E Learning Free Channel
E Learning Free Channel
  • 191
  • 1 312 368
How to PASS Exam Senior Professional in Human Resources® SPHR® in 40 Hours Full Course Training
Tham gia làm hội viên của kênh này để được hưởng đặc quyền:
th-cam.com/channels/2o9zlm8t_xYwSVrtFrZ5Cg.htmljoin
Don't forget to subcribe, like and share our video to your friend. It will motivate us to produce more videos.
If you are interested in other training, let take a look on our playlists
th-cam.com/channels/2o9zlm8t_xYwSVrtFrZ5Cg.htmlplaylists
มุมมอง: 131

วีดีโอ

#3 How to PASS Exam Google Cloud Certified Associate Cloud Enginer in 20 Hours | Full Course Part 3
มุมมอง 1.6K2 ปีที่แล้ว
Please don't skip the Ads while watching videos. It will help us to have a little bit money to maintain this channel. Thanks for your strongly supporting. #3 How to PASS Exam Google Cloud Certified Associate Cloud Enginer in 20 Hours | Full Course Part 3 Don't forget to subscribe, like and share our video with your friend. It will motivate us to produce more videos. If you are interested in oth...
#2 How to PASS Exam Google Cloud Certified Associate Cloud Enginer in 20 Hours | Full Course Part 2
มุมมอง 7752 ปีที่แล้ว
Please don't skip the Ads while watching videos. It will help us to have a little bit money to maintain this channel. Thanks for your strongly supporting. #2 How to PASS Exam Google Cloud Certified Associate Cloud Enginer in 20 Hours | Full Course Part 2 Don't forget to subscribe, like and share our video with your friend. It will motivate us to produce more videos. If you are interested in oth...
#1 How to PASS Exam Google Cloud Certified Associate Cloud Enginer in 20 Hours | Full Course Part 1
มุมมอง 2.3K2 ปีที่แล้ว
Please don't skip the Ads while watching videos. It will help us to have a little bit money to maintain this channel. Thanks for your strongly supporting. #1 How to PASS Exam Google Cloud Certified Associate Cloud Enginer in 20 Hours | Full Course Part 1 Don't forget to subscribe, like and share our video with your friend. It will motivate us to produce more videos. If you are interested in oth...
#4 How to PASS Exam Professional in Human Resources® PHR® in 20 Hours | Full Course Training Part 4
มุมมอง 4.5K2 ปีที่แล้ว
Please don't skip the Ads while watching videos. It will help us to have a little bit money to maintain this channel. Thanks for your strongly supporting. #4 How to PASS Exam Professional in Human Resources® PHR® in 20 Hours | Full Course Training Part 4 HR Certification Institute® (HRCI®) Don't forget to subscribe, like and share our video with your friend. It will motivate us to produce more ...
#3 How to PASS Exam Professional in Human Resources® PHR® in 20 Hours | Full Course Training Part 3
มุมมอง 4.1K2 ปีที่แล้ว
Please don't skip the Ads while watching videos. It will help us to have a little bit money to maintain this channel. Thanks for your strongly supporting. #3 How to PASS Exam Professional in Human Resources® PHR® in 20 Hours | Full Course Training Part 3 HR Certification Institute® (HRCI®) Don't forget to subscribe, like and share our video with your friend. It will motivate us to produce more ...
#2 How to PASS Exam Professional in Human Resources® PHR® in 20 Hours | Full Course Training Part 2
มุมมอง 7K2 ปีที่แล้ว
Please don't skip the Ads while watching videos. It will help us to have a little bit money to maintain this channel. Thanks for your strongly supporting. #2 How to PASS Exam Professional in Human Resources® PHR® in 20 Hours | Full Course Training Part 2 HR Certification Institute® (HRCI®) Don't forget to subscribe, like and share our video with your friend. It will motivate us to produce more ...
#1 How to PASS Exam Professional in Human Resources® PHR® in 20 Hours | Full Course Training Part 1
มุมมอง 39K2 ปีที่แล้ว
Please don't skip the Ads while watching videos. It will help us to have a little bit money to maintain this channel. Thanks for your strongly supporting. #1 How to PASS Exam Professional in Human Resources® PHR® in 20 Hours | Full Course Training Part 1 HR Certification Institute® (HRCI®) Don't forget to subscribe, like and share our video with your friend. It will motivate us to produce more ...
#2 How to PASS Exam Certified Business Analysis Professional CBAP in 12 hours | Part 2
มุมมอง 7202 ปีที่แล้ว
Please don't skip the Ads while watching videos. It will help us to have a little bit money to maintain this channel. Thanks for your strongly supporting. #2 How to PASS Exam Certified Business Analysis Professional CBAP in 12 hours | Part 2 Don't forget to subscribe, like and share our video with your friend. It will motivate us to produce more videos. If you are interested in other training, ...
#1 How to PASS Exam Certified Business Analysis Professional CBAP in 12 hours | Part 1
มุมมอง 2.3K2 ปีที่แล้ว
Please don't skip the Ads while watching videos. It will help us to have a little bit money to maintain this channel. Thanks for your strongly supporting. #1 How to PASS Exam Certified Business Analysis Professional CBAP in 12 hours | Part 1 Don't forget to subscribe, like and share our video with your friend. It will motivate us to produce more videos. If you are interested in other training, ...
