Search result for Security tools and techniques Online Courses & Certifications
Get Course Alerts by Email
Network Security - Introduction to Network Security
by Aspen Olmsted- 0.0
5 Weeks
Information Security - Authentication and Access Control This is a self-paced course that provides an introduction to network security topics. Next, we cover standard attack techniques, attacks such as Denial of Service, DNS attacks, and client-side attacks, and the tools used to carry out these exploitations. Describe how "social engineering" can be used to compromise security...
$166
The Complete Cyber Security Course : Part 4 Practical Tools
by Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!- 0.0
16.5 hours on-demand video
Master the Essential Hand-on Tools Used in Cyber Security and Hacking In this course on "The Absolute Tools Guide to Cyber Security and Hacking" you will learn most of the common tools used in IT Companies. One is on Network Security and the other is on SIEM It's an essential tool for many attackers and defenders....
$12.99
IT Security Fundamentals: CompTIA Security+ 2015
by LearnSmart LLC- 0.0
24.5 hours on-demand video
Learn details about session hijacking, well-known techniques employed by aggressors, the steps involved in session hijacking, various types of session hijacking, tools for hijacking sessions, ways you can protect yourselves from session hijacking, and how pentesting can be used to identify vulnerabilities. Security is very important to any organization and physical security is no exception....
$199.99
Penetration Testing, Incident Response and Forensics
by IBM Security Learning Services- 4.6
Approx. 17 hours to complete
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. • Describe penetration testing tools and the benefits to an organization • Describe a deep dive into incident response techniques and tools • Describe digital forensics and digital evidence. Tools...
The Art of Vocal Production
by Prince Charles Alexander- 4.7
Approx. 12 hours to complete
This course addresses recorded vocal performances and the technologies used to highlight and support them in modern record production and mixes. Connect on Facebook and Twitter Download Pro Tools First or the FREE Demo Version [Optional] Vocal Time Compression and Expansion: Tools of the Trade Vocal Pitch Correction and Tuning: More tools of the Trade...
Penetration Testing with KALI and More: All You Need to Know
by Mohamad Mahjoub- 4.6
6.5 hours on-demand video
The course examines the various penetration testing concepts and techniques employed in a modern ubiquitous computing world, and will take you from a beginner to a more advanced level. At the end of the course you will be equipped with the necessary tools and skills to: 4) Compile security findings and present them professionally to your clients...
$14.99
Ethical Hacking & Penetration Testing: Kali Linux & Security
by Infinite Knowledge- 0.0
6.5 hours on-demand video
Ethical Hacking And Penetration Testing: Learn To Hack Network, Cyber & Web Security From Scratch, Nmap & Metasploit My complete Ethical Hacking course will show you the exact techniques and strategies you need to know hacking concepts, test security systems, use the right attack tools and master Penetration Testing. Are you afraid of not breaking through security systems?...
$12.99
Related searches
Introduction to Data Analytics
by Rav Ahuja- 4.8
Approx. 11 hours to complete
This course presents a gentle introduction into the concepts of data analysis, the role of a Data Analyst, and the tools that are used to perform daily functions. You will then uncover the major vendors within the data ecosystem and explore the various tools on-premise and in the cloud. Viewpoints: Qualities and Skills to be a Data Analyst...
Hardware Security
by Gang Qu- 4.3
Approx. 12 hours to complete
In this course, we will study security and trust from the hardware perspective. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware. Physical Attacks and Modular Exponentiation Physical Attacks and Countermeasures Role of Hardware in Security and Trust...
Fundamentals of Red Hat Enterprise Linux
by Chris CaillouetTop Instructor- 4.8
Approx. 21 hours to complete
It will show you how a Linux system is organized, and will demonstrate introductory system administration tasks, which you will be able to practice on your own. Guided Exercise: Controlling New File Permissions and Ownership Viewing File and Directory Permissions and Ownership Changing File and Directory User or Group Ownership Guided Exercise: Managing File Security from the Command Line...