Courses
Discover thousands of courses from top institutions and platforms worldwide
Level
Course Type
Duration

Udemy
Certification course What you'll learn: After successfully completing this course, the students shall be able to:Cyber Defense AnalysisIncident ResponseCyber security ManagementSystems AnalysisVulnerability Assessment and Management This course was originally designed only for the U.S. Agency for Government Intelligence. The CNFE certification program is designed to prepare students to master true advanced networking forensics strategies through the use of open source laboratories in an exclusive cyber-range.The CNFE takes digital and network forensic skills to the next level by navigating through over twenty network forensic theme modules.The CNFE provides practical training through our laboratory simulations that replicate real-world situations that include the inspection and recovery of network data, Physical Surveillance, Information Collection, Analysis, Wireless Attacks and SNORT.The course focuses on the centralization and analysis of monitoring mechanisms and networking devices. SIGN UP NOW! This course was originally designed only for the U.S. Agency for Government Intelligence. The CNFE certification program is designed to prepare students to master true advanced networking forensics strategies through the use of open source laboratories in an exclusive cyber-range.The CNFE takes digital and network forensic skills to the next level by navigating through over twenty network forensic theme modules.The CNFE provides practical training through our laboratory simulations that replicate real-world situations that include the inspection and recovery of network data, Physical Surveillance, Information Collection, Analysis, Wireless Attacks and SNORT.The course focuses on the centralization and analysis of monitoring mechanisms and networking devices. SIGN UP NOW!

YouTube
Explore a comprehensive collection of historical videos covering pivotal moments, influential figures, and societal developments that have shaped our world. Delve into topics ranging from ancient civilizations to modern political events, examining wars, social movements, technological advancements, and cultural shifts. Gain insights into the lives of notable leaders, the evolution of nations, and the forces that have driven human progress. Analyze key historical events such as World War II, the Civil Rights Movement, and the Cold War through expert commentary and archival footage. Discover lesser-known stories and perspectives that offer a nuanced understanding of history. Enhance your knowledge of global affairs, political systems, and societal changes while developing a deeper appreciation for the complexities of human history.

Kadenze
"Projectionists -- pull curtain before titles" This note was attached to cans of film reels containing Otto Preminger's 1955 classic, The Man with the Golden Arm. Before this, movie theaters didn't even open the curtain until the opening credits were over. The Man with the Golden Arm marked a turning point when film titles became more than just a dull roll of credits and became part of the artistic statement of the film itself. Preminger had collaborated with legendary graphic designer Saul Bass (Links to an external site.) to create a simple but arresting cut out animation that changed how we view the title sequence forever. Since that time, title sequence design has become an art form of it own, blending graphics, typography, as well as both traditional and experimental film and animation techniques to create unique visions that are sometimes more fascinating than the movies and television shows they were created for.

