Search result for Device and data security Online Courses & Certifications
Get Course Alerts by Email
Foundations of Computer Science
by Aspen Olmsted- 4.8
Approx. 16 hours to complete
In the course sequence you will learn to write programs that utilize both procedural and object oriented techniques to solve business problems. In courses two through four, we will role up our sleeves and start coding in Visual Basic. Algorithms, History of Computing and Algorithm Efficiency Computer Hardware and Organization Computer Networks, Cloud Computing and Information Security...
Palo Alto Networks Cybersecurity Gateway II
by James Dalton- 4.7
Approx. 16 hours to complete
Gateway II Course Information - Textbook and Work Roles IMPORTANT: NDG LAB SETUP AND ENROLLMENT Gateway II: Module 2 - Cybersecurity Landscape and Threats Reading: Cybersecurity Landscape and Threats Gateway II: Module 3 - Cloud, Virtualization and Storage Security Video: IaaS and SaaS Reading: Cloud, Virtualization and Storage Security Data and Network Appliance Backups...
Cyber Security SOC Analyst - Network Attacks from Scratch
by Vikram Saini- 0.0
2 hours on-demand video
Become Security Analyst with the learning and handling cyber attacks to detect and stop them on Network There is very demand for SOC Analyst (L1) and Sr SOC Analyst (L2) in Security Operation Centre. Learn the technology on which cyber security works and step followed by professionals to stop and prevent attacks in real time ...
$19.99
CCIE Security ASA 9.6.1 Deep Dive: Labs
by Baldev Singh- 0.0
42 hours on-demand video
Master Cisco Adaptive Security Appliance (ASA). The Cisco ASA Family of security devices protects corporate networks and data centers of all sizes. It provides users with highly secure access to data and network resources - anytime, anywhere, using any device. This course will help you learn and master Cisco Adaptive Security Appliance (ASA)....
$12.99
Google Cloud Big Data and Machine Learning Fundamentals
by Google Cloud Training- 4.7
Approx. 12 hours to complete
Through a combination of presentations, demos, and hands-on labs, participants get an overview of Google Cloud and a detailed view of the data processing and machine learning capabilities. This course showcases the ease, flexibility, and power of big data solutions on Google Cloud. Introduction to the Data and Machine Learning on Google Cloud Course...
Microsoft Azure Management Tools and Security Solutions
by Microsoft- 4.7
Approx. 9 hours to complete
Security needs to happen at the application level, at the data level, and the network level. When you have completed this course, you will be able to identify security threats in Microsoft Azure, make security recommendations, and detect and respond to events using security and event management. Detect and respond to security threats by using Azure Sentinel...
Design and Implementation of Digital Health Interventions
by Lisa Danquah , Céire Costelloe- 0.0
Approx. 31 hours to complete
These session cover areas to include data regulations, examples of data breaches in digital health, the challenges and opportunities of technology adoption and implementation with a focus on the non-adoption, abandonment, scale-up, spread and sustainability framework (NASSS Framework). Design and Implementation of Digital Health Interventions Human Centered Design and evaluating complex health needs Regulations and data in DH...
Related searches
Exploring AWS IoT
by Stephen Borsay- 4.6
7.5 hours on-demand video
Device to AWS Cloud integration: Programming Embedded Devices and managing data in AWS IoT This course explores the various features of device to cloud communication using Amazon AWS IoT Core on a AWS free tier account. Creating rules-based actions to AWS services we will send, store, file, manipulate, graph and analyze our sensor data through a variety of important AWS applications....
$15.99
Data Management, Data Security and Robot Operating System as a Common Tool for IoT
by Aleksandr Kapitonov , Salvatore Distefano , Karlis Berkolds , Agris Nikitenko- 0.0
5 Weeks
Data management and its security and privacy is an important topic for IoT. IoT security and privacy come as a big challenge with an increasing number of connected devices. And direct routing between devices became reasonable in a sense of sustainability and economy of IoT solutions. Security and privacy guideline. IoT bridge library for device and software communication....
$149
Android Hacking And Penetration Testing
by Js Infosec- 3.3
8 hours on-demand video
The course will focus on the tools and techniques for testing the Security of Android Mobile applications. After finishing this course you will be able to perform a Penetration test on a given Android device and its applications His area of Interests Include Wireless Security and Penetration Testing, Android Security & Forensics...
$12.99