Browse most popular courses
-
3m
Prevention technique #1: Repeatable hardening
From: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Video
-
3m
Example #1: 2020 SolarWinds data breach
From: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Video
-
2m
Prevention technique #2: Continuous inventory management
From: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Video
-
2m
Example #2: State of Pentesting Report
From: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Video
-
1m
2021 OWASP Top 10
From: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Video
-
2m
Prevention technique #3: Configuration review
From: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Video
-
55s
Explore more of the OWASP Top 10
From: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Video
-
1m
What are vulnerable and outdated components?
From: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Video
-
2m
Real-world example #1: Equifax breach 2017
From: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Video
-
2m
Prevention technique #3: Leverage virtual patching
From: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Video
-
3m
Prevention technique #2: Minimal platform
From: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Video
-
1m
Real-world example #2: Target breach 2013
From: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Video
-
1m
Prevention technique #1: Remove unnecessary features
From: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Video
-
3m
What is security misconfiguration?
From: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Video
-
43s
OWASP Top 10 series
From: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Video
-
49s
Why animations?
From: CSS: Enhancing Interfaces with Animation
Video
-
54s
Working with images in CSS
From: CSS: Images
Video
-
1m
Collaborating with Microsoft 365
From: Collaborating with Microsoft 365
Video
-
1m
Managing a customer contact center
From: Managing a Customer Contact Center
Video
-
35s
Azure certification for advancement
From: Exam Prep: Microsoft Azure Fundamentals (AZ-900) (2020)
Video
-
4m
The secret to excellent requirements
From: Business Analysis Techniques for Business Transformation
Video
-
4m
How to apply a balanced business scorecard to your project
From: Business Analysis Techniques for Business Transformation
Video
-
4m
Business process optimization for effective transformation
From: Business Analysis Techniques for Business Transformation
Video
-
2m
The essence of data visualization
From: Learning Data Visualization
Video
-
4m
Critical success factors and key performance indicators
From: Business Analysis Techniques for Business Transformation
Video
-
4m
Analyze the technical capabilities of the organization
From: Business Analysis Techniques for Business Transformation
Video
-
1m
Understanding cultural competence
From: Cultivating Cultural Competence and Inclusion
Video
-
56s
Learn tips for mastering Microsoft Teams
From: Microsoft Teams Tips Weekly
Video
-
1m
Driving urgency around inclusion
From: Leading Inclusive Teams
Video
-
3m
Five habits of highly effective transformation BAs
From: Business Analysis Techniques for Business Transformation
Video
-
1m
Reposition for the future
From: Business Analysis Techniques for Business Transformation
Video
-
4m
Get to know your audience
From: Business Analysis Techniques for Business Transformation
Video
-
1m
Welcome
From: Taking Charge of Your Career
Video
-
2m
Improve in-meeting video with brightness and soft focus filters
From: Microsoft Teams Tips Weekly
Video
-
4m
Balanced business scorecard for performance management
From: Business Analysis Techniques for Business Transformation
Video
-
3m
Explore your project and business environment
From: Business Analysis Techniques for Business Transformation
Video
-
3m
Business process analysis the right way
From: Business Analysis Techniques for Business Transformation
Video
-
47s
Importance of Azure machine learning development
From: Azure Machine Learning Development: Part 2
Video
-
1m
Welcome to better virtual meetings
From: Leading Virtual Meetings
Video
-
41m
Business Analysis Techniques for Business Transformation
By: Christina Charenkova
Course
-
33m
OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
By: Caroline Wong
Course
-
46s
Developing authentic charisma
From: Nano Tips for Developing Magnetic Charisma with Shadé Zahrai
Video
-
7m
Nano Tips for Developing Magnetic Charisma with Shadé Zahrai
By: Shadé Zahrai
Course
-
11m
Nano Tips for Communicating with Confidence with Selena Rezvani
By: Selena Rezvani
Course
-
37s
Words that raise your stature
From: Nano Tips for Communicating with Confidence with Selena Rezvani
Video
-
51s
Creating a happiness mindset
From: Nano Tips for Finding Happiness Through Empathy with Shadé Zahrai
Video
-
25s
What recruiters won't tell you about your salary
From: Nano Tips for Negotiating Your Salary with Sho Dewan
Video
-
7m
Nano Tips for Finding Happiness Through Empathy with Shadé Zahrai
By: Shadé Zahrai
Course
-
7m
Nano Tips to Stop Overthinking with Shadé Zahrai
By: Shadé Zahrai
Course
-
40s
Getting into a positive mindset
From: Nano Tips to Stop Overthinking with Shadé Zahrai
Video