Search result for Access control course Online Courses & Certifications
Get Course Alerts by Email
Network Security - Advanced Topics
by Aspen Olmsted- 0.0
5 Weeks
This is the 6th course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. Information Security - Authentication and Access Control This is a self-paced course that provides a continuation of network security topics. We conclude the course by leveraging the early work in IPv6, and we spend the time discussing IPv6 security....
$166
Information Security - Advanced topics
by Aspen Olmsted- 0.0
5 Weeks
This is the 3rd course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. Information Security - Authentication and Access Control This is a self-paced course that provides a continuation of information security and cybersecurity topics....
$166
Microsoft Access VBA for Non Programmers - YOU Can Do This!
by Bruce Myron- 4.6
8 hours on-demand video
Microsoft Access VBA can be learned quickly even if you've never done programming! Make complex jobs easy with VBA! "I used to think I was an expert at Access until I took this course. All you need to do the course is some basic experience with Access components: tables, queries, forms and reports....
$12.99
Learn Ethical Hacking From Scratch
by Ashwin Pk- 0.0
4.5 hours on-demand video
Welcome to my comprehensive course on Ethical Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking. Gaining Access - In this section you will learn two main approaches to gain full control over any computer system:...
$12.99
Azure KeyVault Course: Learn about Keys,Secrets,Certificates
by Varinder K- 3.9
1.5 hours on-demand video
In this course you will learn the basics use of Key Vault, its management, Securing key vault Access and Key Vault Auditing. 3) Securing access to Azure Key Vault "Once you are done with this course, you'll have the skill set required to deploy and manage and secure access for Azure Key Vault in your Organization....
$12.99
Cyber Threat Intelligence
by IBM Security Learning Services- 4.7
Approx. 29 hours to complete
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will understand network defensive tactics, define network access control and use network monitoring tools. This course also gives you hands on access to cybersecurity tools important to a system analyst....
Cloud Computing Security
by Edward Chow- 4.6
Approx. 12 hours to complete
In this MOOC, we will learn Cloud Computing basics using AWS as an example, We will guide you to create AWS account, planning AWS resources for your cloud systems, create AWS EC2 instances, access them and configure the popular LAMP web services with MySQL database. Secure Server Configuration and Integrated Access Management...
Complete PHP Course with OOP Start to Finish!
by Usman Raoof- 3.9
2 hours on-demand video
Only Course you need to learn Object Oriented Programming (OOP) in PHP and go from Beginner to Advanced level! This Object Oriented PHP (OOP) course covers everything you need to know to code Object-Oriented PHP. This video tutorial will cover how to extend a class, control access to properties, override methods, and define and implement an interface....
$11.99
MalariaX: Defeating Malaria from the Genes to the Globe
by Marcia Castro , Flaminia Catteruccia , Michael R. Reich , Marcel Tanner- 0.0
8 Weeks
Explore cutting-edge science and technology, and examine policies needed, to control and eliminate malaria. Through foundational lectures and supplemental interviews, this course provides participants with a toolbox of knowledge and skills. The self-paced nature of the course will allow learners to access it at their convenience. Scientific and technological approaches for malaria control and elimination...
$99
Web Development with Java Spring Framework
by Martyshkin Alexey Ivanovich , Sinev Mikhail Petrovich- 3.7
Approx. 19 hours to complete
After completing our course, YOU will understand Dependency Injection, Inversion of Control and how to access data using Hibernate. Students wishing to study in this course should have the basic knowledge of Java programming, XML, JSON, Web Development and SQL queries. Understand the Dependency Injection, Inversion of control and how to access data using Hibernate....