Search result for Security and identity management Online Courses & Certifications
Get Course Alerts by Email
Introduction to Cloud Identity
by Google Cloud Training- 4.6
Approx. 11 hours to complete
Introduction to Cloud Identity serves as the starting place for any new Cloud Identity, Identity/Access Management/Mobile Device Management admins as they begin their journey of managing and establishing security and access management best practices for their organization. • Explore and apply different security protocols to the domain. Exercise #3 - View and Manage your Users’ Security Settings...
Identity & Access Management-Learn LDAP, SAML, OAuth, OPENID
by Varinder K- 3.5
2.5 hours on-demand video
Identity Access management and Identity Security Identity management, also known as identity and access management, is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. What is Identity Management Access Management Identity Security Identity Provider and Service Provider...
$13.99
Managing Security in Google Cloud
by Google Cloud Training- 4.7
Approx. 7 hours to complete
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. VPC Network Security and Monitoring Threats Mitigated by Google and Google Cloud Cloud Identity and Access Management (Cloud IAM) Cloud Identity and Access Management (Cloud IAM) VPCs for Isolation and Security VPCs for Isolation and Security...
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined....
Cybersecurity Awareness and Innovation
by Iván Martínez , Iván Pau , Román Ramírez- 4.7
Approx. 7 hours to complete
This course empowers students, professionals and wider community to deal with cybersecurity attacks and risks focused on identity management and it is an introduction to the upcoming full course focused on cybersecurity awareness. It is provided a practical overview of challenging issues like identity credentials management and security, e-mail threats and web impersonation, or web hacking....
Check Point Jump Start: Network Security
by Check Point Software Technologies- 0.0
Approx. 5 hours to complete
In this course brought to you by industry leader Check Point, they will cover cybersecurity threats and elements of Check Point's Security Management architecture. Deploying Check Point Security Management Deploying Check Point Security Management Deploying Check Point Security Gateways Creating a Security Policy Creating a Security Policy Logs and Monitoring Logs and Monitoring...
Understanding Google Cloud Security and Operations
by Google Cloud Training- 4.6
Approx. 2 hours to complete
This course examines cost management, security, and operations in the cloud. Next, it explains how the responsibility of data security is shared between the cloud provider and the business, and explores the defense-in-depth security built into Google Cloud. Module 2: Security in the Cloud Fundamental terms: Privacy, security, compliance and availability Identity and access management...
Related searches
Access Controls
by (ISC)² Education & Training- 4.7
Approx. 15 hours to complete
Describe the process of administering identity management life cycle Administer Identity Management Life Cycle Identity Management Life Cycle: Identity Management Identity Management Life Cycle: Provisioning Identity Management Life Cycle: Entitlement Defined Identity Management Life Cycle: Identity Management Identity Management Life Cycle: Provisioning Identity Management Life Cycle: Entitlement Defined Implement Access Controls: Security Architecture and Models...
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. Information and security This video introduces the core information security services and tools provided by cryptography....
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Risk Management Process: Risk Visibility and Reporting Risk Management Process: Risk Visibility and Reporting Security Assessment Activities: Participate in Security and Test Results...