#2 How to PASS exam Certified Information Systems Security Professional CISSP in 12 hours | Part 2
มุมมอง 10K2 ปีที่แล้ว
Please don't skip the Ads while watching videos. It will help us to have a little bit money to maintain this channel. Thanks for your strongly supporting. #2 How to PASS exam Certified Information Systems Security Professional CISSP in 12 hours | Part 2 | Full Course Training Don't forget to subscribe, like and share our video with your friend. It will motivate us to produce more videos. If you...
#1 How to PASS exam Certified Information Systems Security Professional CISSP in 12 hours | Part1
มุมมอง 55K2 ปีที่แล้ว
Please don't skip the Ads while watching videos. It will help us to have a little bit money to maintain this channel. Thanks for your strongly supporting. #1 How to PASS exam Certified Information Systems Security Professional CISSP in 12 hours | Part1 | Full Course Training Don't forget to subscribe, like and share our video with your friend. It will motivate us to produce more videos. If you ...
#2 How to Pass Exam Certified Information Systems Auditor in 15 hours (CISA) | Full Course | Part 2
มุมมอง 17K2 ปีที่แล้ว
#2 How to Pass Exam Certified Information Systems Auditor in 15 hours (CISA) | Full Course | Part 2
#1 How to Pass Exam Certified Information Systems Auditor in 15 hours (CISA) | Full Course | Part 1
มุมมอง 137K2 ปีที่แล้ว
#1 How to Pass Exam Certified Information Systems Auditor in 15 hours (CISA) | Full Course | Part 1
#3 How to PASS Exame Certified Kubernetes Administrator in 20 hours | Full Course Training | Part 3
มุมมอง 2842 ปีที่แล้ว
#3 How to PASS Exame Certified Kubernetes Administrator in 20 hours | Full Course Training | Part 3
#2 How to PASS Exame Certified Kubernetes Administrator in 20 hours | Full Course Training | Part 2
มุมมอง 2892 ปีที่แล้ว
#2 How to PASS Exame Certified Kubernetes Administrator in 20 hours | Full Course Training | Part 2
#1 How to PASS Exame Certified Kubernetes Administrator in 20 hours | Full Course Training | Part 1
มุมมอง 9762 ปีที่แล้ว
#1 How to PASS Exame Certified Kubernetes Administrator in 20 hours | Full Course Training | Part 1
Machine Learning Tutorial for Beginner | Full Course Training
มุมมอง 7842 ปีที่แล้ว
Machine Learning Tutorial for Beginner | Full Course Training
VueJS Tutorial for Beginner | From Beginner to Master in 5 Hours | Full Course Training
มุมมอง 2522 ปีที่แล้ว
VueJS Tutorial for Beginner | From Beginner to Master in 5 Hours | Full Course Training
#5 Block Chain Tutorial Series | Advanced Section | Part 1 Block Chain Design and Development
มุมมอง 1942 ปีที่แล้ว
#5 Block Chain Tutorial Series | Advanced Section | Part 1 Block Chain Design and Development
Automation and Scripting for DevOps Tutorial for Beginner | From Beginner to Master in 5 Hours
มุมมอง 7072 ปีที่แล้ว
Automation and Scripting for DevOps Tutorial for Beginner | From Beginner to Master in 5 Hours
Shell Scripting Tutorial for Beginner | From Beginner to Master in 4 Hours
มุมมอง 7952 ปีที่แล้ว
Shell Scripting Tutorial for Beginner | From Beginner to Master in 4 Hours
#7 Block Chain Tutorial Series | Advanced Section | Part 3 Cloud Block Chains
มุมมอง 1042 ปีที่แล้ว
#7 Block Chain Tutorial Series | Advanced Section | Part 3 Cloud Block Chains
#6 Block Chain Tutorial Series | Advanced Section | Part 2 Smart Contracts and Hyperledger Fabric
มุมมอง 1052 ปีที่แล้ว
#6 Block Chain Tutorial Series | Advanced Section | Part 2 Smart Contracts and Hyperledger Fabric
#10 Block Chain Tutorial Series | Ethereum Section | Part 3 Building Decentralized Applications
มุมมอง 1002 ปีที่แล้ว
#10 Block Chain Tutorial Series | Ethereum Section | Part 3 Building Decentralized Applications
#9 Block Chain Tutorial Series | Ethereum Section | Part 2 Working with Ethereum
มุมมอง 762 ปีที่แล้ว
#9 Block Chain Tutorial Series | Ethereum Section | Part 2 Working with Ethereum
#8 Block Chain Tutorial Series | Ethereum Section | Part 1 Ethereum Smart Contracts with Solidity
มุมมอง 982 ปีที่แล้ว
#8 Block Chain Tutorial Series | Ethereum Section | Part 1 Ethereum Smart Contracts with Solidity
#4 Block Chain Tutorial Series | Basic Section | Part 4: Blockchain and Crypto Currency
มุมมอง 802 ปีที่แล้ว
#4 Block Chain Tutorial Series | Basic Section | Part 4: Blockchain and Crypto Currency
#3 Block Chain Tutorial Series | Basic Section | Part 3: Blockchain and Hyperledger Fabric
มุมมอง 1432 ปีที่แล้ว
#3 Block Chain Tutorial Series | Basic Section | Part 3: Blockchain and Hyperledger Fabric
#2 Block Chain Tutorial Series | Basic Section | Part 2 Block Chain and Ethereum
มุมมอง 1082 ปีที่แล้ว
#2 Block Chain Tutorial Series | Basic Section | Part 2 Block Chain and Ethereum

ความคิดเห็น

  • @ZrobiliśmyToSami
    @ZrobiliśmyToSami 4 วันที่ผ่านมา

    Hi! Just for your infomration, you misspronounce Poisson. That's a french surname and should be pronounced like "Pwason" check it please

  • @hrushikeshkhonde7079
    @hrushikeshkhonde7079 10 วันที่ผ่านมา

    As u requested in the description, we will watch ads to support such free informative service.❤ Love from Maharashtra, India.

