Search result for Device and data security Online Courses & Certifications
Get Course Alerts by Email
Data Loss Prevention
by The Art Of Service- 3.9
1.5 hours on-demand video
An introductory course about understanding Data Loss Prevention and the different ways of recovering data. Data Loss Prevention (DLP) is a computer security term referring to systems that identify, monitor, and protect data in use, data in motion, and data at rest. Experts accomplish this through deep content inspection, contextual security analysis of transaction, and with a centralized management framework....
$11.99
Public Health in Humanitarian Crises 2
by Gilbert Burnham, MD , Mija Ververs- 4.8
Approx. 12 hours to complete
Outbreak Detection and Rapid Response Strategies Introduction to Disaster Epidemiology and Surveillance: The Role of Data During Complex Emergencies Module 5: International Health Regulations and the Global Health Security Agenda (Lauren Sauer) Introduction to International Health Regulations and the Global Health Security Agenda International Health Regulations and the Global Health Security Agenda Quiz...
Detecting and Mitigating Cyber Threats and Attacks
by Greg Williams- 4.7
Approx. 12 hours to complete
Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Introduction and Firewalls Intrusion Detection and Prevention Week 2 - Intrusion Detection and Prevention Detection and Prevention tools HIDs and HIPs Splunk and Security Week 3 - Detection and Prevention Tools...
Getting Started With Application Development
by Google Cloud Training- 4.5
Approx. 17 hours to complete
In this course, application developers learn how to design and develop cloud-native applications that seamlessly integrate managed services from Google Cloud. Participants learn how to apply best practices for application development and use the appropriate Google Cloud storage services for object storage, relational data, caching, and analytics. Security, Reliability, and Migration...
Mobile Computer Forensics Fundamentals
by John Boyle- 0.0
2 hours on-demand video
Understanding the concepts and practices of mobile forensics Best practices for capturing and preserving a mobile device Acquiring data from a mobile device This course is designed for anyone with an interest mobile computer forensics to get a taste of the real world of examining smart phones and tablets....
$12.99
Smart Device & Mobile Emerging Technologies
by Jong-Moon Chung- 4.7
Approx. 32 hours to complete
Your smartphone wakes you up, it is the first thing you use in the morning, and the last thing you check (e. Since everybody uses smartphones and smart watches, knowing the details about the most globally used electronic device will definitely help you in all aspects of new product and app design & development, as well as business planning....
Security Awareness Training, Internet Security for Employees
by Roy Davis- 4.5
1 hour on-demand video
Basic security awareness guide on Internet security and privacy to help keep you, your home, and your employer safe. Data breaches are on the rise and it's getting more and more dangerous to function online. This security awareness training course will not only give you the "what" to look out for, but also the "why" and how the "what" works....
$16.99
Related searches
CCNA 2020 - CCNA 200-301 exam - a complete guide - Cisco
by Marious Kuriata- 4.6
24 hours on-demand video
Includes unique videos presenting REAL Cisco routers, switches, firewalls, access points, cables, connectors, and labs You will also see lectures with whiteboards and clips showing real routers, switches, access points, firewalls and network tools. The OSI Model and network fundamentals Configuration of Cisco routers and switches Access lists and security concepts Manage Network Device Security...
$17.99
Hacking and Patching
by Edward Chow- 3.9
Approx. 15 hours to complete
You will learn a security design pattern to avoid introducing injection vulnerabilities by input validation and replacing generic system calls with specific function calls. You will learn security in memory systems and virtual memory layout, and understand buffer overflow attacks and their defenses. Security in Memory Systems and Virtual Memory Layout...
Oracle Cloud Security Data Protection and Encryption
by Zulqarnain Hayat- 3.5
4.5 hours on-demand video
With the increasing risks of cyberattacks, database hacks, and data leaks, knowing how to fully enable and leverage all of the Oracle 12c security features is essential. Plus, find out how to enable data-at-rest security via the Oracle Transparent Data Encryption and backup encryption options. Authentication and authorization Data encryption Users and permissions...
$11.99