Search result for Computer security and networks Online Courses & Certifications
Get Course Alerts by Email
The Foundations of Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 9 hours to complete
In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it. The Cybersecurity Personnel and the Security Department (Lecture 1. The Cybersecurity Personnel and the Security Department (Quiz 1....
HCIA-Routing & Switching V2.5 | H12-211
by IT HELP- 0.0
Ethernet and IP based data forwarding processes. TCP/IP network protocols and data encapsulation. VRP commands for basic navigation and configuration. IPv4 addressing principles, address design and subnetting. TCP/IP supporting applications such as Ping, Tracert, FTP, and Telnet. Link Aggregation application and configuration. How network security is ensured by using network security technologies and firewalls....
$12.99
Enterprise and Infrastructure Security
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Mobile security and cloud security hyper-resilience approaches are also introduced. Security Awareness, Compliance, Assessments, and Risk Security Assessment and Audit Mobility Security and Deception Using Deception and Honey Pots for Security...
Introduction to Embedded Machine Learning
by Shawn Hymel , Alexander Fred-Ojala- 4.8
Approx. 17 hours to complete
Thanks to this, running deep neural networks and other complex machine learning algorithms is possible on low-power devices like microcontrollers. This course will give you a broad overview of how machine learning works, how to train neural networks, and how to deploy those networks to microcontrollers, which is known as embedded machine learning or TinyML....
Learn Ethical Hacking From Scratch
by Zaid Sabih- 4.6
15.5 hours on-demand video
Become an ethical hacker that can hack computer systems like black hat hackers and secure them like security experts. Welcome this comprehensive Ethical Hacking course! This course assumes you have NO prior knowledge and by the end of it you'll be able to hack systems like black-hat hackers and secure them like security experts!...
$19.99
Azure Storage Security Guide
by CloudTAC -Information Systems Governance and Security- 0.0
3 hours on-demand video
Azure Security Engineers implement security controls and threat protection, manage identity and access, and protect data, applications, and networks in cloud and hybrid environments as part of end-to-end infrastructure. This course provides an in-depth study of the security features needed to secure your storage assets and objects in on Microsoft Azure....
$12.99
Real world Hacking & Penetration testing: Version-1
by Atul Tiwari- 4
6 hours on-demand video
This course covers, Computer Attacks, Networks Attacks, Web Applications Penetration Testing and Security, Exploits, VAPT, Automated Attacks, Firewall & AV Evasion, Veil-Evasion, DARKNET, Wireless attacks, Social-Engineering attacks, Best Commercial Tools and my tips at professional level from real world examples of penetration testing. This 100% practical course is for anyone wanting to be a competent Information Security Professional and Penetration Tester....
$14.99
Related searches
Algorithms on Graphs
by Alexander S. Kulikov , Michael Levin , Daniel M Kane , Neil Rhodes- 4.7
Approx. 55 hours to complete
If you have ever used a navigation service to find optimal route and estimate time to destination, you've used algorithms on graphs. We will finish with minimum spanning trees which are used to plan road, telephone and computer networks and also find applications in clustering and approximate algorithms. Previsit and Postvisit Orderings...
Cisco CCNA 200-301 : Full Course For Networking Basics
by Networkel Inc.- 4.5
18.5 hours on-demand video
This CCNA course will help you to improve yourself about networking basics, switching & routing technologies, IPv4 and IPv6. 5- Security Fundamentals 6- Network Automation and Programmability ! If you don’t understand about a topic in the lesson, you can easily rewind the video and watch that part again and again....
$20.99
Hands-on: Complete Penetration Testing and Ethical Hacking
by Muharrem AYDIN- 4.5
19.5 hours on-demand video
★★★★★ All applications and tools recommended are free. In addition to proficiency in basic computer skills and use of the command line, ethical hackers must also develop technical skills related to programming, database management systems (DBMS), use of the Linux operating system (OS), cryptography, creation and management of web applications and computer networks like DHCP, NAT, and Subnetting....
$21.99