  • @PortableTalents
    @PortableTalents 18 วันที่ผ่านมา

    I hope you're doing well. I would love your insights on its relevance in advertising and media. I'm exploring this path and would truly value your advice. Thank you for your time and guidance!

  • @nate687
    @nate687 หลายเดือนก่อน

    so out of date its impossible to follow along. Everything is completely different

  • @nate687
    @nate687 หลายเดือนก่อน

    where is the csv? load of rubbish

  • @nate687
    @nate687 หลายเดือนก่อน

    I just finished a bachelor's degree (undergraduate) in Financial Maths and Economics. I don't fancy going down the finance route and the only real programming skills have from this degree are a bit of R programming and matlab/jupyter. I want to do a masters in Data Science/data analytics with the possibility in the future of focusing in on sports or health data science but I would like a versatile range for different sectors. My maths ability is very good from my undergrad but it's the computer skills I'm lacking and I want to apply and hopefully gain entry into a masters. Can Anyone suggest what i could//should do with regards to online certifications etc, or even learning on youtube, that would be good for a CV for a masters application. Would DP-100 look good on a CV for Data analytics graduate jobs and for data analytics masters programmes applications? Thankyou

  • @amiralx88
    @amiralx88 หลายเดือนก่อน

    What a waste of time if I want to pass a Machine learning certificate I think I already know what's a scatter plot and if you don't just go back to elementary school. And that is course #6 lmfao

  • @daveyd6094
    @daveyd6094 2 หลายเดือนก่อน

    When was the course released originally? I wonder how old it is.

  • @daveyd6094
    @daveyd6094 2 หลายเดือนก่อน

    When was the course released originally? I wonder how old it is.

  • @niklawrence5778
    @niklawrence5778 2 หลายเดือนก่อน

    Excellent stuff, thank you for this (and indeed the whole series). Very useful, very comprehensive.

  • @ИринаКим-ъ5ч
    @ИринаКим-ъ5ч 2 หลายเดือนก่อน

    Harris Cynthia Jackson Amy Perez Anthony

  • @ИринаКим-ъ5ч
    @ИринаКим-ъ5ч 2 หลายเดือนก่อน

    Thomas Cynthia Lopez Kimberly Thompson Frank

  • @naveennarine9360
    @naveennarine9360 2 หลายเดือนก่อน

    Underrated course

  • @ИринаКим-ъ5ч
    @ИринаКим-ъ5ч 2 หลายเดือนก่อน

    Miller Daniel Taylor Karen Jones Gary

  • @ИринаКим-ъ5ч
    @ИринаКим-ъ5ч 2 หลายเดือนก่อน

    Hall John Smith Margaret Gonzalez Gary

  • @ИринаКим-ъ5ч
    @ИринаКим-ъ5ч 2 หลายเดือนก่อน

    Gonzalez Lisa Jones Laura Jones Donald

  • @ИринаКим-ъ5ч
    @ИринаКим-ъ5ч 2 หลายเดือนก่อน

    Thompson David Moore Charles Lopez Sharon

  • @ИринаКим-ъ5ч
    @ИринаКим-ъ5ч 2 หลายเดือนก่อน

    Rodriguez Robert Anderson Matthew Thompson Jennifer

  • @ИринаКим-ъ5ч
    @ИринаКим-ъ5ч 2 หลายเดือนก่อน

    Clark Daniel Hall Edward Taylor Christopher

  • @ИринаКим-ъ5ч
    @ИринаКим-ъ5ч 2 หลายเดือนก่อน

    Perez John Allen David White Robert

  • @ИринаКим-ъ5ч
    @ИринаКим-ъ5ч 2 หลายเดือนก่อน

    Robinson Steven Gonzalez Anna Lewis Shirley

  • @mason_prewett
    @mason_prewett 2 หลายเดือนก่อน

    Here is the CSV data he pasted into the enter data manually step PatientID,Pregnancies,PlasmaGlucose,DiastolicBloodPressure,TricepsThickness,SerumInsulin,BMI,DiabetesPedigree,Age 1882185,9,104,51,7,24,27.36983156,1.350472047,43 1662484,6,73,61,35,24,18.74367404,1.074147566,75 1228510,4,115,50,29,243,34.69215364,0.741159926,59

  • @mason_prewett
    @mason_prewett 2 หลายเดือนก่อน

    Here is the json that needs to be provided in the body of Postman request. Great video series, but some sections are hard to follow because things like this are missing. { "Inputs": { "WebServiceInput0": [ { "symboling": 3, "normalized-losses": "", "make": "alfa-romero", "fuel-type": "gas", "aspiration": "std", "num-of-doors": "two", "body-style": "convertible", "drive-wheels": "rwd", "engine-location": "front", "wheel-base": 88.6, "length": 168.8, "width": 64.1, "height": 48.8, "curb-weight": 2548, "engine-type": "dohc", "num-of-cylinders": "four", "engine-size": 130, "fuel-system": "mpfi", "bore": 3.47, "stroke": 2.68, "compression-ratio": 9, "horsepower": 111, "peak-rpm": 5000, "city-mpg": 21, "highway-mpg": 27 } ] } }

    • @nate687
      @nate687 หลายเดือนก่อน

      where does this go? In the edit JSON of "select columns in dataset"?

