Search result for Infrastructure as code security vulnerability Online Courses & Certifications
Get Course Alerts by Email
Homeland Security & Cybersecurity Connection - It's Not About the Terrorists
by Richard White- 4.7
Approx. 11 hours to complete
Welcome to Course 1 in CS4950, Homeland Security and Cybersecruity. In this course we examine the origins of homeland security and its connection with cybersecurity. The vulnerability of critical infrastructure had not gone unnoticed. Following 9/11, critical infrastructure protection and cybersecurity were designated core missions in the 2002 Homeland Security Act establishing the new Department of Homeland Security....
Cyber Threat Intelligence
by IBM Security Learning Services- 4.7
Approx. 29 hours to complete
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. • Describe security vulnerability scanning technologies and tools. • Recognize application security threats and common vulnerabilities. Security Intelligence What is Data Security and Protection Application Security Defects - Writing Secure Code...
CompTIA Security+ Certification Preparation: CyberSecurity
by CyberTraining 365- 0.0
10.5 hours on-demand video
The S+ certification by CompTIA is an internationally recognized credential ensuring ground-level security proficiency as well as skills for organization and security professionals to provide information, infrastructure, application and operational security. Following similar study formats about Wireless Network Security and Access Control Fundamentals brings us to more practical subjects such as Authentication, Performing Vulnerability Assessments and Conducting Security Audits....
$12.99
Website Hacking / Penetration Testing & Bug Bounty Hunting
by Zaid Sabih- 4.6
10 hours on-demand video
Remote File Inclusion - This vulnerability can be used to load remote files, exploiting this vulnerability properly gives you full control over the target web server. Cross Site Scripting (XSS) - This vulnerability can be used to inject javascript code in vulnerable pages, we won't stop at that, you will learn how to steal credentials from users (such as facebook or youtube passwords) and even gain full access to their computer....
$19.99
Climate Adaptation in Africa
by Mark New- 4.8
Approx. 19 hours to complete
Historically, climate-related hazards such as drought, flooding, pest and disease outbreaks, coastal storms and heat waves have had devastating impacts on people and the environment in which they live. Adaptation, Resilience, Maladaptation and Vulnerability Unpacking Vulnerability In Conversation with Gina Ziervogel: Climate Vulnerability Adaptation, Resilience, Vulnerability and Maladaptation Week 1: Climate, Vulnerability and Development...
A Complete Guide to Modern DevOps Implementation
by Packt Publishing- 4
9 hours on-demand video
This comprehensive 3-in-1 course takes a step-by-step practical approach to automate your infrastructure and overcome day-to-day IT infrastructure challenges as well as protect your organization with the collaboration of DevOps and security using DevOps tools and technology framework. You will understand using security as code with the intent of making security and compliance consumable as a service....
$9.99
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Malicious Code and Activity: Security Awareness Training Malicious Code and Activity: Security Awareness Training Operate and Secure Virtual Environments: Network Security...
Related searches
Engineering Maintainable Android Apps
by Dr. Douglas C. Schmidt , Michael Walker , Dr. Jules White- 4.5
Approx. 9 hours to complete
These lessons will demonstrate the benefits of good software engineering practices that are targeted at creating maintainable code for mobile apps. Software Engineering as Search Code Coverage Security & Sustainability I Security & Sustainability Security I Quiz Security & Sustainability II Security Vulnerability Walkthrough Security II Quiz...
Pentesting with Kali Linux
by Packt Publishing- 0.0
9.5 hours on-demand video
A Hands-on guide to hacking wireless, web and network security with Kali Linux Managing security has always been a challenge for any security professional. As a consultant, he did penetration tests and security assessments in various industries, such as insurance, banking, telco, mobility, healthcare, industrial control systems, and even car production....
$12.99
ISO 27001 Cybersecurity manager. Guidelines.
by Cristian Lupa- 4.4
4 hours on-demand video
- the concepts of Confidentiality, Integrity, Authentication and Non-Repudiation as critical elements for any security system; - human resources security - from screening to employment, the contractual requirements and disciplinary process plus the termination and change of employment - access controls and authentication aspects plus how to manage privileges so they won't generate security breaches...
$15.99