Your search is running...







































Found:  17 trainings | 86 courses | 1460 tutorials

tutorial

THIS IS NOT OFFICIAL LEGAL ADVICE. PLEASE CONTACT A GDPR CONSULTANT OR LAW FIRM IF YOU ARE CONCERNED THAT YOUR COMPANY IS GDPR COMPLIANT. There are new Data Protection laws coming into force in May ...

English - 10 min - Intermediate - 1163 - 0 0 - 4.0 - Last Edit: 03.03.2024
Cybersecurity, End User Security, IT & SOFTWARE

tutorial

Steve explains "federated identity" to Sally in 2 minutes. Sally discovers she's been using federated identity for a while for personal things, but would like to use it at work too.

- 3 min - 470 - 0 0 - Last Edit: 03.03.2024
Cybersecurity, End User Security, English,

tutorial

How technology is changing humanity, and how we should deal with that, is certain to become the #1 topic for the foreseeable future. "Humanity is changing more in the next 20 years than in the previou...

English - 3 min - Beginner - 487 - 0 0 - Last Edit: 03.03.2024
Cybersecurity, IT & SOFTWARE

tutorial

Read full article: http://goo.gl/5yEddh VPN stands for Virtual Private Network. But what is it? What can a VPN do for you and do you need a VPN? Let's take a look. Get ExpressVPN: http://goo.gl/dc1H...

English - 13 min - Beginner - 926 - 0 0 - 4.0 - Last Edit: 03.03.2024
Cybersecurity, System Security, IT & SOFTWARE

tutorial

Continuamos con el estudio de las redes VPN y los tipos más representativos que podemos encontrar mientras revisamos la importancia que tiene el proceso de tunneling para la seguridad. Herramientas: ...

Español - 25 min - Intermediate - 471 - 0 0 - Last Edit: 03.03.2024
Cybersecurity, End User Security, IT & SOFTWARE,

tutorial

Season Too has started! - http://explosm.net/seasontoo/ See shorts a week early on Vessel! - http://bit.ly/1KZnoGy Subscribe to Explosm! - http://bit.ly/13xgq7a Got something for you to check our, Mu...

English - 2 min - Beginner - 487 - 0 0 - Last Edit: 03.03.2024
Cybersecurity, AGRICULTURE, Agronomical & Technical Issues,

tutorial
English - 4 min - Beginner - 483 - 0 0 - Last Edit: 03.03.2024
Cybersecurity, AGRICULTURE, Agronomical & Technical Issues,

tutorial

Hurricane season is approaching, and now is the perfect time to review your data backup, redundancy and security plans. Is your business data protected from extreme weather events like hurricanes? Wat...

English - 2 sec - 494 - 0 0 - Last Edit: 03.03.2024
Cybersecurity, System Security, IT & SOFTWARE

tutorial

What I used to make my videos: ● Microphone: http://amzn.to/2yF8dUy ● Pop filter: http://amzn.to/2ArPIQu ● Webcam: http://amzn.to/2ydEvSf ● Video editing software: http://amzn.to/2Aq3nrj

English - 13 min - Beginner - 487 - 0 0 - Last Edit: 03.03.2024
Cybersecurity, End User Security, System Security,

tutorial

Session 7: SANS Session - Incident Response: 7 phases of IR - have a plan. Speaker: Brian Ventura, Information Security Architect / SANS Instructor, City of Portland / SANS Description: One of the...

English - 47 min - Intermediate - 490 - 0 0 - Last Edit: 03.03.2024
Cybersecurity, System Security, IT & SOFTWARE

tutorial

This simple video provides an overview of database security techniques, including data masking, data generation, and data scrambling.

English - 5 min - Beginner - 497 - 0 0 - Last Edit: 03.03.2024
Cybersecurity, System Security, IT & SOFTWARE

tutorial

Internet anonymity has created a new security and fraud challenge for businesses and organizations that conduct business and process transactions online. Attacks on organizations resulting in fraudule...

English - 6 min - Intermediate - 715 - 0 0 - Last Edit: 03.03.2024
Cybersecurity, System Security, IT & SOFTWARE

tutorial

just showing you a couple of ways of how to uninstall programs www.swagbucks.com/refer/iang1991 want to earn money? http://adf.ly/al48P Check out my website : http://iwasnamedianhdtutorials.blogs...

English - 3 min - Beginner - 951 - 0 0 - Last Edit: 03.03.2024
Cybersecurity, End User Security, System Security,

tutorial

Identity theft is one of the fastest growing crimes worldwide, and much of it is supported by hacking. Data breaches are on the rise, so how can you prevent people from accessing your most valuable in...

English - 36 sec - Beginner - 462 - 0 0 - Last Edit: 03.03.2024
Cybersecurity, IT & SOFTWARE

tutorial

FCAPS is the core of Network Management, while ITIL shares the good practices that helps manage IT Services, Practices and Tasks. Is there a relationship between FCAPS and ITIL? This presentation, hel...

English - 28 min - Intermediate - 524 - 0 0 - Last Edit: 03.03.2024
Cybersecurity, IT & SOFTWARE, System Security

tutorial

John Wagnon discusses the basics and benefits of Elliptic Curve Cryptography (ECC) in this episode of Lightboard Lessons. Check out this article on DevCentral that explains ECC encryption in more det...

English - 11 min - Intermediate - 632 - 0 0 - 4.3 - Last Edit: 03.03.2024
Cybersecurity, System Security, IT & SOFTWARE



ViVET is easy, flexible and adaptable

Easy learning wherever, whenever, however

Flexible in adding and improving training contents

Adaptable to become an e-training institute or company

Can‘t find anything you like?