  • @ronaldteo3768
    @ronaldteo3768 2 หลายเดือนก่อน

    Timestamp: 0:00 The Purpose of Auditing 0:04 Information System Auditing 0:30 The IS Auditing Process 0:50 IS Audit Planning 2:06 Audit Procedures 3:12 ISACA Code of Conduct 6:02 ISACA Auditing Standards 10:19 Organizational Documentation 15:39 Stakeholder Needs 17:43 Stakeholder Needs - Compliance 19:27 Network Diagrams 19:31 IS Auditing and Network Diagrams 23:50 Security Control Types 29:00 Control Objectives and Controls 33:09 Audit Resource Planning 37:19 Audit Scheduling 39:54 Urgent Incident Discovery 42:59 Why Do People Partake in Fraud? 43:47 Audit Reporting 47:18 Audit Findings Remediation Follow-up 50:01 Exercise: Controls and IS Auditing 50:46 The Purpose of IS Auditing 51:07 Control Type Examples 52:31 Control Objectives and Control 53:22 IT Governance 54:43 Common IT governance frameworks 55:58 COBIT 59:08 COBIT 5 1:00:18 Information Technology Infrastructure Library (ITIL) 1:01:04 ITIL Lifecycle 1:04:03 ITIL and IS Audit Outcomes 1:04:44 ISO/IEC Standards 1:06:07 ISO/IEC 27001:2013 1:07:16 Risk Management 1:08:20 IT-related Risks 1:09:50 Risk Register 1:10:55 Risk Treatment 1:15:16 Business Model for Information Security (BMIS) 1:19:31 Information Technology Assurance Framework (ITAF) 1:21:34 IT Balanced Scorecards (IT BSC) 1:22:44 Sample Software Development Scorecard 1:24:27 Exercise: IT Frameworks and IS Auditing 1:25:00 IT Governance 1:25:29 COBIT 1:26:05 ITIL Phases 1:26:53 Risk Treatment 1:27:52 The CIA Triad 1:27:54 The CIA Security Triad 1:28:27 Confidentiality 1:29:12 Integrity 1:30:17 Availability 1:32:16 Personally Identifiable Information (PII) 1:34:33 PII Audit Assurance Review 1:35:20 Protected Health Information (PHI) 1:37:56 General Data Protection Regulation (GDPR) 1:41:05 GDPR Compliance 1:44:05 Payment Card Industry Data Security Standard (PCI DSS) 1:51:50 Health Insurance Portability and Accountability Act (HIPAA) 1:52:30 HIPAA Compliance 1:54:01 Federal Risk and Authorization Management Program (FedRAMP) 1:55:56 FedRAMP Requirements 1:57:33 FedRAMP Certified Cloud Providers 1:57:47 Assets and Risks 1:58:29 IT Asset Lifecycle 1:59:02 Asset Risk Calculations 2:00:52 Asset Risk Calculation Example 2:06:17 Network Inventory 2:08:21 Exercise: Mitigate Data Privacy Risks 2:09:01 CIA Security Triad 2:09:39 PII 2:09:51 PHI 2:10:04 Calculate ALE 2:10:55 Authentication and Authorization 2:10:56 Authentication 2:11:37 Authentication Categories 2:11:59 Strengthening Authentication 2:13:33 On-Premises Identity and Access Management (IAM) 2:17:41 Cloud-Based IAM 2:21:46 Multi Factor Authentication (MFA) 2:24:13 Multistep Authentication 2:24:46 Microsoft Azure MFA 2:27:36 Microsoft Azure Role Based Access Control (RBAC) 2:31:47 Amazon Web Services RBAC 2:25:30 Microsoft Active Directory Delegated Administration 2:39:18 Identity Federation 2:41:47 Identity Federation - Authentication 2:44:36 Data Tagging 2:46:17 Microsoft File Server Resource Manager 2:47:32 Search Criteria Tagging Examples 2:48:46 Standard Windows File System Permissions 2:54:11 Standard Linux File System Permissions 2:59:00 Windows File Server Resource Manager 3:05:18 Windows Dynamic Access Control 3:14:05 Exercise: Authentication and Data Classification 3:14:58 Identity Federation 3:19:48 Service Level Agreements (SLAs) 3:22:13 Performance Baselines 3:25:59 Windows Performance Monitoring 3:29:52 Linux Performance Monitoring 3:36:22 Cloud-Based Performance Monitoring 3:43:00 Change Management 3:44:36 Types of IT Changes 3:45:39 Change Management Event Flow 3:47:01 Configuration Management 3:48:02 Configuration Management Components 3:51:11 Vulnerability Management 3:52:24 Vulnerability Examples 3:54:29 Vulnerability Management Program 3:55:57 Group Policy Configuration Delegation 3:59:43 Microsoft SCCM Configuration Management 4:05:34 Microsoft SCCM Patch Deployment 4:11:27 Job Scheduling 4:16:21 Exercise: Optimize Performance and Security 4:17:16 Service Level Agreement 4:24:00 Cryptography 4:24:28 Cryptography Uses 4:25:48 Encryption 4:26:25 Hashing 4:27:00 File Hashing Process 4:28:06 Digital Signatures 4:29:26 Asymmetric and Symmetric Encryption 4:29:29 Symmetric Encryption 4:29:52 The Encryption Process 4:30:38 Common Symmetric Algorithms 4:31:17 Asymmetric Encryption 4:33:42 Common Asymmetric Algorithm 4:33:51 Public Key Infrastructure (PKI) Hierarchy 4:36:10 PKI Certificates 4:36:47 PKI Certificate Contents 4:37:35 Public and Private Keys 4:38:33 PKI Usage 4:39:48 The PKI Certificate Life Cycle 4:40:46 PKI Lifecycle 4:41:50 PKI Certificate Lifecycle Management 4:43:53 Private Certificate Authority 4:50:09 Manual Certificate Issuance 4:52:39 Securing Network Traffic 4:53:40 Transport Layer Security (TLS) 4:55:27 Securing Network Traffic with IPSec 4:56:55 Disable SSLv3 4:59:09 Enable a HTTPs Web Site 5:02:51 Client SSL/TLS Certificates 5:08:11 Windows Encrypting File System 5:10:53 Windows BitLocker 5:15:31 File Integrity 5:18:12 Exercise: Applying PKI Security 5:18:52 Symmetric and Asymmetric Encryption 5:19:20 Digital Signing - Hashing 5:19:47 HTTPS and PKI 5:21:09 Types of Virtualizations 5:21:31 Hypervisors 5:22:33 Application Virtualization 5:23:49 Operating System Virtualization 5:24:52 Desktop Virtualization 5:25:58 Hypervisors 5:26:11 Type 1 Hypervisor 5:26:49 Type 2 Hypervisor 5:27:43 Hypervisor Security 5:29:59 Virtual Machine Security 5:31:23 Hypervisor Installation 5:35:35 Virtual Network Switches 5:42:01 Virtual Machines 5:49:18 Hardening a Virtualized Environment 5:56:06 Cloud Computing 5:56:13 Cloud Computing Types 5:57:17 Public Cloud 5:58:12 Private Cloud 5:59:08 Hybrid Cloud 6:00:00 Community Cloud 6:00:46 Cloud Service Models 6:01:02 Infrastructure as a Service (IaaS) 6:01:30 Platform as a Service (PaaS) 6:02:03 Software as a Service (SaaS) 6:02:21 Common Cloud Service Offerings 6:05:48 Cloud Security 6:12:17 Windows Cloud-Based Virtual Machines 6:16:57 Linux Cloud-Based Virtual Machines 6:21:06 Cloud Endpoint Security 6:23:46 Exercise: Securing Cloud Environments 6:24:21 Hypervisors 6:24:50 Cloud Computing Risks 6:25:31 Private Cloud 6:25:57 Jump Box 6:26:28 It Maturity Models 6:27:35 Capability Maturity Model Integration (CMMI) 6:29:40 IT Maturity Assessment 6:30:48 Organizational Security Policies 6:33:37 Organizational Security Policies Types 6:34:50 Security and the OSI Model 6:34:52 The OSI Model 6:38:54 The OSI Model and Security 6:40:21 Password Security 6:40:28 Password Policies 6:41:06 User Account Management 6:43:24 Default Password Lists 6:43:50 Lookup Tables 6:45:09 Rainbow Tables 6:47:02 Endpoint Security 6:50:48 Data Loss Prevention 6:53:50 Data Loss Prevention - Malware 6:55:12 IoT Devices 6:56:17 IoT Device Examples 6:57:06 IoT Search Engine 6:58:04 IoT and Security 6:58:58 Vulnerable IoT Devices 7:04:48 Mobile Device Access Control 7:10:27 Mobile Device Partitioning 7:11:01 Mobile Device Hardening 7:13:53 Mobile Device Policies 7:18:40 Malicious Mobile Apps in App Stores 7:21:57 Auditing Mobile Apps 7:23:28 Exercise: Implement Security Controls 7:24:15 OSI 7:24:55 Rainbow Attack Mitigations 7:25:52 Common IoT Devices 7:26:38 Mobile Device Hardening

