Courses
Discover thousands of courses from top institutions and platforms worldwide
Level
Course Type
Duration

YouTube
Explore the intricacies of Tetragon auditing and enforcement in this informative 35-minute conference talk presented by John Fastabend at a Linux Foundation event. Gain valuable insights into the mechanisms and applications of Tetragon's auditing capabilities, as well as its role in enforcing security policies within Linux environments. Delve into the technical aspects of this powerful tool and learn how it can enhance system monitoring and protection in modern computing infrastructures.

AWS Skill Builder
AWS SimuLearn is an online learning experience that pairs generative AI-powered simulations with hands-on practice to help individuals learn how to translate business problems into technical solutions through the simulation of dialog between a customer and a technology professional. AWS SimuLearn: Compliance Enforcement In this AWS SimuLearn assignment, you will review a real-world scenario helping a fictional customer design a solution on AWS. After the design is complete, you will build the proposed solution in a guided lab within a live AWS Console environment. You will gain hands-on experience working with AWS services, using the same tools technology professionals use to construct AWS solutions. How does it work? AWS SimuLearn is powered by generative AI that enables you to have life-like conversations with AI customers. Your responses to the AI are evaluated to help develop your soft skills like communication. and problem solving. As you provide the correct responses, a quiz agent with test you and you can also get help from Dr. Newton, the helper agent when you get stuck. Once you provide all of the correct responses for the solution you will move to building it and validating in a live AWS Console environment. AWS SimuLearn: Compliance Enforcement - Services Used Compliance Enforcement AWS Config, AWS Systems Manager

Study.com
Get caught up in class or learn something new about law enforcement with our informative and helpful Introduction to Law Enforcement course. Short video and text lessons present the important topics you need to know in order to get a great score on a test or have a working knowledge of the criminal justice system.

Udemy
Understanding what de-escalation is, how to use it without jeopardizing officer safety in the process. What you'll learn: Understand the importance of deescalation and know how to apply it to their job.The participant will understand how stress can affect the decision making process. The participant will learn key words and facial expressions indicative of an imminent threat.The participant will define the term de-escalation.The participant will better understand when to use force and what other techniques can be used to de-escalate situations.The participant will understand how their voice can be important when dealing with people. This course is geared towards law enforcement. It presents different techniques and communication skills an officer can use to de-escalate a situation without compromising officer safety. This course utilizes some of the most up to date videos to show both good and not so good efforts of de-escalation. As we have seen, just because we are within law and policy does notnecessarily result in a positive outcome in the eyes of the public. Using these skills, officers can minimize risk to themselves as well as the suspect. They can also have the most positive outcome/interaction in the eyes of the community, avoiding bad press.Ideveloped this course with the assistance of Thomas Gleason. Thomas Gleason, a retired Captain, spent thirty years serving in city, county and state law enforcement. He began his career in Alabama as a patrolman in New Brockton, Alabama. He then moved to Florida and accepted a position as a Sheriff’s Deputy in Polk County, where he became a member of the Emergency Response Team (SWAT). This lead to a position with the City of Lakeland where he gained experience as a patrolman, a patrol supervisor, a field training officer, a School Resource Officer, and a Detective Sergeant over the missing persons, juvenile crimes, and sexual abuse crimes unit, Shocap programs.. In 1999, he developed and delivered a presentation entitled “Law Enforcement’s Response to Critical Incidents at Schools and Ways to Handle Critical Incidents” to the Florida Department of Education Statewide Safety Summit. While working with the City of Lakeland he also assisted in founding the Domestic Abuse Response Team, was one of the first officers in the Lakeland Community Oriented Policing Program, served as Chairman of the District 14 Juvenile Justice Board, served as Chairman of the Polk County Juvenile Justice Counsel, and served as the Second Vice-President of Florida Association of School Resource Officers from 1997-2000. In 2000, he was chosen as part of a team to teach Dynamics of Domestic Violence to Moldavian police officers and volunteers. In 2001 he attended Crisis Intervention training and developed and taught the City’s in-service training to all sworn officers. He then expanded his experience by accepting a position with Florida Department of Law Enforcement, Capitol Police, as their Lieutenant of Special Operations. In this position he supervised the Capitol Police Canine Unit, Explosives Unit and the Investigations Unit. He also coordinated training, recruiting, and hiring of new officers. He trained officers with Capitol Police in the areas of proper critical incident response, use of firearms, and observing and eliminating armed security threats. During his tenure there he was involved in drafting and implementing the Capitol Complex Operations Plan for former Governor Jeb Bush’s 2003 inauguration and in preparing the Operations Plan for the visit by Prime Minister Benjamin Netanyahu and his security detail. In 2009 he was a subject matter expert on the Florida Department of Law Enforcement’s Standards and Training Commission Committee which was tasked with reviewing and revamping the Basic Recruit Training Curriculum for the State of Florida. In 2009, the Florida Department of Financial Services offered him a position as Captain over training and acquisitions. He accepted this position and became responsible for developing and overseeing training for the one-hundred and fifty detectives working throughout the State of Florida who investigate insurance fraud. During his tenure there he oversaw the transition from Sig. Sauer 9 MM to Glock .40 caliber and the training of all officers after the transition. His passion for law enforcement training also led him to the position of Coordinator of the Law Enforcement Academy for the Florida Public Safety Institute from 2006-2009. In 2014, he was an instructor at the High Liability Instructor’s Conference held at Florida Public Safety Institute teaching Handling Veterans, Officer Safety Response, and Managing a Training Unit. He has been an instructorfor the Florida Public Safety Institute, Department of Justice in the Valor program. He has experience teachingin the areas of: human diversity; patrol procedures; first aid; firearms; police pursuit policies; instructor techniques, and handling the mentally ill, police officer safety, De-escalation Skills. Thomas Gleason holds a Bachelor’s Degree in Criminal Justice and a Master’s Degree in Education. He has published two articles dealing with police training and domestic violence.

