Your search is running...







































Found:  17 trainings | 86 courses | 1460 tutorials

tutorial

This brief video provides background on the ISO / IEC 38500 standard for the corporate governance of information technology. The standard's framework of governing principles and governing activities i...

English - 2 min - Intermediate - 723 - 0 0 - Last Edit: 17.11.2025
Cybersecurity, End User Security, System Security,

tutorial

Find out how easy it is for hackers to gain passwords and sensitive information as you type it in.

English - 6 min - Intermediate - 689 - 0 0 - Last Edit: 17.11.2025
Cybersecurity, IT & SOFTWARE

tutorial

How to save history of visited pages in Google Chrome

English - 2 min - Beginner - 685 - 0 0 - 3.3 - Last Edit: 17.11.2025
Cybersecurity, IT & SOFTWARE

tutorial

For more on how to protect your identity and keep your personal information safe, visit http://www.identity.utexas.edu

English - 3 min - Beginner - 652 - 0 0 - Last Edit: 17.11.2025
Cybersecurity, System Security, IT & SOFTWARE

tutorial

This Joomla! tutorial shows how to format the size, shape, and border of your images with new HTML classes included in the Bootstrap release of Joomla. Watch more at http://www.lynda.com/Joomla-tutori...

English - 8 min - 680 - 0 0 - Last Edit: 17.11.2025
Joomla!, English, Webdesign,

tutorial
English - 12 min - 688 - 0 0 - Last Edit: 17.11.2025
Cybersecurity, IT & SOFTWARE, System Security

tutorial

The OSI Model Explained What Is this OSI Model? The OSI model (Open System Interconnect) is a theoretical stack of 7 layers that can be used as a reference to understand how a network operates. The ...

English - 6 min - Beginner - 790 - 0 0 - Last Edit: 17.11.2025
Cybersecurity, System Security, IT & SOFTWARE

tutorial

Linux Permissions - POSIX, chmod, chown, chgrp. Regular permissions with USER, GROUP and OTHER. Special permissions of SUID, SGID and Sticky Bit. Modifying permissions numerically and with the additio...

English - 19 min - Beginner - 665 - 0 0 - Last Edit: 17.11.2025
Cybersecurity, System Security, IT & SOFTWARE

tutorial

Federal and DoD policies establish minimum standards for Insider Threat Programs in government agencies, DoD Components, and cleared industry. This video provides an executive-level summary of these r...

English - 7 min - Intermediate - 927 - 0 0 - 3.7 - Last Edit: 17.11.2025
Cybersecurity, System Security, IT & SOFTWARE

tutorial

Learn how to change the permissions of a file in Windows 10, including how to make a file read-only and how to add custom permissions for specific users.

English - 2 min - Beginner - 676 - 0 0 - Last Edit: 17.11.2025
Cybersecurity, IT & SOFTWARE, System Security

tutorial

Since 2003, the Open Web Application Security Project curates a list of the top ten security risks for web applications. After several delays, the 2017 list has finally been released in spring. Time ...

English - 60 min - Beginner - 685 - 0 0 - Last Edit: 17.11.2025
Cybersecurity, System Security, IT & SOFTWARE,

tutorial

Business continuity has a PR problem. From the outside, it seems boring, difficult, and not a priority. According to our 2017 Data Health Check, less than half of organisations with small IT teams (1-...

English - 30 min - Beginner - 723 - 0 0 - Last Edit: 17.11.2025
Cybersecurity, System Security, IT & SOFTWARE

tutorial

Big data is big business and as value is created from customer insight - but, where is the moral line? What happens when companies cross that line? What if consumers could flip the equation to offer t...

English - 18 min - 929 - 0 0 - 3.7 - Last Edit: 17.11.2025
Cybersecurity, IT & SOFTWARE

tutorial

Visit https://bugcrowd.com/jackktutorials to get started in your security research career! Remember to Like, Comment and Subscribe if you enjoyed the video! Also share if you know someone who would ...

English - 16 min - Intermediate - 695 - 0 0 - Last Edit: 17.11.2025
Cybersecurity, System Security, IT & SOFTWARE

tutorial
English - 8 min - Beginner - 683 - 0 0 - Last Edit: 17.11.2025
Cybersecurity, End User Security, System Security,

tutorial

Adware and Spyware are some of the most common malware you’ll find. In this video, you’ll learn more about adware and spyware and how to protect against infections.

English - 4 min - Beginner - 860 - 0 0 - 4.3 - Last Edit: 17.11.2025
Cybersecurity, End User Security, IT & SOFTWARE,



ViVET is easy, flexible and adaptable

Easy learning wherever, whenever, however

Flexible in adding and improving training contents

Adaptable to become an e-training institute or company

Can‘t find anything you like?