light
Invidious
Log in
ChrISKulit
Subscribe | 15
 RSS


View channel on YouTube
Switch Invidious Instance
Videos
Shorts
Playlists
newest
oldest
popular

21:41

ACYITM1 Module 2

ChrISKulit

Shared 1 week ago

27 views

8:45

Identifying Key Fields in a Database

ChrISKulit

Shared 1 month ago

37 views

4:14

Introduction to Database Management System

ChrISKulit

Shared 5 months ago

34 views

5:56

What is Value Chain Analysis?

ChrISKulit

Shared 5 months ago

102 views

4:10

Data Subject Rights

ChrISKulit

Shared 5 months ago

66 views

2:23

IT Audit vs IS Audit

ChrISKulit

Shared 5 months ago

44 views

3:37

Intro to Risk Management

ChrISKulit

Shared 5 months ago

43 views

3:16

Basic Privacy Terms: Data Subjects, Controller and Processor

ChrISKulit

Shared 6 months ago

64 views

3:46

Personal Information VS Sensitive Personal Information

ChrISKulit

Shared 6 months ago

93 views

1:13

What constitutes a fraud?

ChrISKulit

Shared 6 months ago

17 views

4:31

The CIA Triad

ChrISKulit

Shared 6 months ago

63 views

Source code Documentation
Released under the AGPLv3 on GitHub. View JavaScript license information. View privacy policy.
Donate Current version: 2026.02.07-118d635 @ (HEAD detached at v2.20260207.0) ( v2.20260207.0 )