YouTube
Explore the intersection of blockchain technology, privacy concerns, and law enforcement challenges in this informative 57-minute session. Delve into the complexities of maintaining individual privacy while addressing the needs of law enforcement in the context of blockchain systems. Gain insights into the potential conflicts between privacy-preserving technologies and regulatory requirements, and examine potential solutions for balancing these competing interests. Discover how blockchain's transparency and immutability impact both privacy protection and criminal investigations, and consider the implications for future policy and technological developments in this rapidly evolving field.

Codecademy
Have you ever wondered how computers break down language? This course introduces text parsing techniques using regular expressions (regex) and Part-of-Speech (POS) Tagging with NLTK.

YouTube
Explore the intricacies of parsing in this conference talk from JSConf Hawaii 2020. Delve into the process of transforming code from characters in a file to computer-understandable instructions. Learn about the fundamental components of languages, from letters to grammars, and their role in conveying meaning. Discover the purpose and functionality of parsers, with a focus on building a search query parser using JavaScript. Follow along as the speaker guides you through the parser construction process, including tokenization and creating a data structure that represents the query, enabling UI development. Gain insights into the inner workings of programming languages and enhance your understanding of how computers interpret and execute code. Access the accompanying slides for visual reference and additional information.

YouTube
Explore a comprehensive conference talk that delves into the intricacies of penetration testing, focusing on the journey from initial access in a parking lot to full system compromise. Learn about various techniques and methodologies employed by security professionals to identify and exploit vulnerabilities in organizational networks. Gain insights into the mindset of ethical hackers as they navigate through different stages of a penetration test, from reconnaissance to exploitation and post-exploitation. Discover real-world scenarios and practical examples that illustrate the potential risks associated with inadequate security measures and the importance of robust defense strategies.

