24:49 PgMP Sample Questions and Answers | Program Management Exam Prep PM Expert 3 views - 6 hours ago
2:08 Symmetric vs Asymmetric Encryption Explained: Public Key Cryptography Basics PM Expert 4 views - 17 hours ago
1:03 What is XSRF? Understanding Cross-Site Request Forgery with Examples" PM Expert 6 views - 1 day ago
1:34 SMS Phishing Attacks Explained: Protect Your Bank Account from Smishing PM Expert 4 views - 1 day ago
1:14 What is Enterprise Architecture? Why Your Business Strategy Depends on It PM Expert 1 views - 1 day ago
1:59 Participatory Budgeting in SAFe 6.0: Collaborative Funding Explained PM Expert 2 views - 1 day ago
1:14 Master the Inspect and Adapt (I&A) Event in SAFe 6.0 | Pankaj Sharma PM Expert 7 views - 3 days ago
1:34 SAFe 6 Innovation and Planning (IP) Iteration Explained | Pankaj Sharma PM Expert 1 views - 3 days ago
1:06 Bottom-Up Estimating Explained: Definition, Process, and Examples PM Expert 3 views - 3 days ago
1:12 Monitor Communications in 10 Minutes with Dr. Pankaj Sharma [PM Expert] PM Expert 4 views - 4 days ago
2:22 Master Expected Monetary Value (EMV) Analysis for PMP | Dr. Pankaj Sharma PM Expert 28 views - 4 days ago
2:17 EVM Essentials: How to Track Project Performance | Dr. Pankaj Sharma [PM Expert] PM Expert 23 views - 4 days ago
1:30 Three-Point Estimation Guide: PERT vs. Triangular Distribution Explained PM Expert 4 views - 4 days ago
1:57 Why Your Project Needs an RTM(Requirement Traceability Matrix) | Ensuring 100% Test Coverage PM Expert 8 views - 6 days ago
1:32 Scaled Agile Framework (SAFe) Explained: A Comprehensive Overview PM Expert 24 views - 1 week ago
1:26 Delphi Technique & Wideband Delphi: The Ultimate Guide to Accurate Estimation PM Expert 13 views - 1 week ago