Udemy
Uncover Fraud & Safeguard Finances, Techniques, Strategies, & Ethical Considerations, CFE Exam Prep & Tips. What you'll learn: Gain a deep understanding of what fraud is, its various forms, and the significant impact it can have on individuals and organizations.Learn about the role of a CFE, their ethical obligations, and the tools and techniques they use to uncover and combat fraud.Guided through the systematic process of fraud examination, from initial suspicion to gathering evidence and reporting findings.Ethical dilemmas that may arise during fraud examinations will be explored, along with guidance on how to navigate them with integrity and professionalism.Become familiar with various types of fraud.Discover the importance of internal controls in fraud prevention and learn how data analytics can be used for fraud detection.Cover the criminal and civil law aspects of fraud cases, the role of regulatory bodies, and the processes of gathering and preserving evidence.Develop advanced skills in conducting interviews, forensic accounting, data analysis, surveillance, and undercover operations.Developing robust fraud prevention programs.Gain insights into cross-border fraud investigations, money laundering schemes, global anti-fraud initiatives, and more.Prepare for the Certified Fraud Examiner (CFE) certification exam, demonstrating their expertise and commitment to combatting fraud.and much more IMPORTANT before enrolling:This course is not intended to replace studying any official vendor material for certification exams, is not endorsed by the certification vendor, and you will not be getting the official certification study material or a voucher as a part of thiscourse.Welcome to the "Comprehensive Course in Fraud Examination and Prevention," you'll embark on a comprehensive journey through the world of fraud. This course is designed to equip both beginners and experienced professionals with the knowledge and skills needed to combat fraud effectively.A Certified Fraud Examiner (CFE) is a professional designation awarded by the Association of Certified Fraud Examiners (ACFE) to individuals who have demonstrated expertise in the field of fraud examination and prevention. The CFE credential is highly regarded in the fields of accounting, auditing, and fraud investigation.Explore the intricacies of fraud, its various forms, and the profound impacts it has on individuals and organizations. Dive into the role and responsibilities of a Certified Fraud Examiner (CFE) and gain insights into the ethical considerations that guide this profession.You'll be guided through the systematic process of fraud examination, from initial suspicion to the collection of evidence and the reporting of findings. Throughout the course, you'll learn to navigate ethical dilemmas with integrity, adhering to the code of conduct for CFEs.Gain a deep understanding of different types of fraud, including financial statement fraud, occupational fraud, corruption, bribery, money laundering, cyber fraud, and identity theft. Recognize the unique characteristics and red flags associated with each type.Explore fraud prevention and detection strategies, including the crucial role of internal controls and the use of data analytics for detection. Learn to identify red flags and warning signs, master interview techniques, and understand the art of document examination.Delve into the legal aspects of fraud examination, including criminal and civil law in fraud cases, the involvement of regulatory bodies, and the processes of gathering and preserving evidence. Real-life case studies will illuminate these concepts.Develop advanced skills in fraud investigation techniques, including conducting interviews, forensic accounting, data analysis, surveillance, and undercover operations. Discover how to effectively report your findings while ensuring compliance with legal requirements.Explore fraud prevention strategies, such as developing robust prevention programs, conducting risk assessments, implementing internal auditing procedures, and guarding against vendor and supplier fraud. Understand the significance of whistleblower programs in fraud prevention.Additionally, you'll gain insights into international aspects of fraud examination, including cross-border investigations, money laundering schemes, global anti-fraud initiatives, and the cultural and ethical challenges involved in international fraud cases.Certified Fraud Examiners are experts in investigating and preventing fraud in various settings, including corporate organizations, government agencies, law enforcement, and consulting firms. They play a critical role in identifying and addressing fraudulent activities, such as embezzlement, financial statement fraud, corruption, and money laundering.The CFE credential is highly respected and recognized internationally, making CFEs valuable assets in the fight against fraud and white-collar crime.As a culmination, prepare for the Certified Fraud Examiner (CFE) certification exam, demonstrating your expertise and dedication to combatting fraud. This course will empower you to become a proficient CFE, equipped to safeguard organizations from the pervasive threat of fraud. Join us on this educational journey to master the art and science of fraud examination and prevention.Thank you.
Microsoft Learn
This module introduces Mobile Application Management (MAM). Students will learn about considerations for implementing MAM and will be introduced to the management of MAM using Intune and Configuration Manager.After this module, you should be able to: Explain Mobile Application Management. Understand application considerations in MAM. Explain how to use Configuration Manager for MAM. Use Intune for MAM. Implement and manage MAM policies. In this module, you'll master deploying applications using Intune, Configuration Manager, Group Policy, and Microsoft Store Apps. These powerful tools and techniques will equip you to manage and maintain diverse applications across your organization effectively.After this module, you should be able to: Explain how to deploy applications using Intune and Configuration Manager. Learn how to deploy applications using Group Policy. Understand Microsoft Store Apps. Learn how to deploy apps using Microsoft Store Apps. Learn how to configure Microsoft Store Apps. In this module, you're introduced to managing apps on Intune managed devices. The module will then conclude with an overview of how to use IE Mode with Microsoft Edge.After this module, you should be able to: Explain how to manage apps in Intune. Understand how to manage apps on nonenrolled devices. Understand how to deploy Microsoft 365 Apps using Intune. Learn how to configure and manage IE mode in Microsoft Edge. Learn about app inventory options in Intune.

