Search result for Security tools and techniques Online Courses & Certifications
Get Course Alerts by Email
Theoretical Foundations of Cryptography for Beginners
by Kaustubh Choudhary- 0.0
2 hours on-demand video
Other hacking courses will teach you tools and techniques needed for hacking. These tools become obsolete as the system evolves. The course begins with Information Security Policy and Principles, teaches you the language of computers (Binary) and finally combines all these knowledge for understanding Cryptography, Crypt-analysis and Digital Signatures....
$12.99
Art: Enhance Your Style Series: 1
by Tamika Barrow- 4.1
2 hours on-demand video
Explore Several Art Styles, Tools, and Techniques There is a lot to discover when utilizing imagination techniques, using intuition to create art, and exploring your own visual voice. In this course there are 9 Main Lectures and 9 Co-Lectures consisting of several Video Demonstrations, useful Class Exercises, and PDFs. Color TheoryElements of Art & Principles of DesignEmotional Color TheoryUnique ToolsPast and Present Day ArtistsArt JournalingImaginationCollagePortfolio...
$11.99
How to Make Heart and Spiral Wire Wrapped Rings
by Mary Monique Littlejohn- 3.9
1 hour on-demand video
8 Designs and Techniques Using Simple Tools Tools that you need and types of wire to use. Most only take 5 inches, and if you use copper wire (called rose gold in Australia), it will cost less than 50 cents to make a ring that you could turn around and sell for $10-$25! Not a bad return on your investment....
$12.99
DevSecOps : Master Securing CI/CD | DevOPs Pipeline(2021)
by Amrit Choudhary- 0.0
5 hours on-demand video
Also in this course, we have compared the traditional DevOps pipeline with the modern DevSecOps pipeline, provided techniques to automate the security scanning at various phases and stages of the build pipeline instead of waiting for the pen testing team to start manual testing once the application is deployed. Security Tools Integration...
$12.99
Leadership Through Design Innovation
by Elizabeth Gerber , Pam Daniels , Ed Colgate , Greg Holderfield- 4.3
Approx. 14 hours to complete
Today’s workplace calls for a new style of leadership to embolden and accelerate innovation. Design offers a novel way to discover market opportunities, experiment to validate concepts and mitigate risk, and deliver value to all stakeholders. Using Design Principles to Innovate and Find Opportunities Tools and Techniques for Design Research The Role of Prototypes in Decision-Making and Leadership...
Network Analysis Using Wireshark 3
by Packt Publishing- 0.0
2.5 hours on-demand video
You will also learn how to secure your network with Wireshark 3 and how to use its command-line tools effectively. Mohamad Mahjoub is a prolific writer and a Cyber Security Expert with over 15 years' experience, including more than 5 years working with Wireshark. He is qualified to offer first-hand professional cyber security services to individuals and companies....
$12.99
Intro to Algorithms
by Michael Littman- 0.0
Timeline Approx. 4 Months
This class will give you an introduction to the design and analysis of algorithms, enabling you to analyze networks and discover how individuals are connected. Top K Via Partitioning and more. Make a tree and strength of connections. Interview with Tina Eliassi-Rad (Professor, Rutgers University) on statistical measures in network and social networks in security and protests....
Free
Related searches
VR and 360 Video Production
by Google AR & VR- 4.7
Approx. 13 hours to complete
Welcome to the Google AR & VR Virtual Reality and 360 video production course! Our mission is to give you the skills you need to get started with your first VR project. This course will introduce you to Virtual Reality and 360 video production, guiding you through a step-by-step process to create VR content....
EC-Council Certified Network Defender Practice Exam (CND v2)
by Viktor Afimov- 0.0
Network security management Network security policies and procedures Windows and Linux security administration Mobile and IoT device security Data security techniques Virtualization technology security Cloud and wireless security Risk assessment tools Basics of first response and forensics Indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE) Endpoint security...
$12.99
Nanotechnology: A Maker’s Course
by Nan M. Jokerst , Carrie Donley , James Cahoon , Jacob Jones- 4.8
Approx. 26 hours to complete
To become a Nanotechnology Maker pioneer, we will introduce you to the practical knowledge, skills, and tools that can turn your nanotechnology ideas into physical form and that enable you to image objects at the nano-scale. Introduction to Nano Measurement Tools Nanofabrication: Patterning and Self-Assembly Ion Beam: Milling and Sectioning Demonstration...