Instructional Video4:12
The Business Professor

How to Calculate Capitalization_

Higher Ed
How do you calculate a business's capitalization? Market capitalization refers to how much a company is worth as determined by the stock market. It is defined as the total market value of all outstanding shares. To calculate a company's...
Instructional Video4:00
The Business Professor

Excess Earnings Method - Business Valuation

Higher Ed
What is the Excess Earnings Method of Business Valuation? The excess earnings method (also called the “formula” method) basically values a company in two pieces – the tangible value and the intangible (or “goodwill”) value. The tangible...
Instructional Video2:38
The Business Professor

Economic Value Added - Business Valuation

Higher Ed
What is the Economic Value Added Method of business valuation? EVA is the incremental difference in the rate of return (RoR) over a company's cost of capital. Essentially, it is used to measure the value a company generates from funds...
Instructional Video4:28
The Business Professor

Bankruptcy - Business Exit

Higher Ed
How can Bankruptcy be an option for a Business Exit? Bankruptcy is an extreme exit strategy that uses a legal method for closing a business and paying off creditors when a business is failing and the debts are substantially greater than...
Instructional Video8:53
The Business Professor

Steps in Selling a Business

Higher Ed
What are the Steps in Selling a Business?
Instructional Video1:00
One Minute History

171 - FDIC - One Minute History

12th - Higher Ed
The Federal Deposit Insurance Corporation or FDIC, was created in 1933 to restore confidence after excessive bank failures during the Great depression. The FDIC does not cover investments such as stocks or bonds but it does insure bank...
Instructional Video2:28
Curated Video

Tangible and Intangible Assets

3rd - Higher Ed
Tangible and Intangible Assets defines and identifies examples of tangible and intangible assets.
Instructional Video5:56
Curated Video

Asset Settings and Customization in Doodly

12th - Higher Ed
Asset Settings and Customization in Doodly
Instructional Video3:52
Curated Video

Video Settings and Transitions in Doodly

12th - Higher Ed
Video Settings and Transitions in Doodly
Instructional Video4:39
Curated Video

Exploring the Asset Panel and Customizing Elements in Doodly

12th - Higher Ed
Exploring the Asset Panel and Customizing Elements in Doodly
Instructional Video3:13
Curated Video

Tools to Do a Job

3rd - Higher Ed
“Tools to Do a Job” explains tangible assets and gives examples of the best tools used to complete specific tasks.
Instructional Video16:20
Economics Explained

This One Country Doesn't Have an Inflation Problem

9th - Higher Ed
In this video we help you to be more knowledgeable about inflation by looking at countries, most notably Switzerland, that have bucked the global trend in 2022 by reporting tame inflation numbers. We look into what Switzerland did right...
Instructional Video11:12
Curated Video

Introduction to IT and Cybersecurity: IT Control Frameworks (ISO, NIST)

Higher Ed
Part 10/16 of Introduction to IT and Cybersecurity series: This video discusses the major IT control frameworks and their use in maintaining the effectiveness and efficiency of operations, financial governance, reporting, and compliance...
Instructional Video5:33
Curated Video

Threat Modeling

Higher Ed
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized. In this video, you will learn about...
Instructional Video3:36
Curated Video

Risk Identification

Higher Ed
Risk identification is the process of documenting any risks that could keep an organization or program from reaching its objective. It's the first step in the risk management process, which is designed to help companies understand and...
Instructional Video8:42
Curated Video

Threats and Vulnerabilities

Higher Ed
In cybersecurity, a vulnerability is a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system. After exploiting a vulnerability, a cyberattack can run malicious code, install malware and even...
Instructional Video20:57
Curated Video

Ultimate ASP.NET 5 Web API Development Guide - Project Architectural Changes

Higher Ed
This video is about project architectural changes. This clip is from the chapter "Value-Added Features" of the series "Ultimate ASP.NET Core Web API Development Guide".This section focuses on the value-added features.
Instructional Video7:44
Curated Video

Risk Assessment Approaches

Higher Ed
The tutorial introduces two main types of risk assessment methodologies: quantitative and qualitative
Instructional Video5:08
Curated Video

ISO 27002-2022 Control Examples

Higher Ed
In this video, we will be exploring ISO 27002-2022 control examples. ISO 27002-2022 is a globally recognized standard for information security management systems. It provides a framework for organizations to establish, implement,...
Instructional Video1:16
Curated Video

Planning Domain (ISO 27001)

Higher Ed
In this video, we will be discussing the Planning Domain of ISO 27001, which is a globally recognized standard for information security management. The Planning Domain is the first step in implementing an effective information security...
Instructional Video6:04
Curated Video

Why organizations need an ISMS (ISO 27001)

Higher Ed
In this video, we will explore the importance of an Information Security Management System (ISMS) for organizations. Specifically, we will focus on the ISO 27001 standard, which outlines the requirements for an effective ISMS. We will...
Instructional Video2:56
Curated Video

Changes in Annex A 27001 (merged, deleted, and new controls)

Higher Ed
In this video, we will be discussing the changes that have been made to Annex A 27001. Annex A 27001 is a set of controls that organizations can implement to ensure the security of their information. Recently, there have been some...
Instructional Video2:22
Curated Video

Information security for use of cloud services control

Higher Ed
In this video, we will be discussing the importance of information security when using cloud services. With the rise of cloud computing, it is crucial to understand the potential risks and how to mitigate them. We will cover topics such...
Instructional Video2:56
Curated Video

Threat intelligence control

Higher Ed
In this video, we will be discussing the importance of threat intelligence control in today's digital landscape. With cyber threats becoming more sophisticated and frequent, it is crucial for organizations to have a proactive approach to...