Search result for Network tools and technologies Online Courses & Certifications
Get Course Alerts by Email
Ethical Hacking & Penetration Testing with Kali Linux
by Packt Publishing- 0.0
14 hours on-demand video
Contents and Overview You will learn how to test your network against various types of attack and develop a network-testing environment that can be used to test scanning tools and techniques. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment. He is a specialist in ethical hacking and cybersecurity....
$12.99
Artificial Intelligence for Civil Engineers: Part 1 (2020)
by Srinidhi Ranganathan- 3
1 hour on-demand video
Future advancements in Artificial Neural Network (ANN), fuzzy logic and genetic algorithms will mean that civil engineering and construction industry will benefit in terms of optimisation that is the foremost factor, speed of processes and cost reduction, while young inexperienced engineers will be replaced by AI robots & technologies....
$12.99
Deep Learning for Business
by Jong-Moon Chung- 4.4
Approx. 8 hours to complete
Your smartphone, smartwatch, and automobile (if it is a newer model) have AI (Artificial Intelligence) inside serving you every day. The second part focuses on the core technologies of DL and ML systems, which include NN (Neural Network), CNN (Convolutional NN), and RNN (Recurrent NN) systems. 3 Neural Network Learning (Backpropagation)...
Pentesting with Kali Linux
by Packt Publishing- 0.0
9.5 hours on-demand video
A Hands-on guide to hacking wireless, web and network security with Kali Linux There are many tools available on the market for detecting security loopholes and networking attacks. Contents and Overview You will start by setting up the environment and learn service identification and network scanning techniques. You will master various exploitation and post exploitation techniques....
$12.99
CompTIA Security+ SY0-501 Practice Questions
by Sanjeev Ranadey- 4.9
Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them. Understand the principles of organizational security and the elements of effective security policies. Know the technologies and uses of cryptographic standards and products. Install and configure network- and host-based security technologies. Describe how wireless and remote access security is enforced....
$12.99
Collaborative Foresight: How to Game the Future
by Jane McGonigal- 4.9
Approx. 15 hours to complete
It’s a unique opportunity to join creative and strategic forces with people who are making the tech that’s inventing the future, and with fellow futures thinkers like you. Many thanks to the Enlight Foundation and the Enlight Collaborative, which provided a grant to support the creation of this course. Anticipate long-term harms of new technologies and how to prevent them...
Password Cracking: Brute-Forcing, Cryptography
by Toshendra Sharma- 0.0
2 hours on-demand video
This course mainly aims to inform you about information security, increase your security awareness, and provide significant information needed to use the tools for testing your security. This is an updated course that covers all the latest concepts and technologies to support everyone right from complete beginners to advanced learners. You are an IT engineer or a network administrator....
$12.99
Related searches
Blockchain and Cryptocurrency Explained
by Robert Dittmar , Andrew Wu- 4.7
Approx. 9 hours to complete
The sudden rise in the value of Bitcoin and other cryptocurrencies, and its subsequent decline, focused the world’s attention on cryptocurrencies as a means of payment. Blockchain technology powers Bitcoin and has been hyped as the next new, transformative technology. Introduction to Blockchain and Crypto Classifying blockchain technologies Blockchain Network and Data Processing...
Jump Start: Maestro Hyperscale Network Security
by Tim Ramsey- 0.0
6 Weeks
In this course, you will learn about the Check Point Maestro Hyperscale Network Security solution, an innovative way to simplify your network security workflow orchestration and seamlessly scale up your existing security gateway infrastructure on demand. You will receive an introduction to the Check Point Maestro Hyperscale Network Security solution, including the basic components and concepts in a Maestro deployment....
$149
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Secure Big Data Systems & Operate and Secure Virtual Environments Operate and Secure Virtual Environments: Network Security Operate and Secure Virtual Environments: Network Security...