Browse most popular courses
-
Self-stigma around mental health10m
Self-stigma around mental health
From: Dismantling Stigma: A Mental Health Framework for HR and People Leaders
Video
-
Barriers caused by stigma6m
Barriers caused by stigma
From: Dismantling Stigma: A Mental Health Framework for HR and People Leaders
Video
-
The differences between overt and hidden stigmas6m
The differences between overt and hidden stigmas
From: Dismantling Stigma: A Mental Health Framework for HR and People Leaders
Video
-
Next steps1m
Next steps
From: Dismantling Stigma: A Mental Health Framework for HR and People Leaders
Video
-
HR framework and tools for combatting stigma at work15m
HR framework and tools for combatting stigma at work
From: Dismantling Stigma: A Mental Health Framework for HR and People Leaders
Video
-
The importance of strategy49s
The importance of strategy
From: Software Testing Foundations: Test Strategy
Video
-
System design3m
System design
From: Software Testing Foundations: Integrating AI into the Quality Process
Video
-
Evaluation and updates3m
Evaluation and updates
From: Software Testing Foundations: Integrating AI into the Quality Process
Video
-
Integrating AI into the quality process55s
Integrating AI into the quality process
From: Software Testing Foundations: Integrating AI into the Quality Process
Video
-
Cases, suites, and management3m
Cases, suites, and management
From: Software Testing Foundations: Integrating AI into the Quality Process
Video
-
Next steps in integrating AI in your quality process54s
Next steps in integrating AI in your quality process
From: Software Testing Foundations: Integrating AI into the Quality Process
Video
-
Software Testing Foundations: Integrating AI into the Quality Process41m
Software Testing Foundations: Integrating AI into the Quality Process
By: Mike Fine
Course
-
What is a Microsoft intrusion detection system?2m
What is a Microsoft intrusion detection system?
From: Microsoft Azure: Security Monitoring and Threat Detection
Video
-
Examples of threats XDR can detect7m
Examples of threats XDR can detect
From: Microsoft Azure: Security Monitoring and Threat Detection
Video
-
Deploy a Microsoft Sentinel solution6m
Deploy a Microsoft Sentinel solution
From: Microsoft Azure: Security Monitoring and Threat Detection
Video
-
What you should know5m
What you should know
From: Microsoft Azure: Security Monitoring and Threat Detection
Video
-
Why use exception handling?59s
Why use exception handling?
From: ASP.NET Core: Exception Handling
Video
-
Privacy framework welcome59s
Privacy framework welcome
From: Implementing the NIST Privacy Framework
Video
-
Mental health stigma4m
Mental health stigma
From: Dismantling Stigma: A Mental Health Framework for HR and People Leaders
Video
-
Understanding the broader topic of mental health4m
Understanding the broader topic of mental health
From: Dismantling Stigma: A Mental Health Framework for HR and People Leaders
Video
-
Best practices of data visualization2m
Best practices of data visualization
From: Data Visualization: Best Practices
Video
-
Results management2m
Results management
From: Software Testing Foundations: Integrating AI into the Quality Process
Video
-
Using AI in your process3m
Using AI in your process
From: Software Testing Foundations: Integrating AI into the Quality Process
Video
-
Prepping manual and automated testing3m
Prepping manual and automated testing
From: Software Testing Foundations: Integrating AI into the Quality Process
Video
-
What you should know3m
What you should know
From: Software Testing Foundations: Integrating AI into the Quality Process
Video
-
TLS inspection configuration3m
TLS inspection configuration
From: Microsoft Azure: Security Monitoring and Threat Detection
Video
-
Ingest data into Log Analytics8m
Ingest data into Log Analytics
From: Microsoft Azure: Security Monitoring and Threat Detection
Video
-
Overview of MDE as IDS2m
Overview of MDE as IDS
From: Microsoft Azure: Security Monitoring and Threat Detection
Video
-
Configure analytics rules to detect threats7m
Configure analytics rules to detect threats
From: Microsoft Azure: Security Monitoring and Threat Detection
Video
-
Examples of IOCs3m
Examples of IOCs
From: Microsoft Azure: Security Monitoring and Threat Detection
Video
-
Threat detection with Microsoft Defender for Cloud51s
Threat detection with Microsoft Defender for Cloud
From: Microsoft Azure: Security Monitoring and Threat Detection
Video
-
Public stigma around mental health6m
Public stigma around mental health
From: Dismantling Stigma: A Mental Health Framework for HR and People Leaders
Video
-
Signposting for mental health at work2m
Signposting for mental health at work
From: Dismantling Stigma: A Mental Health Framework for HR and People Leaders
Video
-
Requirements, plans, and strategy3m
Requirements, plans, and strategy
From: Software Testing Foundations: Integrating AI into the Quality Process
Video
-
How to monitor alerts generated by Azure Firewall IDPS6m
How to monitor alerts generated by Azure Firewall IDPS
From: Microsoft Azure: Security Monitoring and Threat Detection
Video
-
How does XDR handle false positives?2m
How does XDR handle false positives?
From: Microsoft Azure: Security Monitoring and Threat Detection
Video
-
IOC management best practices3m
IOC management best practices
From: Microsoft Azure: Security Monitoring and Threat Detection
Video
-
What is an intrusion detection system?3m
What is an intrusion detection system?
From: Microsoft Azure: Security Monitoring and Threat Detection
Video
-
Microsoft Azure: Security Monitoring and Threat Detection1h 23m
Microsoft Azure: Security Monitoring and Threat Detection
By: Oluwaseun Adebayo
Course
-
Dismantling Stigma: A Mental Health Framework for HR and People Leaders1h 13m
Dismantling Stigma: A Mental Health Framework for HR and People Leaders
By: Barbara Brennan
Course
-
AWS landing zone for your enterprise45s
AWS landing zone for your enterprise
From: Designing an AWS Landing Zone for Your Enterprise
Video
-
The potential of employee resource group (ERG) communities39s
The potential of employee resource group (ERG) communities
From: Creating Community within Your Employee Resource Group
Video
-
Cybersecurity simplified42s
Cybersecurity simplified
From: Building and Auditing a Cybersecurity Program
Video
-
Building a seamless omnichannel communication journey strategy4m
Building a seamless omnichannel communication journey strategy
From: Connecting with Customers Across Channels: Build Loyalty and Stand Out in the AI Era
Video
-
Addressing customer pain points through transparency4m
Addressing customer pain points through transparency
From: Connecting with Customers Across Channels: Build Loyalty and Stand Out in the AI Era
Video