    • @soigothazed
      @soigothazed 2 หลายเดือนก่อน

      what a legend

    • @srinivasansg
      @srinivasansg หลายเดือนก่อน

      Great job 👍Thank you

  • @TYLWork
    @TYLWork 2 หลายเดือนก่อน

    Timestamp: 0:00 Data vs. Information 0:04 Data and Information 2:26 Big Data, Data Analytics and Reporting 2:28 Data Analytics 5:17 Storage Area Network Security 5:20 Storage Area Networks 7:51 Fibre Channel SAN 9:33 Secure an iSCSI SAN 15:50 Cloud Storage Security 19:21 Storage Media Disposal 21:00 Database Security 21:03 Database Security 24:56 Database Availability 25:45 Cloud-Based Microsoft SQL Databases 29:39 Database Availability 32:16 Data Backup and Restore Strategies 32:18 Backup and Restore 35:54 Backup Types 37:57 On-Premises Data Backup 43:03 Cloud-Based Data Backup 47:17 Malware Types 47:20 Malware 48:06 Malware Infections 49:13 Malware Types 51:18 Social Engineering 51:20 Social Engineering 51:50 Social Engineering - Fear 53:42 Social Engineering Without Malware 55:02 Phishing Example 55:58 Phishing E-mail Message 56:58 Social Engineering Mitigation Controls 57:55 Exercise: Storage Security and Malware Prevention 58:26 Storage Area Network Security 59:22 Database Server Security 1:00:33 Social Engineering 1:01:04 Malware Prevention 1:01:35 High Availability 1:01:37 High Availability 1:02:02 Unavailability 1:02:33 High Availability 1:03:33 Availability Solutions 1:04:47 Disaster Recovery Plan 1:04:49 Disaster Recovery Plan (DRP) 1:05:51 Disaster Recovery Planning 1:09:14 Disaster Recovery Plan Document 1:10:08 Business Continuity and Business Impact Analysis 1:10:09 Business Continuity 1:11:07 Business Impact Analysis (BIA) 1:12:26 Business Continuity Plan (BCP) 1:13:30 Incident Response Plan 1:13:32 Incident Response Plan (IRP) 1:14:51 Incident Response Plan Details 1:16:12 Call List 1:17:56 Incident Response and Compliance 1:19:01 Alternate Recovery Sites 1:19:04 Alternate Recovery Sites 1:19:56 Cold Site 1:20:19 Warm Site 1:20:44 Hot Site 1:21:23 RAID 1:21:25 Redundant Array of Independent Disks (RAID) 1:22:42 RAID 0 - Disk Striping 1:23:21 RAID 1 - Disk Mirroring 1:24:00 RAID 5 - Disk Striping with Distributed Parity 1:25:26 RAID Configuration 1:28:11 Data Replication Across Regions 1:31:55 Wired and Wireless Network Attacks 1:31:57 Network Attacks 1:32:31 Wired Networks 1:34:19 Wireless Networks 1:35:57 Distributed Denial of Service (DDoS) 1:36:45 Man in the Middle (MiTM) 1:37:54 ARP Poisoning 1:39:59 DNS Spoofing 1:40:53 Network Threat Mitigation 1:40:55 Network Threat Mitigation 1:44:54 Network Access Control (NAC) 1:45:29 Network Authentication Process 1:46:34 Network Access Control 1:47:46 Virtual Local Area Network (VLAN) 1:49:17 Firewalls 1:49:19 Firewalls 1:49:46 Packet Filtering Firewalls 1:51:08 Forward Proxy Servers 1:52:20 Web Application Firewall (WAF) 1:53:22 Identify Plaintext Network Traffic 1:55:37 Implement a Packet Filtering Firewall 1:59:14 Implement a Content Filtering Firewall 2:01:38 Exercise: Business Continuity and Network Security 2:02:15 RPO and RTO 2:03:02 RAID 2:03:35 Network Security 2:06:22 System Development Life Cycle 2:06:24 Software Development Life Cycle (SDLC) 2:07:02 SDLC Phases 2:12:03 Project Management 2:12:05 IT Project Management (ITPM) 2:13:49 Project Management Considerations 2:15:01 The Project Management Process 2:16:31 Secure Coding 2:20:55 Software Testing 2:24:40 Unit Testing 2:24:42 Unit Testing 2:25:38 Unit Testing Position 2:26:49 Unit Testing 2:27:17 Regression Testing 2:29:36 Acceptance Testing 2:29:38 Acceptance Testing 2:31:29 Automated Acceptance Testing Example 2:33:26 Integration Testing 2:36:29 Performance Testing 2:36:31 Performance Testing 2:36:59 Load Testing 2:38:46 Stress Testing 2:39:57 Fuzzing 2:42:33 Continuous Integration and Delivery 2:42:35 Continuous Integration and Delivery (CI/CD) 2:43:12 Continuous Integration 2:44:31 Continuous