate a company's...
The Business Professor
Excess Earnings Method - Business Valuation
What is the Excess Earnings Method of Business Valuation? The excess earnings method (also called the “formula” method) basically values a company in two pieces – the tangible value and the intangible (or “goodwill”) value. The tangible...
The Business Professor
Economic Value Added - Business Valuation
What is the Economic Value Added Method of business valuation? EVA is the incremental difference in the rate of return (RoR) over a company's cost of capital. Essentially, it is used to measure the value a company generates from funds...
The Business Professor
Bankruptcy - Business Exit
How can Bankruptcy be an option for a Business Exit? Bankruptcy is an extreme exit strategy that uses a legal method for closing a business and paying off creditors when a business is failing and the debts are substantially greater than...
One Minute History
171 - FDIC - One Minute History
The Federal Deposit Insurance Corporation or FDIC, was created in 1933 to restore confidence after excessive bank failures during the Great depression. The FDIC does not cover investments such as stocks or bonds but it does insure bank...
Curated Video
Tangible and Intangible Assets
Tangible and Intangible Assets defines and identifies examples of tangible and intangible assets.
Curated Video
Exploring the Asset Panel and Customizing Elements in Doodly
Exploring the Asset Panel and Customizing Elements in Doodly
Curated Video
Tools to Do a Job
“Tools to Do a Job” explains tangible assets and gives examples of the best tools used to complete specific tasks.
Economics Explained
This One Country Doesn't Have an Inflation Problem
In this video we help you to be more knowledgeable about inflation by looking at countries, most notably Switzerland, that have bucked the global trend in 2022 by reporting tame inflation numbers. We look into what Switzerland did right...
Curated Video
Introduction to IT and Cybersecurity: IT Control Frameworks (ISO, NIST)
Part 10/16 of Introduction to IT and Cybersecurity series: This video discusses the major IT control frameworks and their use in maintaining the effectiveness and efficiency of operations, financial governance, reporting, and compliance...
Curated Video
Threat Modeling
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized. In this video, you will learn about...
Curated Video
Risk Identification
Risk identification is the process of documenting any risks that could keep an organization or program from reaching its objective. It's the first step in the risk management process, which is designed to help companies understand and...
Curated Video
Threats and Vulnerabilities
In cybersecurity, a vulnerability is a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system. After exploiting a vulnerability, a cyberattack can run malicious code, install malware and even...
Curated Video
Ultimate ASP.NET 5 Web API Development Guide - Project Architectural Changes
This video is about project architectural changes. This clip is from the chapter "Value-Added Features" of the series "Ultimate ASP.NET Core Web API Development Guide".This section focuses on the value-added features.
Curated Video
Risk Assessment Approaches
The tutorial introduces two main types of risk assessment methodologies: quantitative and qualitative
Curated Video
ISO 27002-2022 Control Examples
In this video, we will be exploring ISO 27002-2022 control examples. ISO 27002-2022 is a globally recognized standard for information security management systems. It provides a framework for organizations to establish, implement,...
Curated Video
Planning Domain (ISO 27001)
In this video, we will be discussing the Planning Domain of ISO 27001, which is a globally recognized standard for information security management. The Planning Domain is the first step in implementing an effective information security...
Curated Video
Why organizations need an ISMS (ISO 27001)
In this video, we will explore the importance of an Information Security Management System (ISMS) for organizations. Specifically, we will focus on the ISO 27001 standard, which outlines the requirements for an effective ISMS. We will...
Curated Video
Changes in Annex A 27001 (merged, deleted, and new controls)
In this video, we will be discussing the changes that have been made to Annex A 27001. Annex A 27001 is a set of controls that organizations can implement to ensure the security of their information. Recently, there have been some...
Curated Video
Information security for use of cloud services control
In this video, we will be discussing the importance of information security when using cloud services. With the rise of cloud computing, it is crucial to understand the potential risks and how to mitigate them. We will cover topics such...
Curated Video
Threat intelligence control
In this video, we will be discussing the importance of threat intelligence control in today's digital landscape. With cyber threats becoming more sophisticated and frequent, it is crucial for organizations to have a proactive approach to...