YouTube
Explore language parsing and automatic binding generation in Rust through this 26-minute conference talk presented at FOSDEM 2018. Delve into topics such as lexical analysis, abstract syntax trees (ASDs), syntax libraries, and code generation. Learn how to leverage parsing techniques for various use cases, understand the importance of parsing in programming, and discover the power of macros in Rust. Gain insights into function declarations, syntax matching, and practical code examples. Originally presented by Nikita Baksalyar, this talk offers a comprehensive overview of Rust parsing concepts for developers looking to enhance their understanding of language processing and code generation techniques.

YouTube
Explore the complex landscape of law enforcement data requests and corporate disclosure obligations in this 20-minute conference talk from PEPR '25. Examine how the phrase "law enforcement response" encompasses various legal processes including wiretap orders, pen register orders, lawful intercept requests, emergency disclosure requests, and national security letters, while understanding why these processes are deliberately opaque and resist comprehension. Learn about the concept of "surveillance intermediaries" coined by Lawfare fellow Alan Rozenshtein and discover how these entities serve as crucial links between law enforcement and data access. Analyze the standardization opportunities available for basic information requests like subpoenas and warrants, and understand the increasing risks posed by aggressive nation-state intelligence operations targeting sensitive corporate infrastructure. Gain insights into practical strategies that privacy professionals can implement to better defend surveillance intermediaries and their critical systems, while navigating the intersection of data privacy, legal compliance, and national security concerns in the modern digital landscape.

YouTube
Explore dynamic policy enforcement strategies for microservice architectures in this insightful conference talk presented by Ash Narkar from Styra Inc. Gain valuable knowledge on implementing effective security measures, managing access controls, and ensuring compliance within complex distributed systems. Learn how to leverage dynamic policies to adapt to the ever-changing landscape of microservice environments, enhancing overall system security and flexibility.

YouTube
Explore KubeArmor, a cloud-native runtime security enforcement system, in this hour-long tutorial. Learn how KubeArmor restricts pod, container, and node behavior at the system level using Linux security modules like AppArmor, SELinux, and BPF-LSM. Discover how it generates detailed alerts and telemetry events with container, pod, and namespace identities through eBPF technology. Follow along as Mofi (@moficodes) provides a comprehensive first look at KubeArmor's functionality and its application in securing Kubernetes applications. Gain valuable insights into enhancing your cloud-native security posture and protecting your containerized environments.

edX
Gain a solid understanding of international anti-corruption legislation and how it is enforced with this short course. Written by subject matter experts, this course explores: Global anti-corruption legislation – Learn about trends in global anti-corruption legislation, US and UK acts and how to identify the provisions, prohibitions, and obligations of these Acts Enforcement - Appreciate the range of enforcement measures available to regulators and sanctions for non-compliance. Understand individual accountability and the incentives for compliance or self-disclosure of non-compliance This course is ideal for those working in the first and second lines of defence or those who want to increase their professional agility by learning about new areas of risk.

CodeSignal
Master parsing and writing techniques for scientific data using both TXT and CSV formats. This course provides practical skills for working with tabular data, ensuring you can manage various structured data files effectively.

YouTube
Learn about vacuum packing machines in this 17-minute educational video from NPTEL-NOC IITM. Explore the principles, components, and operation of vacuum packing technology used in food preservation and packaging industries.

YouTube
Watch a 38-minute auto repair video demonstrating how to diagnose and fix a non-functioning parking brake preventing a vehicle from passing New York State inspection. Follow along as the mechanic removes the rotors to reveal the underlying brake issue and performs the necessary repairs, showing that only one brake component needs replacement. Learn practical automotive repair techniques and gain insights into common parking brake problems through this hands-on demonstration from South Main Auto Repair LLC.

YouTube
Explore the cycle structure of random parking functions in this 26-minute conference talk by Mei Yin from the University of Denver, presented at the International Conference on Probabilistic, Combinatorial and Asymptotic Methods for the Analysis of Algorithms (AofA 2025) hosted by the Fields Institute on May 8, 2025. Delve into mathematical concepts related to parking functions and their probabilistic properties, gaining insights into this specialized area of combinatorial mathematics.

