Search result for Threat protection Online Courses & Certifications
Get Course Alerts by Email
Cyber Threat Intelligence
by IBM Security Learning Services- 4.7
Approx. 29 hours to complete
You will understand data protection risks and explore mobile endpoint protection. • Discuss data loss prevention and endpoint protection concepts and tools. • Identify the key concepts around threat intelligence. Threat Intelligence Threat Intelligence Overview Threat Intelligence Strategy and External Sources Threat Intelligence Platforms Threat Intelligence Frameworks Threat Intelligence Sources Threat Intelligence and Cybersecurity Knowledge Check...
Microsoft 365 Mobility and Security (Exam MS-101)
by Intellezy Trainers- 0.0
5.5 hours on-demand video
This course will cover topics from the Microsoft MS-101 exam, which measures a student’s ability to accomplish the following technical and administrative tasks: Identify threat vectors; use Secure Score; configure Azure Identity Protection; configure Exchange online protection; implement modern device services; implement Microsoft 365 security and threat management; and manage Microsoft 365 governance and compliance....
$15.99
AZ-500 - Microsoft Azure Security Engineer - Practice Tests
by Practice Makes Perfect- 0.0
Candidates for this exam should have subject matter expertise implementing security controls and threat protection, managing identity and access, and protecting data, applications, and networks in cloud and hybrid environments as part of an end-to-end infrastructure. Implement Platform Protection (35-40%)...
$12.99
API Security on Google Cloud's Apigee API Platform
by Google Cloud Training- 4.6
Approx. 8 hours to complete
Lab Intro: JSON Threat Protection Lab Intro: Regex Threat Protection Lab Intro: Internal Threat Protection...
Microsoft 365 Security Administration (Exam MS-500)
by Intellezy Trainers- 4.4
7.5 hours on-demand video
Specifically, time will be spent managing Microsoft identity and access, password and identity protection, identity synchronization, access management, Microsoft 365 security, threat intelligence, mobile device management, information protection, encryption, data loss prevention, cloud application security, archiving and retention, and data governance....
$12.99
Foundations of Public Health Practice: Health Protection
by Wendy Kwok , Dr Richard J Pinder- 4.9
Approx. 9 hours to complete
The Health Protection course is the fourth instalment of the wider Foundations of Public Health Practice specialisation from Imperial College London's Global Master of Public Health (MPH). Health protection outbreak scenario: Introduction Health protection outbreak scenario: Conclusion Health protection in practice Module Three: Environmental hazards and strategic health protection threats An introduction to strategic health protection...
Introduction to Risk Management
by Qasim Ijaz- 4.7
Approx. 10 hours to complete
In this course, you will learn about risk assessment techniques and how to implement a number of strategies that will ensure the protection of assets. Threat Modeling Introduction to Threat Modeling How to Threat Model Diagramming Your Threat Model Threat Modeling Assessment...
Related searches
The Basics of Cyber Security 2020
by Faisal Ammari- 4.1
1 hour on-demand video
Identify and distinguish cyber threats and protection Match appropriate types of controls to the actions of different threat actors...
$14.99
Microsoft Cybersecurity Pro Track: Threat Detection
by Cristian Calinescu- 0.0
6 hours on-demand video
Learn about Microsoft Threat Detection concepts, tools and services (with Hands-on Lab) and Threat Detection concepts In this course, we will examine the concepts of Threat Detection in an Enterprise using the Microsoft tools and security services for On-Premises, Hybrid and Cloud environments. List the capabilities of on-premise threat detection and mitigation tools...
$12.99
Azure Storage Security Guide
by CloudTAC -Information Systems Governance and Security- 0.0
3 hours on-demand video
Azure Security Engineers implement security controls and threat protection, manage identity and access, and protect data, applications, and networks in cloud and hybrid environments as part of end-to-end infrastructure....
$12.99