Search result for Device and data security Online Courses & Certifications
Get Course Alerts by Email
Software Defined Networking
by Umakishore Ramchandran- 0.0
Approx. 6 hours to complete
This course provides an introduction to data center networking technologies, more specifically software-defined networking. It covers the history behind SDN, description of networks in data-centers, a concrete data-center network architecture (Microsoft VL2), and traffic engineering. Containers and Cloud SDN (Nisheeth Srivastava) Security Issues & Challenges Workshop 1- Azure Portal and Web Services...
TECH MeD: Transdisciplinary Education for Critical Hacks of Medical Devices
by Lauren Solberg , Michael Bachmann , Adam Shniderman , Molly Weinburgh , Brittany Bachmann- 0.0
Approx. 8 hours to complete
This course seeks to create an informed public, aware of the technical, medical, legal, and ethical issues associated with implantable medical devices. The course features conversations with experts from a variety of relevant fields to discuss the present and future technological, ethical, legal, and social challenges associated with implantable medical devices. Security and Privacy for Implantable Medical Devices...
Quantum Cryptography
by Stephanie Wehner , Thomas Vidick , Guest Lecturers- 0.0
10 Weeks
In this course, you will learn how to use quantum effects, such as quantum entanglement and uncertainty, to implement cryptographic tasks with levels of security that are impossible to achieve classically. Cryptographic concepts and tools: security definitions, the min-entropy, privacy amplification Protocols and proofs of security for quantum key distribution Modern quantum cryptographic tasks and protocols...
$50
Master in Wi-Fi ethical Hacking
by MBPSec Tech- 3.5
2 hours on-demand video
WiFi Hacking and Pentesting First of all this course is based on the latest tools and complete practical base. This course on Wi-Fi hacking explains the different techniques, which you can hack the WEP, WPA/WPA2 and WPS Wi-Fi router. To get best out of this course, take a stab at assaulting own device for Practice....
$14.99
Salesforce Reporting
by Stephane Muller- 4.7
Approx. 17 hours to complete
It is also important that you maintain data clean for your organization and you will work with creating reports, managing data, and creating full reports and dashboards. Entitlement Management and Lightning Flow Create an Einstein Analytics App and customize an Einstein Analytics Home Page. Create users and manage access to enterprise data and customize the Lightning Experience user interface....
Symmetric Cryptography
by Sang-Yoon Chang- 4.6
Approx. 13 hours to complete
Lastly, we enable the use of block ciphers to support variable data length by introducing different modes of block cipher operations in ECB, CBC, CFB, OFB, and CTR modes. Substitution and Caesar Cipher Polyalphabetic Cipher and Vigenere Cipher Modulo Operation and Caesar Cipher Permutation Cipher Security Rail Fence Cipher and Permutation Cipher...
Requirements Specifications: Goals and Conflict Analysis
by Kristen Walcott-Justice- 4.7
Approx. 20 hours to complete
In Requirements Goal Development and Language Analysis, we move from the spoken word to precise writing. Introduction to Goal Development and Language Conflict Analysis Use, Misuse, and Abuse Cases The Use Case and Use Case Description Misuse Cases for Security Eliciting security requirements with misuse cases Misuse and abuse cases: Getting past the positive...
Related searches
Cybersecurity Awareness and Innovation
by Iván Martínez , Iván Pau , Román Ramírez- 4.7
Approx. 7 hours to complete
This course empowers students, professionals and wider community to deal with cybersecurity attacks and risks focused on identity management and it is an introduction to the upcoming full course focused on cybersecurity awareness. It is provided a practical overview of challenging issues like identity credentials management and security, e-mail threats and web impersonation, or web hacking. Identity and Authentication...
Transacting on the Blockchain
by Don Tapscott , Alex Tapscott- 4.8
Approx. 16 hours to complete
Today, large intermediaries establish trust in our economy and control the movement, storage, and allocation of money and assets. Security Tokens Crypto-fiat Currencies and Stablecoins Security Tokens Crypto-fiat Currencies and Stablecoins Cryptocurrencies, Protocol Tokens, and Utility Tokens Security Tokens, and Natural Asset & Commodity Tokens Smart Contracts and Law Smart Contracts and Law...
Cryptography
by (ISC)² Education & Training- 4.8
Approx. 14 hours to complete
Cryptography is the practice and study of techniques for securing communications in the presence of third parties. Operate and Implement Cryptographic System: PKI Activity Operate and Implement Cryptographic System: Standards Operate and Implement Cryptographic System: Truly Random Operate and Implement Cryptographic System: Key Storage and Destruction Operate and Implement Cryptographic System: Factors Affecting Risk...