Browse most popular courses
-
Wow your stakeholders with an Excel extreme makeover1m
Wow your stakeholders with an Excel extreme makeover
From: Excel Spreadsheet Design: Extreme Makeover
Video
-
Slither into advanced core Python code challenges1m
Slither into advanced core Python code challenges
From: Level Up: Advanced Python
Video
-
Course overview1m
Course overview
From: Agile Project Management with Jira Cloud: 2 Lean and Agile Processes
Video
-
Stay sharp in Microsoft Teams45s
Stay sharp in Microsoft Teams
From: Microsoft Teams Quick Tips (2023)
Video
-
Welcome and introduction51s
Welcome and introduction
From: Construction Management: Planning and Scheduling
Video
-
Scan wireless networks4m
Scan wireless networks
From: Performing a Technical Security Audit and Assessment
Video
-
Select and customize techniques2m
Select and customize techniques
From: Performing a Technical Security Audit and Assessment
Video
-
Select tools and resources1m
Select tools and resources
From: Performing a Technical Security Audit and Assessment
Video
-
Solution: Write a security assessment methodology58s
Solution: Write a security assessment methodology
From: Performing a Technical Security Audit and Assessment
Video
-
Conduct ruleset reviews2m
Conduct ruleset reviews
From: Performing a Technical Security Audit and Assessment
Video
-
Penetration testing tool demo2m
Penetration testing tool demo
From: Performing a Technical Security Audit and Assessment
Video
-
Password cracking tool demo3m
Password cracking tool demo
From: Performing a Technical Security Audit and Assessment
Video
-
Develop the assessment plan1m
Develop the assessment plan
From: Performing a Technical Security Audit and Assessment
Video
-
Baseline skill sets target identification and analysis2m
Baseline skill sets target identification and analysis
From: Performing a Technical Security Audit and Assessment
Video
-
Challenge: Write a security assessment methodology1m
Challenge: Write a security assessment methodology
From: Performing a Technical Security Audit and Assessment
Video
-
Prioritize and schedule the assessments2m
Prioritize and schedule the assessments
From: Performing a Technical Security Audit and Assessment
Video
-
Overview of technical security assessment techniques1m
Overview of technical security assessment techniques
From: Performing a Technical Security Audit and Assessment
Video
-
Recommend mitigation actions1m
Recommend mitigation actions
From: Performing a Technical Security Audit and Assessment
Video
-
Challenge: Pick the right technical security assessment1m
Challenge: Pick the right technical security assessment
From: Performing a Technical Security Audit and Assessment
Video
-
Conduct documentation reviews1m
Conduct documentation reviews
From: Performing a Technical Security Audit and Assessment
Video
-
Does rapport really matter?1m
Does rapport really matter?
From: Building Rapport with Customers (2022)
Video
-
Pick from the available songs5m
Pick from the available songs
From: Excel Power User Challenge
Video
-
Vulnerability scanning tool demo3m
Vulnerability scanning tool demo
From: Performing a Technical Security Audit and Assessment
Video
-
Solution: Recommend mitigation actions1m
Solution: Recommend mitigation actions
From: Performing a Technical Security Audit and Assessment
Video
-
Who this course is for51s
Who this course is for
From: Performing a Technical Security Audit and Assessment
Video
-
Select your testing viewpoint4m
Select your testing viewpoint
From: Performing a Technical Security Audit and Assessment
Video
-
Select the location1m
Select the location
From: Performing a Technical Security Audit and Assessment
Video
-
Legal considerations1m
Legal considerations
From: Performing a Technical Security Audit and Assessment
Video
-
Conduct log reviews2m
Conduct log reviews
From: Performing a Technical Security Audit and Assessment
Video
-
Conduct the analysis2m
Conduct the analysis
From: Performing a Technical Security Audit and Assessment
Video
-
Conduct network sniffing1m
Conduct network sniffing
From: Performing a Technical Security Audit and Assessment
Video
-
Scan for vulnerabilities3m
Scan for vulnerabilities
From: Performing a Technical Security Audit and Assessment
Video
-
Challenge: Install and run Nmap52s
Challenge: Install and run Nmap
From: Performing a Technical Security Audit and Assessment
Video
-
Solution: Pick the right reviews2m
Solution: Pick the right reviews
From: Performing a Technical Security Audit and Assessment
Video
-
Challenge: Pick the right reviews1m
Challenge: Pick the right reviews
From: Performing a Technical Security Audit and Assessment
Video
-
What are technical security assessments?1m
What are technical security assessments?
From: Performing a Technical Security Audit and Assessment
Video
-
Embrace non-dual thinking59s
Embrace non-dual thinking
From: Master of Change: How to Thrive in Unstable Times
Video
-
Update your expectations to match reality1m
Update your expectations to match reality
From: Master of Change: How to Thrive in Unstable Times
Video
-
The reality of change1m
The reality of change
From: Embracing Unexpected Change (with Audio Descriptions)
Video
-
Communicate effectively1m
Communicate effectively
From: Building Business Acumen for Aspiring Professionals
Video
-
Define revenue and the bottom line2m
Define revenue and the bottom line
From: Building Business Acumen for Aspiring Professionals
Video
-
Identify your company's niche2m
Identify your company's niche
From: Building Business Acumen for Aspiring Professionals
Video
-
Assess your career options2m
Assess your career options
From: Building Business Acumen for Aspiring Professionals
Video
-
Demonstrate your leadership2m
Demonstrate your leadership
From: Building Business Acumen for Aspiring Professionals
Video
-
Understand the big picture2m
Understand the big picture
From: Building Business Acumen for Aspiring Professionals
Video