Search result for Device and data security Online Courses & Certifications
Get Course Alerts by Email
Big Data for Reliability and Security
by Saurabh Bagchi- 0.0
8 Weeks
This course teaches the principles and practices of big data for improving the reliability and the security of computing systems. It delves into a set of techniques for defending big data techniques against natural failures (the reliability aspect) and against malicious attacks (the security aspect). Understand and develop big data techniques for improving reliability and security of computing systems...
$750
Advanced Cryptography: Application and Data Security
by Ankit Singh- 2.8
40 mins on-demand video
One stop Guide to get the Hands-On Experience of Tools, Techniques and Methodologies of Cryptography In this course, We are going to do lot of Hands-On to learn how to practically implement all the famous Techniques and Methodologies of Cryptography. Cryptographic Protocols like SSL, PGP and Collision Attack, and...
$12.99
Advanced Manufacturing Enterprise
by Sara Behdad- 4.6
Approx. 18 hours to complete
Enterprises that seek to become proficient in advanced manufacturing must incorporate manufacturing management tools and integrate data throughout the supply chain to be successful. Students will become acquainted with the available tools, technologies and techniques for aggregation and integration of data throughout the manufacturing supply chain and entire product life-cycle. Data Security: Concerns and Solutions...
Advanced System Security Topics
by Edward Chow , Greg Williams- 4.5
Approx. 15 hours to complete
We show how to exhance the data security with GeoEncryption, Secure Enhanced Geolocking, and R2D2 concepts which deliver data to right places via right path. Ensure Data Delivery to Right Location Enhance Security with Network and Context Information Read R2D2 paper on BLE location verification and SDN Data Path Confidence Analysis...
Data Analysis and Presentation Skills: the PwC Approach Final Project
by Alex Mannella- 4.8
Approx. 11 hours to complete
In this Capstone Project, you'll bring together all the new skills and insights you've learned through the four courses. You'll be given a 'mock' client problem and a data set. You'll need to analyze the data to gain business insights, research the client's domain area, and create recommendations. Course Overview and Syllabus...
Customising your models with TensorFlow 2
by Dr Kevin Webster- 4.8
Approx. 27 hours to complete
In this course you will deepen your knowledge and skills with TensorFlow, in order to develop fully customised deep learning models and workflows for any application. You will use lower level APIs in TensorFlow to develop complex model architectures, fully customised layers, and a flexible data workflow. [Coding tutorial] Padding and masking sequence data...
Cisco SD-WAN Operation and Deployment (ENSDW)-LAB
by Mukesh Pathak- 0.0
7 hours on-demand video
The Cisco SD-WAN Operation and Deployment (ENSDW) v1. With Cisco SD-WAN, you can build a robust security architecture that’s crucial for hybrid networks and provides a strong policy framework. This course has LAB demonstration of the course Cisco SD-WAN Operation and Deployment (ENSDW). Below are the topics which are covered and shown in this course....
$12.99
Related searches
Digitalization in International Relations
by Yarygin Grigory , Sytnik Anna , Tsvetkova Natalia , Stadnik Ilona- 4.5
Approx. 16 hours to complete
Course participants will gain fundamental knowledge and practical skills regarding how to apply big data analysis, social media methods of analysis, how to build a digital information campaign strategy, how to operate by legal and technical components of global Internet governance in the practice of multilateral negotiations, and how to detect flaws and threats in the field of digital voting....
Penetration Testing - Exploitation
by Aspen Olmsted- 0.0
5 Weeks
Learn exploitation phase of penetration testing, including the foundations of explorations, application debugging, reverse engineering, exploitation development and web application exploitation. Information Security - Authentication and Access Control Among the topics covered are foundations of explorations, application debugging, reverse engineering, exploitation development, and web application exploitation. In the exploitation phase, the penetration testers try to exploit security weaknesses actively....
$166
Digital Manufacturing & Design
by Ken English- 4.7
Approx. 10 hours to complete
This course will expose you to the transformation taking place, throughout the world, in the way that products are being designed and manufactured. The transformation is happening through digital manufacturing and design (DM&D) – a shift from paper-based processes to digital processes in the manufacturing industry. Introduction to Digital Manufacturing and Design...