Search result for Security management Online Courses & Certifications
Get Course Alerts by Email
Research Data Management and Sharing
by Helen Tibbo , Sarah Jones- 4.7
Approx. 14 hours to complete
After completing this course, learners will understand the diversity of data and their management needs across the research data lifecycle, be able to identify the components of good data management plans, and be familiar with best practices for working with data including the organization, documentation, and storage and security of data....
Introduction to Vulnerability Management
by Corey Charles- 0.0
4 hours on-demand video
Risk Management Fundamentals It covers risk management and covers the basis of penetration testing vs vulnerability management as well. The course also includes lab simulation of vulnerability management processes. The lab introduces the students to Nessus and how vulnerabilities are tracked in the security scanner based on the respective critical level....
$12.99
Microsoft Cybersecurity Pro Track: Threat Detection
by Cristian Calinescu- 0.0
6 hours on-demand video
In this course, we will examine the concepts of Threat Detection in an Enterprise using the Microsoft tools and security services for On-Premises, Hybrid and Cloud environments. This course is the second course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional ....
$12.99
Software Requirements Prioritization: Risk Analysis
by Kristen Walcott-Justice- 4.6
Approx. 18 hours to complete
Bringing Security into Risk Analysis Incorporating Risk Management into Your Process Integrating Risk Management Risk Management through Analysis, Assessment, Prioritization | Conclusions - Slides Risk Management...
CISSP certification practice questions: Domain 7 & 8 - 2020
by Thor Pedersen | CISSP • PMP • CISM- 0.0
CISSP certification practice questions for CISSP Domain 7 and 8 - Security Operations & Software Dev. CISSP DOMAIN 7: Security Operations (13% of the weighted questions - 160 questions) Foundational security operations concepts Incident management Patch and vulnerability management Change management processes Physical security CISSP DOMAIN 8: Software Development Security (10% of the weighted questions - 100 questions)...
$13.99
Certified Wireless Security Professional (CWSP)
by Stone River eLearning- 0.0
13.5 hours on-demand video
Certified Wireless Security Professional (CWSP) The Certified Wireless Security Professional (CWSP) course is designed on the CWSP certification exam curriculum recommended by CWNP. The course teaches the latest enterprise wireless LAN security and auditing techniques to the students. 11 standard, the inner-workings of each authentication method used with wireless LANs, and every class and type of WLAN security solution available....
$17.99
A Complete Guide to Modern DevOps Implementation
by Packt Publishing- 4
9 hours on-demand video
Automate your infrastructure, enhance its security using DevOps tools to overcome modern challenges in software delivery DevOps enables rapid application development and follows a traditional way of performing security checks. Towards the end of this course, you'll implement configuration management, monitoring, and security using DevOps tools and technology framework....
$9.99
Related searches
Mastering Odoo v11.0 Development
by Mohamed Magdy- 2.6
2 hours on-demand video
Create New Objects, Views, Security Groups and Rules, Wizard and Reports. Extend (Inheritance) Existing Objects, Views, Security Groups and Rules . Manage Odoo security framework by creating groups and assign the access rights for each group....
$11.99
CIA Exam, Part 3 – Business Knowledge for Internal Auditing
by IT HELP- 3.5
Information Security (25%) Financial Management (20%)...
$12.99
Hybrid Cloud Service Mesh with Anthos
by Google Cloud Training- 4.8
Approx. 8 hours to complete
Traffic Management with Istio and Envoy Introducing the Istio Abstract Model for Traffic Management Intro to Security in the Service Mesh Service to Service Security with Mutual TLS in the Service Mesh Managing Policies and Security with Service Mesh Use service mesh security features for service-service authentication, user authentication, and policy-based service authorization....