Search result for Security tools and techniques Online Courses & Certifications
Get Course Alerts by Email
Concept Art for Video Games
by Ricardo Guimaraes- 4.7
Approx. 6 hours to complete
Throughout the 4 week modules will dive deeply into composition and digital painting techniques to bring your art skills to the next level! So, let's get started! The Drawing Tools The Modifying Tools Move, Scale and Rotate Groups and Components Materials and Styles Week 03: Modeling and Exporting...
Cybersecurity for the End User - Beginner
by Intellezy Trainers- 4.5
24 mins on-demand video
By some estimates, over 90% of security breaches can be prevented by simple security awareness. Many of the data breaches that have recently been in the public spotlight could have been easily prevented by employing some of the tools and techniques that are covered throughout this course....
$12.99
Corporate finance: Know your numbers 2
by Keith Woodward , David Pitt- 3.6
Approx. 21 hours to complete
This course will prepare you for responsible and sustainable leadership from a financial management perspective. 4 The Payout Policy Decision and the Principal-Agent Problem Demonstrate an understanding of financial management tools and techniques for financial analysis and modeling Use analytical techniques to make financial decisions related to financing operations and valuation of organisations and investment opportunities...
Sales Training: Techniques for a Human-Centric Sales Process
by Kyle Jepson- 4.7
Approx. 15 hours to complete
By the end of this course, you'll be able to prospect for new business, qualify for high-quality prospects, book meetings with decision makers, handle buyer's objections, and negotiate and close a deal. Techniques for a Human-Centric Sales Process. Why "To Sell Is Human" and We're All Salespeople Create a CRM Account and Adding a Contact...
The Complete Cyber Security Course : Network Security!
by Nathan House- 4.6
12.5 hours on-demand video
discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability that are required for maximum security and why. tools like Wireshark, Tcpdump and Syslog. We then move away from network security and Discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning....
$19.99
Software Requirements Prioritization: Risk Analysis
by Kristen Walcott-Justice- 4.6
Approx. 18 hours to complete
Risk Analysis, Assessment, and Prioritization looks at how you can manage conflicts at system levels, but it can also be applied to lower level assessments. How do you manage and document conflict, along with alternatives? Bringing Security into Risk Analysis Risk and Cut-Set Trees Risk Control and Countermeasures Software risk management: principles and practices...
Ethical Hacking & Penetration Testing with Kali Linux
by Packt Publishing- 0.0
14 hours on-demand video
You will learn how to test your network against various types of attack and develop a network-testing environment that can be used to test scanning tools and techniques. This has taken him to new levels where he has helped other organizations and companies to meet their server and website security demands....
$12.99
Related searches
Cyber Security Economics
by Ross Anderson , Rainer Böhme , Michel van Eeten , Carlos H. Gañán- 0.0
10 Weeks
Learn how to make better decisions about security and IT by using state-of-the-art economic tools, security metrics and data analytics. Economics of information security investment. Security market failures. We discuss available economic tools to better align the incentives for cybersecurity, including better security metrics, cyber insurance/risk transfer, information sharing, and liability assignment....
$50
Statistical Data Analysis with Java
by Packt Publishing- 4
4.5 hours on-demand video
His background is in software security analysis, dealing with the security issues that rose to the surface within Java 6 and Java 7. While working on the JDK, Erik applied different data analysis techniques to identify and mitigate ways that threats could propagate through the overall Java platform and overlying applications....
$11.99
Introduction to Game Cheat and Software Hacking on Windows
by Kelvin Chan- 0.0
2 hours on-demand video
Generally, This course covers about practical game hack in Windows and you will understand how to make a cheat in ANY games after this course, you also getting ton of source code , tools and skills that are able to be reused on your next game other than the sample one...
$12.99