Search result for Systems and applications security Online Courses & Certifications
Get Course Alerts by Email
Intro to Information Security
by Wenke Lee , Mustaque Ahamad , Catherine Gamboa- 0.0
Approx. 0
lesson 1 Foundations Security mindset Essential concepts (policy CIA etc. ) lesson 2 Software security Vulnerabilities and protections Malware Program analysis lesson 3 Practical cryptography Encryption Authentication Hashing Symmetric and asymmetric crypto lesson 4 Networks Wired and wireless networks Protocols Attacks and countermeasures lesson 5 Applications and special topics Databases Web apps Privacy and anonymity Voting Public policy...
Free
Managing Network Security
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 15 hours to complete
● Identify the issues and practices associated with managing network security ● Identify the practices, tools, and methodologies associated with assessing network security Cryptography and Network Security Cryptography and Network Security Introduction to Auditing and Systems Monitoring Introduction to Auditing and Systems Monitoring Identify the issues and practices associated with managing network security...
Introduction to Cybersecurity
by Ron Woerner , CISSP , CISM , Jerry Smith , Christine Izuakor , PhD , CISSP , Sean Pike , Esq. , M.S.- 0.0
4 months
Get your start in the high growth field of Cybersecurity by building foundational skills in how to evaluate, maintain, and monitor the security of computer systems. Take your first step toward a career in cybersecurity and learn the skills required to become a security professional with the Introduction to Cybersecurity Nanodegree program....
$399
Cybersecurity Roles, Processes & Operating System Security
by IBM Security Learning Services- 4.6
Approx. 15 hours to complete
process and technology. ● Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile. Welcome to People, Process and Operating System Fundamentals for Cybersecurity Overview of People, Process and Technologies Frameworks and their purpose File Systems and Directory Structure Cloud Benefits, Security and Governance...
Foundations of Healthcare Systems Engineering
by Dr. Matthew (Matt) Montoya- 4.7
Approx. 6 hours to complete
Through dynamic video lectures and practical application questions, you will learn about the Foundations of Healthcare Systems Engineering. Also in this course, you will learn about the different types of systems and how they are translated to the healthcare field for appropriate systems engineering process applications, with exemplars. Types of Requirements and Critical Elements of Systems Design...
Networks and Communications Security
by (ISC)² Education & Training- 4.7
Approx. 20 hours to complete
Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted. Network-Based Security Devices: FIN, NULL, and XMAS Scanning...
Mitigating Security Vulnerabilities on Google Cloud
by Google Cloud Training- 4.7
Approx. 8 hours to complete
In this self-paced training course, participants learn mitigations for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies....
Related searches
Human-Computer Interaction
by David Joyner- 0.0
Approx. 16 weeks
lesson 1 Principles Feedback Cycles and Direct Manipulation Design Principles and Heuristics Mental Models and Distributed Cognition lesson 2 Methods Needfinding and Requirements Gathering Low-Fidelity to High-Fidelity Prototyping Predictive Empirical and Qualitative Evaluation lesson 3 Applications Virtual and Augmented Reality and others Ubiquitous and Context-Sensitive Computing and others Healthcare Education and Security and others...
Free
How Computers Work
by Dr Marco Gillies- 4.6
Approx. 10 hours to complete
You probably use a computer every day and in fact you are reading this on a computer! You'll apply these concepts to the kind of computer systems we use every day, including word processing applications, e-commerce, the internet and web sites. State, modularity and applications 2 Networks and the Web 3 Security and the Web...
Preparing for the Google Cloud Professional Data Engineer Exam
by Google Cloud Training- 4.6
Approx. 9 hours to complete
The purpose of this course is to help those who are qualified develop confidence to attempt the exam, and to help those not yet qualified to develop their own plan for preparation. Building and Operationalizing Data Processing Systems Designing and Building Data Processing Systems Designing for Security and Compliance Preparing for Reliability, Policy, and Security...