Delivery 2:45:21 Infrastructure Deployment 2:48:50 System Migration and Data Conversion 2:48:52 System Migration and Data Conversion 2:49:55 System Migration 2:52:06 Data Conversion 2:54:31 Cloud Migration Assessments 2:57:54 Exercise: Plan, Test and Deploy IT Solutions 2:58:26 Secure Coding 2:59:12 Unit and Regression Testing 2:59:55 Fuzzing 3:00:34 Load Testing 3:01:13 Security Testing Types 3:01:16 White Box Testing 3:02:56 Black Box Testing 3:03:56 Gray Box Testing 3:05:19 Vulnerability Scanning 3:05:21 Vulnerability Scanning 3:06:03 The Vulnerability Scanning Process 3:06:55 Vulnerability Scanning Considerations 3:08:49 Performing a Vulnerability Scan 3:14:55 Network Scan Comparison 3:17:21 Penetration Testing 3:17:23 Penetration Testing 3:18:01 Pen Testing - Rules of Engagement 3:19:21 Penetration Testing 3:20:46 Packet Forgery 3:27:52 IPsec Network Traffic 3:33:12 Jump Boxes 3:38:08 Honeypots 3:38:10 Honeypots 3:40:39 Honeypot Configurations 3:41:43 HVAC 3:41:45 Heating, Ventilation, and Air Conditioning (HVAC) 3:43:06 HVAC 3:43:22 HVAC IoT Devices 3:44:42 Physical Security 3:49:45 Drones and Proximity Security 3:55:05 Fire Suppression Systems 3:55:07 Fire Suppression Systems 3:56:09 Fire Risks 3:57:00 Fire Suppression Systems 3:57:36 Exercise: Host and Network Weaknesses 3:58:09 Security Testing 3:58:54 Jump Box 3:59:24 Physical Security 4:01:10 Digital Forensics 4:01:12 Digital Forensics 4:02:08 The Digital Forensics Process 4:03:25 Digital Forensics Results 4:04:31 Digital Forensics Hardware 4:04:33 Digital Forensics Hardware 4:06:31 External Hardware Write Blocker 4:07:52 Digital Forensics Software 4:07:54 Digital Forensics Software 4:10:23 Software Disk Image Acquisition 4:12:37 Order of Volatility 4:15:01 Chain of Custody 4:15:03 Chain of Custody 4:15:41 Evidence Gathering 4:16:45 Evidence Gathering Examples 4:18:23 Evidence Storage 4:19:13 Sample Chain of Custody Form 4:20:15 Forensic Data Browsing 4:28:49 Exercise: Digital Forensic Tools and Techniques 4:29:25 Write Blocker 4:30:14 Order of Volatility 4:30:56 Evidence Integrity 4:32:20 Monitoring Overview 4:32:22 Monitoring Overview 4:33:22 Incident Management 4:34:05 Monitoring Overview 4:35:25 Business Processes 4:35:27 Business Processes 4:36:54 COBIT 5 Process Reference Model (PRM) 4:38:09 Sampling Types 4:38:09 Audit Sampling 4:40:27 Audit Sampling Types 4:42:54 Windows Log Filtering 4:47:56 Linux Log Forwarding 4:53:05 Packet Capturing Placement 4:53:05 Packet Capturing 4:53:34 Packet Capturing - Placement 4:56:41 Packet Capturing 4:57:56 Packet Capturing and Analysis 5:02:33 SIEM 5:02:35 Security Information and Event Management (SIEM) 5:02:32 SIEM Data Sources 5:04:24 SIEM Configuration 5:06:22 Intrusion Detection Systems 5:06:24 Intrusion Detection Systems (IDS) 5:08:04 Intrusion Prevention Systems (IPS) 5:09:11 Intrusion Detection and Prevention Systems 5:11:34 Exercise: Security and Business Process Monitoring 5:12:12 IS Audit Sampling 5:13:53 SIEM 5:14:30 Intrusion Prevention System (IPS) 5:16:54 Scenario: Audit Planning 5:16:56 Audit Planning - Scenario 5:17:47 Audit Planning - Answer 5:19:02 Scenario: Security Control Cost Effectiveness 5:19:04 Security Control Cost Effectiveness - Scenario 5:20:57 Security Control Cost Effectiveness - Answer 5:21:48 Scenario: Determine Wi-Fi Weaknesses 5:21:50 Wi-Fi Security Recommendations - Scenario 5:23:05 Wi-Fi Security Recommendations - Answer 5:25:31 Scenario: Traveling Users 5:25:33 Traveling Users - Scenario 5:26:43 Traveling Users - Answer 5:28:24 Scenario: Key Usage 5:28:26 Key Usage - Scenario 5:29:07 Key Usage - Answer 5:31:02 Scenario: Compensating Control Selection 5:31:04 Suggest Compensating Controls 5:33:02 Exercise: IS Audit Recommendations 5:33:38 IS Auditing and Risk Management 5:34:02 Wi-Fi Security and IT Technicians 5:34:29 Public and Private Keys 5:35:21 Compensating Control Usage

