--
{"text":"Chinese (Traditional Han, Taiwan)","icon":"flagstrap-icon flagstrap-tw"}
{"text":"Swedish (Sweden)","icon":"flagstrap-icon flagstrap-se"}
{"text":"German","icon":"flagstrap-icon flagstrap-de"}
{"text":"Polish","icon":"flagstrap-icon flagstrap-pl"}
{"text":"Portuguese (Brazil)","icon":"flagstrap-icon flagstrap-br"}
{"text":"Portuguese","icon":"flagstrap-icon flagstrap-pt"}
{"text":"Turkish","icon":"flagstrap-icon flagstrap-tr"}
{"text":"Hindi (India)","icon":"flagstrap-icon flagstrap-in"}
{"text":"Arabic (Saudi Arabia)","icon":"flagstrap-icon flagstrap-sa"}
{"text":"Korean (South Korea)","icon":"flagstrap-icon flagstrap-kr"}
{"text":"Chinese","icon":"flagstrap-icon flagstrap-cn"}
{"text":"Spanish","icon":"flagstrap-icon flagstrap-es"}
{"text":"Czech","icon":"flagstrap-icon flagstrap-cz"}
{"text":"Italian","icon":"flagstrap-icon flagstrap-it"}
{"text":"Russian","icon":"flagstrap-icon flagstrap-ru"}
{"text":"Dutch","icon":"flagstrap-icon flagstrap-nl"}
{"text":"Danish (Denmark)","icon":"flagstrap-icon flagstrap-dk"}
{"text":"Spanish (Chile)","icon":"flagstrap-icon flagstrap-cl"}
{"text":"Thai","icon":"flagstrap-icon flagstrap-th"}
{"text":"Japanese (Japan)","icon":"flagstrap-icon flagstrap-jp"}
{"text":"Sinhala","icon":"flagstrap-icon flagstrap-si"}
{"text":"Hebrew (Israel)","icon":"flagstrap-icon flagstrap-il"}
{"text":"English (United States)","icon":"flagstrap-icon flagstrap-us"}
{"text":"French","icon":"flagstrap-icon flagstrap-fr"}
{"text":"Greek (Greece)","icon":"flagstrap-icon flagstrap-gr"}
Home
Trending
Sign In
Audios and Videos
Videos
Audios
Channels
Browse Channels
Categories
Default
105
Ebook Quality Assurance
33
Learning.moodle.3.5
36
Awareness Security Fundamentals
1
Commvault and Metallic
1
CyberSecurity
1
DevSecOps
41
DevSecOps Git vs Cloud Computing
13
Exchange Administrator
46
Hand On Labs
4
ITSM_ITAM_SIEM
3
IBM IT Support Training
3
Microsoft 365 vs BIM
1
QuizMaker in LMS
1
showcase
1
veeam backup
7
VMware vCenter Appliance 7x
4
vSAN ICM 6.7
23
vSphere Optimize vs Scale 7.x
1
Play a Link
Help
About
Contact
awareness cybersecurity fundamentals
Play All
0:06:57
21- Securing supplier relationships-20221014_220101
0 Views
1 week ago
cybersecurity
0:07:38
19- privacy-20221014_175444
0 Views
1 week ago
cybersecurity
0:05:14
25- Teleworking-20221017_215521
0 Views
1 week ago
cybersecurity
0:06:56
17- Physically securing information and devices-20221011_224754
0 Views
1 week ago
cybersecurity
0:08:03
13- Information Risk management-20221011_135742
770 Views
1 week ago
cybersecurity
0:07:12
20- Protecting paperwork-20221014_214401
0 Views
1 week ago
cybersecurity
0:08:04
16- Measuring information security-20221011_222057
0 Views
1 week ago
cybersecurity
0:08:03
12- Information Risk management-20221011_135742
0 Views
1 week ago
cybersecurity
0:06:13
10-Mind of a hacker-20221011_123332
0 Views
1 week ago
cybersecurity
0:05:59
24- Social media-20221017_214142
0 Views
1 week ago
cybersecurity
0:06:34
23- Social engineering-20221017_211937
0 Views
1 week ago
cybersecurity
0:05:56
22- Security of mobile devices-20221017_210623
0 Views
1 week ago
cybersecurity
0:05:42
26- Viruses-20221007_164634
0 Views
1 week ago
cybersecurity
0:04:37
2- Backup-20221007_143447
2 Views
1 week ago
cybersecurity
0:06:02
18- Password-20221014_135257
0 Views
1 week ago
cybersecurity
0:05:29
15- Management role in cybersecurity-20221011_221011
0 Views
1 week ago
cybersecurity
0:08:07
14- Insider threats-20221011_142211
0 Views
1 week ago
cybersecurity
0:07:02
11- Network security-20221011_132115
0 Views
1 week ago
cybersecurity
0:06:47
9-Protecting intellectual property-20221011_103511
0 Views
1 week ago
cybersecurity
0:06:28
8-Cybersecurity Incidents-20221010_233254
0 Views
1 week ago
cybersecurity
0:06:21
6- Human error-20221009_202957
0 Views
1 week ago
cybersecurity
0:05:42
7-Identity theft-20221010_151959
0 Views
1 week ago
cybersecurity
0:05:05
5- Importance of Cybersecurity-20221009_113914
0 Views
1 week ago
cybersecurity
0:05:58
3- Access control-20221009_105301
0 Views
1 week ago
cybersecurity
0:04:30
4- Email security-20221009_120908
8 Views
1 week ago
cybersecurity
0:06:22
1- Cloud security-20221007_162453
0 Views
1 week ago
cybersecurity
Series
Videos
This website uses cookies
🍪 so we can provide you with the best user experience. Without these cookies, the website simply would not work.
I agree