Your search is running...

Found:  17 trainings | 86 courses | 1460 tutorials

tutorial

This video tour of a Google data center highlights the security and data protections that are in place at our data centers.

English - 7 min - Beginner - 368 - 0 0 - 4.0 - Last Edit: 27.01.2022
Cybersecurity, IT & SOFTWARE

tutorial

ISO 20000-1 Awareness Training

English - 12 min - Intermediate - 275 - 0 0 - Last Edit: 27.01.2022
Cybersecurity, System Security, IT & SOFTWARE

tutorial

Learning objectives After watching this video, viewers will be able to: 1. Define the word “disaster”. 2. Define disaster “hazards”. 3. Define disaster “vulnerability” 4. Recognize that disasters res...

English - 3 min - Beginner - 1342 - 0 0 - Last Edit: 27.01.2022
Cybersecurity, System Security, IT & SOFTWARE

tutorial

Business Continuity For Dummies

English - 1 sec - Beginner - 293 - 0 0 - Last Edit: 27.01.2022
Cybersecurity, System Security, IT & SOFTWARE

tutorial

Learn more about identity theft and how to protect yourself against this crime with Experian's ProtectMyID.

English - 4 min - Beginner - 338 - 0 0 - 3.7 - Last Edit: 27.01.2022
Cybersecurity, IT & SOFTWARE

tutorial

World Business: You may not have heard of them, but botnets are already affecting your life. Criminals seize control of vast networks of personal computers around the world, by infecting them with mal...

English - 5 min - Beginner - 378 - 0 0 - Last Edit: 27.01.2022
Cybersecurity, IT & SOFTWARE

tutorial

Curso esencial de redes de telecomunicaciones y transmisión de datos - Capas 5,6 y 7 del modelos OSI

Español - 5 min - Beginner - 282 - 0 0 - Last Edit: 27.01.2022
Cybersecurity, End User Security, IT & SOFTWARE,

tutorial

The WPS protocol has suffered from vulnerabilities and active exploits from its introduction. In this video, you’ll learn more about WPS and why security professionals recommend disabling of all WPS f...

English - 4 min - Beginner - 327 - 0 0 - 4.7 - Last Edit: 27.01.2022
Cybersecurity, End User Security, IT & SOFTWARE,

tutorial

Time in front of your organization’s audit committee is precious. You don’t want to waste their time – or yours. How do you make the most of it? Jennifer Esterheld, Wolters Kluwer, has some advice in ...

English - 4 min - Intermediate - 284 - 0 0 - Last Edit: 27.01.2022
Cybersecurity, IT & SOFTWARE, System Security

tutorial

James Veitch has spent years doing the tireless, thankless work of replying to spam emailers so you don’t have to. He returns to TED to tell the tale of yet another spam email adventure, this time wit...

English - 10 min - Beginner - 302 - 0 0 - Last Edit: 27.01.2022
Cybersecurity, End User Security, IT & SOFTWARE

tutorial

Password managers - Their usefulness and advantages conferred are occasionally debated. However, it may not always be clear to us where the good and bad is, for us to make an informed decision. In thi...

English - 10 min - Intermediate - 711 - 0 0 - 3.7 - Last Edit: 27.01.2022
Cybersecurity, IT & SOFTWARE

tutorial
English - 8 min - Beginner - 330 - 0 0 - Last Edit: 27.01.2022
Cybersecurity, End User Security, System Security,

tutorial

Ever wonder how cyberattacks and malware are created, and how they get into your system to steal your data? See the life of a cyberthreat first hand, from the moment of its inception within the Dark W...

English - 2 min - Beginner - 350 - 0 0 - Last Edit: 27.01.2022
Cybersecurity, System Security, IT & SOFTWARE

tutorial

How to backup iPhone, iPad, iPod with iTunes (PC & Mac) iTunes Backup Info: http://support.apple.com/kb/ht1766 Earn $$$ by using free apps ► http://abo.io/Andy Subscribe! http://goo.gl/RqU0nl Thi...

English - 4 min - 405 - 0 0 - Last Edit: 27.01.2022
End User Security, English, IT - Standard Software (ECDL),

tutorial

just showing you a couple of ways of how to uninstall programs www.swagbucks.com/refer/iang1991 want to earn money? http://adf.ly/al48P Check out my website : http://iwasnamedianhdtutorials.blogs...

English - 3 min - Beginner - 491 - 0 0 - Last Edit: 27.01.2022
Cybersecurity, End User Security, System Security,

tutorial

A cryptographic hash can be used for many different tasks. In this video, you’ll learn about hashing, collisions, digital signatures, and more.

English - 8 min - Intermediate - 389 - 0 0 - 4.7 - Last Edit: 27.01.2022
Cybersecurity, End User Security, System Security,



ViVET is easy, flexible and adaptable

Easy learning wherever, whenever, however

Flexible in adding and improving training contents

Adaptable to become an e-training institute or company

Can‘t find anything you like?