Udemy
Designing of Simple Car Parking Management System Using C++ What you'll learn: You will able to create a small car parking management system using C++ Design Simple Car Parking Management System Using C++. The Project will cover the 1.Entry of Vehicle2.Show All Vehicle details standing in Parking Area3.Delete Vehicle Record4.Exit From ProgramDesigning of Car Parking Management System Using C++The course is designed for Freshers and professionals who need to meet the capabilities of the C++. Through the video lectures you'll learn the usage of C++ Step by step and also design one small project with the help of C++Major Topics use in C++1. Header Files2. System Define Function3. Console Screen Functions4. Do-While Loop5. Switch-Case Statement6. Return and Default Functions7. Void Function8. Special CharactersBecome an C++ Progamming user.We start at the project fromvery beginning progressing with more than helpful videos. All you need for work on different functions of C++ and feel confident with every aspect of C++.• Designed to help beginners get started • Lessons start right at the very beginning • Progresses slowly with more than 20 helpful videos • A big 2 hours 39 Minutes of expert instruction • Learn How to Work in C++ • Master the most common uses of C++• Learn How to create project in C++ • Use the full palette of functions • Experienced users can fill in gaps in knowledge • Work faster with better results and greater confidence • Discover how to create simple Car Marking Management System With Help of C++. Now you can learn C++ from the very beginning. Beautifully designed for beginners to get a great start while helping more experienced users fill in any gaps in their knowledge. You enjoy expert tutorial videos that clearly show you how to accomplish every aspect of C++.This course is just what you want for being confident with C++ in the workplace. Also gives you everything you need to know for personal use.The self-learning video format lets you study on your own schedule. Watch videos as you have time, then come back to learn more later.At the end of the project user is able to design and save the enter Vechile details in C++. Now you can become a master at using one of the world's most popular computer applications – C++ Programming. Who is the target audience? • Anyone new to C++ Progamming or having basic working knowledge of Progamming Language.

YouTube
Explore a comprehensive 40-minute conference talk that delves into the integration of Common Expression Language (CEL) with Kubernetes for enhanced policy enforcement. Master the fundamentals of CEL and its implementation in Kubernetes environments while discovering practical applications in admission control, resource management, and security protocols. Through live demonstrations, learn to effectively utilize CEL and CEL Playground for creating sophisticated, human-readable expressions that streamline policy management. Gain valuable insights into enhancing policy expressiveness and flexibility, making complex Kubernetes deployments more manageable. Designed for administrators, developers, and DevOps professionals, acquire hands-on experience in testing and validating CEL expressions to transform your approach to Kubernetes policy management and enforcement.

Coursera
In today’s global food system, understanding how food regulations shape what we eat, how it’s labeled, and how it’s imported is more important than ever. Navigating U.S. Food Regulations: Safety and Enforcement is a dynamic 4-week Coursera course that explores the complex landscape of U.S. food laws, enforcement mechanisms, and the role of advocacy in shaping policy. From the Food Safety Modernization Act (FSMA) to the regulation of dietary supplements and infant formula, learners will gain a practical understanding of how food safety is maintained and how consumer protection is enforced. Led by instructor Dr. Jessica Hartke, you’ll explore how regulations evolve in response to public health needs and industry practices. This course features insights from a distinguished team of experts, including food law scholar Bryan Endres, nutrition scientist Deshanie Rai, regulatory strategist Karleigh Bacon, and food policy specialists Robbie Burns and Nate Matusheski. You’ll also hear from guest lecturers who are leaders in advocacy and policy, offering firsthand accounts of how regulations are influenced and enforced. Whether you're a student, professional, or curious consumer, this course will equip you with the tools to critically evaluate food regulations and their impact on public health and industry. This course is part of the College of ACES suite of online programs. To learn more about online programs from the College of ACES and explore ways to apply your Coursera work toward a degree program at the University of Illinois, visit: https://aces.illinois.edu/online.