Search result for Security Online Courses & Certifications
Get Course Alerts by Email
IT Infrastructure and Emerging Trends
by Soumya Sen- 4.9
Approx. 8 hours to complete
Today organizations are either embracing digital technologies to improve their businesses or being disrupted by entrants with such capabilities. Therefore it is important for managers and executives of all organizations to learn about various technologies and apply them in innovative ways. Some of the most important trends in Information Technology are in mobile, cloud, security, and blockchains....
Blockchain Evolution and Technology Concepts
by AICPA- 4.7
Approx. 3 hours to complete
This specialization offers the latest developments in blockchain technology through a highly engaging learning experience with animated video components and intuitive course flow to maximize your knowledge retention. Blockchain Evolution and Technology Concepts Welcome to the course Module introduction Money and currency overview Currency and cryptocurrency overview Blockchain: Key terms and concepts...
Hands-On Labs in Google Cloud for Security Engineers
by Google Cloud Training- 0.0
Approx. 5 hours to complete
Security is an uncompromising feature of Google Cloud services, and Google Cloud has developed specific tools for ensuring safety and identity across your projects. In this course you will get added hands-on practice understanding and securing resources with multiple Google Cloud services including Google Kubernetes Engine (GKE). qwiklabs. Welcome to Security in Google Cloud: Hands-On Practice...
Understanding, Using, and Securing Crypto and Digital Assets
by AICPA- 4.8
Approx. 3 hours to complete
This specialization offers the latest developments in blockchain technology through a highly engaging learning experience with animated video components and intuitive course flow to maximize your knowledge retention. Blockchain — Understanding, Using, and Securing Crypto and Digital Assets Introduction Crypto asset security overview Hot and cold wallets Wallets question debrief Software and hardware wallets...
Security Awareness Training
by (ISC)² Education & Training- 4.6
Approx. 2 hours to complete
The security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. One of the best ways to protect the organization is to institute a company-wide security-awareness training initiative. The training is modular and does not have to be completed in one sitting....
Blockchain Opportunities Beyond Crypto Assets
by AICPA- 4.7
Approx. 3 hours to complete
This specialization offers the latest developments in blockchain technology through a highly engaging learning experience with animated video components and intuitive course flow to maximize your knowledge retention. Blockchain Opportunities Beyond Crypto Assets Module introduction Transactions, blocks, and fees overview UTXO versus account models Throughput and settlement Zero-knowledge proof Zero-knowledge proof (continued)...
Check Point Jump Start: Maestro Hyperscale Network Security
by Check Point Software Technologies- 0.0
Approx. 4 hours to complete
In this course brought to you by industry leader Check Point, they will cover the Maestro Orchestrator initial installation, creation and configuration of security group via the web user interface and SmartConsole features. This course provides a demonstration of the Maestro product. Course will prepare you for their exam, #156-412, at PearsonVUE....
Security Governance & Compliance
by Jacob Horne- 4.8
Approx. 9 hours to complete
Students are introduced to the field of cyber security with a focus on the domain of security & risk management. Topics include the fundamental concepts and goals of cybersecurity (the CIA triad), security governance design, the NIST cybersecurity framework, relevant laws and regulations, and the roles of policies, strategies, and procedures in cybersecurity governance....
Introduction to Python for Cybersecurity
by Howard Poston- 4.6
Approx. 4 hours to complete
This course it the first part of the Python for Cybersecurity Specialization. Learners will get an introduction and overview of the course format and learning objectives. Introduction to Python for Cybersecurity Introduction to Python for cybersecurity Introduction to Python Introduction to MITRE ATT&CK and Shield Python for Cybersecurity Resources Python for Cybersecurity...
Seguridad informática: defensa contra las artes oscuras digitales
by GoogleTop Instructor- 4.9
Approx. 27 hours to complete
Este curso cubre una amplia variedad de conceptos, herramientas y mejores prácticas de seguridad de TI. Introduce amenazas y ataques, y las muchas formas en que pueden aparecer. Te daremos algunos antecedentes de algoritmos de cifrado y cómo se utilizan para salvaguardar los datos. Luego, nos sumergiremos en los tres sistemas de seguridad de la información: autenticación, autorización y contabilidad....