  • @DickensLilith
    @DickensLilith 3 หลายเดือนก่อน

    9512 Bruen Well

  • @MichaelWirick-f1x
    @MichaelWirick-f1x 3 หลายเดือนก่อน

    Thank you!

  • @ColcloughEdwina-r8v
    @ColcloughEdwina-r8v 3 หลายเดือนก่อน

    Bernadine Walks

  • @DeborahWalker-z1u
    @DeborahWalker-z1u 3 หลายเดือนก่อน

    Alphonso Villages

  • @BeaufortAmanda
    @BeaufortAmanda 3 หลายเดือนก่อน

    498 Lonie Viaduct

  • @zaidgetsit
    @zaidgetsit 3 หลายเดือนก่อน

    How do I get the file for the postman ?

  • @reazislam6135
    @reazislam6135 3 หลายเดือนก่อน

    Very good training, very good examples, but please add timestamps for the 5 Domains of CISA so that those who are viewing can jump to specific domains

  • @dineshsekar3385
    @dineshsekar3385 4 หลายเดือนก่อน

    { "Inputs": { "input1": [ { "PatientID": 1669231, "Pregnancies": 7, "PlasmaGlucose": 110, "DiastolicBloodPressure": 82, "TricepsThickness": 16, "SerumInsulin": 44, "BMI": 36.08929341, "DiabetesPedigree": 0.281276159, "Age": 25 }, { "PatientID": 1683688, "Pregnancies": 0, "PlasmaGlucose": 148, "DiastolicBloodPressure": 58, "TricepsThickness": 11, "SerumInsulin": 179, "BMI": 39.19207553, "DiabetesPedigree": 0.160829008, "Age": 45 }, { "PatientID": 1738587, "Pregnancies": 3, "PlasmaGlucose": 109, "DiastolicBloodPressure": 77, "TricepsThickness": 46, "SerumInsulin": 61, "BMI": 19.84731197, "DiabetesPedigree": 0.204345272, "Age": 21 }, { "PatientID": 1884264, "Pregnancies": 3, "PlasmaGlucose": 106, "DiastolicBloodPressure": 64, "TricepsThickness": 25, "SerumInsulin": 51, "BMI": 29.0445728, "DiabetesPedigree": 0.589188017, "Age": 42 }, { "PatientID": 1485251, "Pregnancies": 1, "PlasmaGlucose": 156, "DiastolicBloodPressure": 53, "TricepsThickness": 15, "SerumInsulin": 226, "BMI": 29.78619164, "DiabetesPedigree": 0.203823525, "Age": 41 }, { "PatientID": 1536832, "Pregnancies": 8, "PlasmaGlucose": 117, "DiastolicBloodPressure": 39, "TricepsThickness": 32, "SerumInsulin": 164, "BMI": 21.23099598, "DiabetesPedigree": 0.089362745, "Age": 25 }, { "PatientID": 1438701, "Pregnancies": 3, "PlasmaGlucose": 102, "DiastolicBloodPressure": 100, "TricepsThickness": 25, "SerumInsulin": 289, "BMI": 42.18572029, "DiabetesPedigree": 0.175592826, "Age": 43 }, { "PatientID": 1359971, "Pregnancies": 0, "PlasmaGlucose": 92, "DiastolicBloodPressure": 84, "TricepsThickness": 8, "SerumInsulin": 324, "BMI": 21.86626037, "DiabetesPedigree": 0.258332333, "Age": 33 } ] }, "GlobalParameters": {} }

  • @dineshsekar3385
    @dineshsekar3385 4 หลายเดือนก่อน

    import pandas as pd def azureml_main(dataframe1=None, dataframe2=None): scored_results = dataframe1[['PatientID', 'Scored Labels', 'Scored Probabilities']] scored_results.rename(columns={'Scored Labels': 'DiabetesPrediction', 'Scored Probabilities': 'Probability'}, inplace=True) return scored_results

  • @erikdeknegt
    @erikdeknegt 4 หลายเดือนก่อน

    Who calculated the 18 hours? It's more than 21 hours.