Pluralsight
In this series of lessons, we'll learn to design a professional looking title block by customizing the layout of our sheet. Software required: Revit 2014. In this series of lessons, we'll learn to design a professional looking title block by customizing the layout of our sheet. We'll begin by setting a border and title block for our sheet. From there, we'll learn to add text, a logo and labels that can be customized to your firm's standards. And finally, we'll take a look at how to add views like plans and elevations onto your customized title block. Software required: Revit 2014.
Microsoft Learn
Ransomware attacks are growing at an alarming rate. But what exactly is a ransomware attack? This module will define ransomware, determine the scope of the ransomware problem, describe who ransomware victims are, and will touch on a few notable ransomware "families" that everyone should know.By the end of this module, you'll be able to: Define ransomware. Identify different attack types. Explain what a ransomware family is. Describe a real-life ransomware attack. How will you know if you are a victim of ransomware? This module will cover the top ransomware families for today's threat landscape and the vectors they use to enter and infect your organization's files and systems.By the end of this module, you'll be able to: Describe the nature of the threat landscape and an attack vector Describe different entry points and how they are used to breach your security Describe the specialization of ransomware Prevention against ransomware is essential because such an attack can lead to major disruption for you or your business. In this module, you'll learn about best practices to protect yourself against ransomware and other extortion-based attacks.By the end of this module, you'll be able to: Describe different defense mechanisms used to prevent ransomware. List the steps to prevent ransomware. Describe how antivirus/antimalware tools work. Any organization or individual runs the risk of a ransomware attack. As such, the ability to promptly spot and respond to an attack remains essential for successful recovery. In this module, you'll learn how to detect, and recover from a ransomware attack.By the end of this module, you'll be able to: Describe the different indicators of a ransomware attack. Describe the different measures used to identify an attack. Describe how to investigate a ransomware attack. Describe how to recover from a ransomware attack.

YouTube
Explore the new Medical Examiner System in England and Wales through a 31-minute video lecture by Prof. Jason Payne-James. Learn about the role of national medical examiners, their responsibilities in providing safeguards for the public, patient safety monitoring, and contributing to the learning from deaths agenda. Discover the system's background, implementation timeline, and structure, including the roles of medical examiner officers. Gain insights into the impact of the Covid-19 pandemic on the system and its implementation at Norfolk Norwich University Hospital. Understand the results achieved so far and future prospects for this important initiative in the UK healthcare system.

YouTube
Explore the concept of connascence in software development through this in-depth conference talk. Delve into the definition and implications of connascence as a measure of coupling between software components. Examine how excessive connascence can impact system maintainability and flexibility. Compare two different web application architectures, evaluating their levels of connascence and coupling. Learn about various types of connascence, including control coupling, named kinases, and race conditions. Gain practical insights through script examples and discussions on multiple wikis. Understand how connascence analysis can be applied to real-world software systems to improve design and maintainability.

YouTube
Explore the critical role of threat intelligence in industrial cybersecurity through this informative 18-minute video featuring Dragos VP of Threat Intelligence, Sergio Caltagirone, and Cyberwire's Dave Bittner. Gain insights into the definition and importance of threat intelligence, its impact on reducing organizational risk profiles, and its application in protecting vulnerable industrial assets. Discover how threat intelligence enhances detection, response, and prevention strategies for securing critical infrastructure. Examine major cyber risks affecting the Oil & Gas and Utilities sectors, and learn how to differentiate threat intelligence meanings in the context of operational technology (OT) environments. Understand the business implications of threat intelligence and its integration into cybersecurity policies for industrial control systems.

YouTube
Explore how First American Data & Analytics revolutionized its data extraction processes using batch inference on the Databricks Platform in this 40-minute conference talk. Discover how this leading property-centric information provider overcame the challenges of extracting data from millions of historical title policy images and achieved remarkable results including a 75% reduction in project timelines and 70% cost reduction. Learn about the strategic integration of AI technologies that enhanced the efficiency of title insurance processes and improved the home-buying experience for buyers, sellers, and lenders. Gain insights into how First American optimized its data processing capabilities through the power of collaboration and innovation, transforming complex data challenges into scalable solutions. The session features presentations by Madhu Kolli, Sr Director AI at First American Financial, and Prabhaker Narsina, VP of Data and AI at First American Financial, who share their expertise on implementing batch inference solutions for large-scale document processing in the title insurance industry.

YouTube
Learn how to optimize SEO titles in Shopify in this 15-minute video tutorial, part of a comprehensive Shopify SEO course. Discover effective techniques for crafting compelling and search engine-friendly titles to improve your online store's visibility. Gain insights from digital marketing expert Umar Tazkeer on best practices for title optimization specific to the Shopify platform. Access additional free courses on topics like Google Ads, Facebook Ads, GA4, and digital marketing fundamentals through the provided links. Connect with the instructor on various social media platforms for more digital marketing tips and services.

