Catalog Search Results
Author
Pub. Date
[2018]
Language
English
Description
"Creating and implementing an effective online security plan is vital in keeping a business safe, but how can the non-technical business manager participate in such planning without the language and understanding required to do so? In this course, Emmanuel Henri explores the basics of cybersecurity from a layman's perspective. He discusses what cybersecurity is and why it's important; he details the conversations managers must have with their teams...
3) The family
Pub. Date
℗2013.
Language
English
Description
A mafia boss and his family are relocated to a sleepy town in France under the witness protection program after snitching on the mob. Despite Agent Stansfield's best efforts to keep them in line, Fred Blake and his family can't help resorting to old habits by handling their problems the 'family' way. Chaos ensues as their former Mafia cronies try to track them down, and scores are settled in the unlikeliest of settings.
Pub. Date
2022.
Language
English
Description
4+ Hours of Video Instruction 4+ hours of deep-dive training covering key system privacy and data protection concepts Overview: Cybersecurity is not only about preventing data breaches and hunting for attackers, it also involves many aspects of system and data privacy. With more than 4 hours of video training, System and Privacy Data Protection LiveLessons provides learners with an understanding of how to protect and store existing data, as well as...
Author
Pub. Date
[2015]
Language
English
Description
"Fraud and abuse aimed at organizations big and small is becoming more and more sophisticated. In this unique O'Reilly video collection--taken from live sessions at Strata + Hadoop World 2015 in San Jose, California--you'll learn about security tools and techniques for dealing with this growing and ever-present threat."--Resource description page.
Author
Pub. Date
2021.
Language
English
Description
This fully accredited, practitioner-led course will equip you with the key skills involved in planning, implementing and maintaining an ISO 27001-compliant ISMS. It will teach you: " The nine key steps involved in planning, implementing and maintaining an ISO 27001-compliant ISMS; " Information security management best practices to ensure the confidentiality, integrity and availability of data; " How to structure and manage your ISO 27001 project;...
Author
Pub. Date
[2016]
Language
English
Description
"In this video, data management expert John Adler leads you through the maze of data governance issues facing companies today--security breaches, regulatory agencies, in-house turf battles over who controls the data, monetizing data, and more. In this fast-paced and thorough discussion of how to plan for, implement, and run a successful data governance program, you'll get an overview of the ways data has been managed in the past and how the smart...
Author
Series
Pub. Date
2015.
Language
English
Description
"Information security directly impacts virtually every type of business. While related issues appear in the media more and more, it's typically in a fragmented fashion that really doesn't help give the people tasked with protecting organizational data and other assets a "big picture" view of what the real threats and vulnerabilities are, or what steps should be taken to mitigate them. In this video training, Scott offers a relatively brief, coherent...
Pub. Date
2019.
Language
English
Description
"GDPR Foundation training enables you to learn the basic elements to implement and manage a compliance framework with regard to the protection of personal data. During this training course, you will understand fundamental privacy principles and become familiar with the role of the Data Protection Officer."--Resource description page
10) Litterbug
Series
Adventures of Carlos Caterpillar volume 4
Pub. Date
[2006]
Language
English
Appears on list
Description
While the rest of their schoolmates participate in cleaning their school grounds, Carlos and Antonio head out for a day of fun in the sun at the local beach. When they return, they discover that their busy friends had experienced an earth-shattering day.
Author
Pub. Date
[2016]
Language
English
Description
"In this Introduction to Hadoop Security training course, expert author Jeff Bean will teach you how to use Hadoop to secure big data clusters. This course is designed for users that are already familiar with the basics of Hadoop. You will start by learning about tooling, then jump into learning about Hadoop insecurities. From there, Jeff will teach you about authentication with MIT Kerberos, authentication with Active Directory, and authorization....
Author
Pub. Date
2019.
Language
English
Description
"Learn best practices in certificate management for SQL Server. Certificates are small snippets of text that are foundational to encrypting and decrypting data. Watch this video to learn how to safely store certificates and prevent them from falling into the wrong hands and compromising the very data you are using them to protect. Also learn how to ensure that you still have access to needed certificates following a catastrophe or other data loss...
13) So undercover
Pub. Date
2012.
Language
English
Description
Molly, a tough-as-nails, street-smart private investigator, is recruited by the FBI to go undercover in a college sorority and protect the daughter of a key witness in a mob case.
Author
Pub. Date
[2015]
Language
English
Description
"Headlines are filled with stories of businesses and agencies that have been breached. The FBI director has said there are two types of companies--those that have been breached and those that don't know it yet. Attacks against your business are inevitable. Are you prepared for when they happen? Have you taken steps to be able to determine that the breach has occurred so you aren't one of those companies where your adversary has been inside your perimeter...
Pub. Date
[2023]
Language
English
Description
Mavka the soul of the forest has been chosen by the supreme spirits to become the forest's new guardian. But when she meets a talented human musician named Lucas a man on the hunt for a mysterious tree with the power to give life, she is faced with an impossible choice between her newfound love and her duty to the spirits. Can humans and the forest live in harmony, or will greed and vice destroy them both?
17) Bullitt
Pub. Date
[2007]
Language
English
Description
Bullitt (McQueen) needs to keep a trial's star witness, Johnny Ross, out of sight and out of danger for 48 hours. However, before the night is out, the witness is dying of gunshot wounds in a San Francisco hospital.
Pub. Date
2019.
Language
English
Description
"It's one of today's most important mobility challenges: How do you empower employees to be productive, while still protecting the massive amounts of data moving through your organization's mobile environment? Microsoft Enterprise Mobility + Security (EMS) provides the mobile productivity your employees want and the data protection your company needs. Through our EMS Learning Path, learn how EMS provides the tools to achieve both, providing your organization...
Author
Pub. Date
[2017]
Language
English
Description
"'Big data' is ubiquitous, but legal considerations regarding the collection and use of such data can get overlooked with significant consequences for all involved. This video analyzes the legal considerations affecting the handling of big data across several key industries, including finance, healthcare, data brokers, retail, hospitality, social media, mobile, IoT, and games. The legal analysis focuses on unfair and deceptive trade practices, privacy...
Series
Pub. Date
[2021]
Language
English
Description
Understanding how to keep data operations secure and protect data is a critical part of any organizations day-to-day business. With more than 3 hours of video training, Secure Operations and Protections LiveLessons dives into the methodologies behind how organizations and secure operation centers observe, collect, and secure data. This course provides the learner with an understanding of basic operations and architectures that a Security Operations...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request