  • @dineshsekar3385
    @dineshsekar3385 4 หลายเดือนก่อน

    Raw data sample: symboling,normalized-losses,make,fuel-type,aspiration,num-of-doors,body-style,drive-wheels,engine-location,wheel-base,length,width,height,curb-weight,engine-type,num-of-cylinders,engine-size,fuel-system,bore,stroke,compression-ratio,horsepower,peak-rpm,city-mpg,highway-mpg 3,?,alfa-romero,gas,std,two,convertible,rwd,front,88.60,168.80,64.10,48.80,2548,dohc,four,130,mpfi,3.47,2.68,9.00,111,5000,21,27 3,?,alfa-romero,gas,std,two,convertible,rwd,front,88.60,168.80,64.10,48.80,2548,dohc,four,130,mpfi,3.47,2.68,9.00,111,5000,21,27 1,?,alfa-romero,gas,std,two,hatchback,rwd,front,94.50,171.20,65.50,52.40,2823,ohcv,six,152,mpfi,2.68,3.47,9.00,154,5000,19,26 2,164,audi,gas,std,four,sedan,fwd,front,99.80,176.60,66.20,54.30,2337,ohc,four,109,mpfi,3.19,3.40,10.00,102,5500,24,30 2,164,audi,gas,std,four,sedan,4wd,front,99.40,176.60,66.40,54.30,2824,ohc,five,136,mpfi,3.19,3.40,8.00,115,5500,18,22 2,?,audi,gas,std,two,sedan,fwd,front,99.80,177.30,66.30,53.10,2507,ohc,five,136,mpfi,3.19,3.40,8.50,110,5500,19,25 Python script: import pandas as pd def azureml_main(dataframe1=None, dataframe2 = None): scored_results =dataframe1[['Scored Labels']] scored_results.rename(columns = {'Scored Labels': 'predicted_price'}, inplace=True) return scored_results

    • @zaidgetsit
      @zaidgetsit 3 หลายเดือนก่อน

      why are there question marks in your raw data sample?

  • @PunkigJones10
    @PunkigJones10 4 หลายเดือนก่อน

    How do I remove the box in the left corner?

  • @sarathshankar3645
    @sarathshankar3645 4 หลายเดือนก่อน

    Thank you

  • @GOberoi
    @GOberoi 4 หลายเดือนก่อน

    Did anyone clear CISA after watching these 2 videos of 15 hours?

    • @Stillscheming
      @Stillscheming 4 หลายเดือนก่อน

      This is a high level review, prior knowledge and depth is recommended to clear the exam

  • @GOberoi
    @GOberoi 4 หลายเดือนก่อน

    Did anyone clear CISA after watching these 2 videos of 15 hours?

  • @phucthai1215
    @phucthai1215 4 หลายเดือนก่อน

    gg

  • @roverteam4914
    @roverteam4914 4 หลายเดือนก่อน

    What is the purpose of the linked service? Wouldn;t it be easier to state only the source and destination folder in the pipeline?

  • @geuelrichardson6824
    @geuelrichardson6824 5 หลายเดือนก่อน

    This video is a life saver

    • @sss350zzz
      @sss350zzz 4 หลายเดือนก่อน

      Please let us know if this video alone as a study guide was enough to pass CISa exam? have you passed? Congrats if you did :)

  • @robertjastrow
    @robertjastrow 5 หลายเดือนก่อน

    "Please don't skip the Ads while watching videos. It will help us to have a little bit money to maintain this channel." I am getting commercials every couple minutes. Not skipping them is not even an option. Awesome material and presentation.

    • @robertjastrow
      @robertjastrow 5 หลายเดือนก่อน

      For reference, I timed several with intervals between 3.75 minutes and 4 minutes between commercial breaks. Very disruptive when trying to digest information. I am unsure if you have a way to manager placement of ads at breaking points in future videos, but if you do, it would be advantageous to get viewers to participate in 'not skipping ads.'

  • @shahidazad939
    @shahidazad939 5 หลายเดือนก่อน

    Awesome !! Videos

  • @roverteam4914
    @roverteam4914 5 หลายเดือนก่อน

    Did I miss something? What is the reason of linking data from the sbdemo04 and the normalized data?

  • @veenarahul8750
    @veenarahul8750 5 หลายเดือนก่อน

    Great video. Thanks

  • @kingslickm0n752
    @kingslickm0n752 5 หลายเดือนก่อน

    Taking this exam in a month and almost done your video. Thank you! Super informative

    • @wholesalingtony1588
      @wholesalingtony1588 4 หลายเดือนก่อน

      Good luck, check back and let us know how it went and what to look out for on the exam.

    • @kingslickm0n752
      @kingslickm0n752 4 หลายเดือนก่อน

      @@wholesalingtony1588 passed! I watched this whole thing and a bit of the next, def helped to pass.

    • @unknownhero2445
      @unknownhero2445 2 หลายเดือนก่อน

      what happened bro. You didnt inform. Please share your experience

  • @LiliPatel999
    @LiliPatel999 5 หลายเดือนก่อน

    Thank you for this very helpful information! I am trying to take the exam in a few months! 🤗

    • @GOberoi
      @GOberoi 4 หลายเดือนก่อน

      Did you clear CISA after watching these 2 videos of 15 hours? If not, what else u read?

  • @PJ_Travels
    @PJ_Travels 6 หลายเดือนก่อน

    hey - this course is great so far! does it include everything needed to pass the exam ? thanks