LinkedIn Learning
Follow the founders of Title Case, a business and workshop dedicated to the love of the letterform, as they put their talents to work in pursuit of letters uniquely their own.

YouTube
Explore the world of steak in this comprehensive 23-minute video that examines and cooks 12 different types. Dive into the unique attributes of various steak cuts, cattle breeds, diets, and aging processes. Learn about popular options like Angus and Hereford, as well as lesser-known varieties such as Piedmontese and Brahman. Discover the differences between grass-fed and grain-finished beef, and understand the impact of aging methods on flavor and texture. From the luxurious Wagyu to the lean Bison, gain insights into how each steak's characteristics affect its taste and preparation. Perfect for steak enthusiasts and curious cooks alike, this informative guide will enhance your understanding and appreciation of this beloved culinary staple.

YouTube
Explore the role and responsibilities of Medical Examiners in this informative talk by Dr Alan Fletcher, Chair of the Royal College of Pathologists Medical Examiners Committee. Gain insights into the non-statutory medical examiners system introduced in 2019, understand the purposes and steps involved in the medical examination process, and learn about coroner referrals, data collection, and training. Discover how Medical Examiners interact with the bereaved, navigate pilot sites, and handle various causes of death. Examine real-world case examples to deepen your understanding of this crucial role in the medical field.

YouTube
Embark on a culinary journey exploring 12 diverse egg varieties in this informative video. Discover the unique characteristics and cooking methods for eggs ranging from common chicken and duck to exotic ostrich and rhea. Follow along as Amiel Stanek examines, prepares, and tastes each type, including seafood delicacies like salmon roe and ossetra caviar. Gain insights into the flavors, textures, and cooking techniques for quail, goose, pheasant, and Guinea hen eggs, as well as unconventional options like lobster roe and snail caviar. Learn how to create innovative dishes, such as a deviled ostrich egg, while expanding your knowledge of egg varieties from both land and sea.

Pluralsight
Knowing how to create and use Titles in Premiere Pro CC is essential if you create videos with Premiere Pro CC. In this course, Premiere Pro CC Titles you will learn how to use the Title Designer, how to create still, rolling, and crawling titles, and how to use the different types of text options available. You'll also learn about standard title motion and placement. Finally, you'll explore how to create and save title templates and styles. When you're finished with this course, you will know all there is to know about creating and working with titles in Premiere Pro CC. Software required: Adobe Premiere Pro CC.

edX
This course from the Stanford Center for Health Education (SCHE) provides you with an overview of the health information ecosystem and outlines strategies to navigate it. You’ll discover how to identify elements of the health information ecosystem and the sources of health news. You’ll also examine the impact of virality on the spread of health information, misinformation, and disinformation; learn how to identify and engage with credible and false information; and unpack ways to craft messages that counter information disorder. Finally, by exploring practical strategies and communication styles for conducting difficult conversations, you’ll be better prepared to engage with bad news, negotiate changing mindsets, and give and receive feedback.

Craftsy
Create scrapbook pages that offer a lifetime of enjoyment, with guidance from scrapbook expert Lisa Andrews. Learn how to keep your pages cohesive by matching different fonts to your page design and theme. Next, fearlessly work with supersized titles and die-cut letters for striking designs. Plus, seamlessly integrate pre-made titles onto your pages by customizing them for a one-of-a-kind look. Discover how to confidently work with negative space and layering for a fierce look you’ll love. Then, enhance your titles with perfect placement, and by highlighting the right words and colors. You’ll even find out how to tell a compelling story with your pages by including the what, where and when of each sentiment. Plus, make your journaling live large and frame your page with your story to highlight your hard work. Finally, learn the list method for pulling more details from your memory for pages that are packed with detail you’ll love returning to each year!

YouTube
Learn how to create a retro-inspired title sequence inspired by the iconic "Back to the Future" movie franchise in this 35-minute tutorial. Explore advanced techniques for designing and animating a visually striking title that captures the essence of 1980s sci-fi aesthetics. Master the art of combining typography, special effects, and motion graphics to produce a nostalgic yet modern title sequence that pays homage to the classic film series.