Solutions Glossary
27 videos • 89 views • by Solutions Review
1
What is a CITIZEN DATA SCIENTIST? | #SolutionsGlossary
Solutions Review
Download
2
What is DATA LINEAGE a.k.a DATA LIFE-CYCLE? | @SolutionsReview Glossary #Shorts
Solutions Review
Download
3
What is BIG DATA? | #SolutionsGlossary
Solutions Review
Download
4
Master Data Management – Explained | #SolutionsGlossary
Solutions Review
Download
5
iPaaS (Integration Platform as a Service) aka Cloud-Based Integration – Explained #SolutionsGlossary
Solutions Review
Download
6
Key Performance Indicator (KPIs) – Explained | @SolutionsReview #Shorts
Solutions Review
Download
7
What is a DATA WAREHOUSE? – @SolutionsReview Glossary #Shorts
Solutions Review
Download
8
What is BEHAVIORAL ANALYTICS? – Behavioral Analytics Explained | @SolutionsReview #shorts
Solutions Review
Download
9
What is ADVANCED ANALYTICS? – Advanced Analytics Explained | @SolutionsReview Glossary #Shorts
Solutions Review
Download
10
What is DATA SCIENCE? | Quick Explanation of Data Science | @SolutionsReview Glossary #Shorts
Solutions Review
Download
11
What is SCALABILITY? / Scalability Explained | @SolutionsReview Glossary #Shorts
Solutions Review
Download
12
What is an Advanced Persistent Threat? – APT Explained | @SolutionsReview Glossary #Shorts
Solutions Review
Download
13
What is a CISSP? – Certified Information Systems Security Professional Explained | #Shorts
Solutions Review
Download
14
What is CFAA? – Computer Fraud and Abuse Act Explained | @SolutionsReview Glossary #Shorts
Solutions Review
Download
15
What is DLP? – Data Loss Prevention Explained | @SolutionsReview Glossary #Shorts
Solutions Review
Download
16
What is a DDoS Attack? – Distributed Denial-of-Service Explained | @SolutionsReview Glossary #Shorts
Solutions Review
Download
17
What is an ENDPOINT PROTECTION PLATFORM? – EPP Explained | @SolutionsReview Glossary
Solutions Review
Download
18
What is EVENT CORRELATION? | Cybersecurity Explained | @SolutionsReview Glossary #Shorts
Solutions Review
Download
19
What is FILE INTEGRITY MONITORING? — Cybersecurity Explained | @SolutionsReview Glossary #Shorts
Solutions Review
Download
20
What is a Digital HONEYPOT? – Cybersecurity Honeypots Explained | @SolutionsReview Glossary #Shorts
Solutions Review
Download
21
What is GRC? – Governance, Risk Management and Compliance Explained | @SolutionsReview #Shorts
Solutions Review
Download
22
What is INCIDENT RESPONSE? – Incident Response Plan Explained | @SolutionsReview Glossary #Shorts
Solutions Review
Download
23
What is INFORMATION SECURITY? – InfoSec Explained | @SolutionsReview Glossary #Shorts
Solutions Review
Download
24
What is UTM? – Unified Threat Management Definition | @SolutionsReview Glossary #Shorts
Solutions Review
Download
25
What is a ZERO DAY ATTACK? – 0 Day Exploits Explained | @SolutionsReview Glossary #Shorts
Solutions Review
Download
26
What is PENETRATION TESTING? – Pen Test Explained | @SolutionsReview Glossary #Shorts
Solutions Review
Download
27
What is a NEXT GENERATION FIREWALL? – NGFWs Explained | @SolutionsReview Glossary #Shorts
Solutions Review
Download