Search result for Security assessments Online Courses & Certifications
Get Course Alerts by Email
Hacking Fundamentals: The Complete Nmap No-Nonsense Course
by Jasmin Skamo- 0.0
2.5 hours on-demand video
As the title of this course suggests, this is a course with a no-nonsense approach towards learning very important part (if not the most important part) of penetration testing and practical security assessments....
$12.99
CompTIA Security+ Certification Preparation: CyberSecurity
by CyberTraining 365- 0.0
10.5 hours on-demand video
Launch yourself into an IT security career. Learn essential principles for network security and risk management. In the Network Security section, students learn how to Craft a Secure Network and Apply Network Security Devices. Following similar study formats about Wireless Network Security and Access Control Fundamentals brings us to more practical subjects such as Authentication, Performing Vulnerability Assessments and Conducting Security Audits....
$12.99
Hacking and Penetration Testing from Scratch with METASPLOIT
by IT Security Academy- 0.0
3 hours on-demand video
Learn how to test security mechanisms and how to conduct penetration tests on working machines or databases. Welcome to IT Secutiry Academy! IT Security Academy (ISA) is a company that associates ITsec Professionals. If you are thinking about IT security seriously - you need to know Metasploit. Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit....
$13.99
The Complete Cyber Security Course : Hackers Exposed!
by Nathan House- 4.5
12 hours on-demand video
Volume 1 : Become a Cyber Security Specialist, Learn How to Stop Hackers, Prevent Hacking, Learn IT Security & INFOSEC system security and privacy functionality. security control of isolation and compartmentalization. This is volume 1 of 4 of your complete guide to cyber security privacy and anonymity....
$15.99
Palo Alto Networks Academy Cybersecurity Foundation
by James Dalton- 4.7
Approx. 12 hours to complete
Course 1 of 5 in the Palo Alto Networks Security Operating Platform Cybersecurity Specialization. Foundation Module 6 - Network Security Models Video: Network Security Models I Video: Network Security Models II Network Security Models Compliance and Security Foundation Module 7 - Cloud and Data Center Security Video: Cloud Security 1 Video: Cloud Security II...
How to succeed in a Data Protection Officer Role (GDPR DPO)
by Roland Costea- 4.5
5 hours on-demand video
Course 5: Build Security Incident Response for GDPR Data Protection (incl. I have worked and developed the privacy strategy for Microsoft & IBM for the whole Central & Eastern Europe and also drived Cognizant Security & Privacy business in DACH. Do you want to understand technical assessments a DPO or Privacy Professional should do?...
$17.99
Information Security Management Fundamentals for Non-Techies
by Alton Hardin | 100,000+ Enrollments Worldwide- 4.5
10 hours on-demand video
Learn the Fundamentals of Information Security Management for Non-Techies LEARN INFORMATION SECURITY FUNDAMENTALS FROM ONE OF UDEMY’S TOP IT INSTRUCTORS Are you looking to learn the basics of information security management? "It's really very helpful, it helped me to understand the basics on information security management, surely was above my expectations. Security Assessments and Testing...
$19.99
Related searches
Introduction to Cybersecurity Tools & Cyber Attacks
by IBM Security Learning Services- 4.5
Approx. 20 hours to complete
Security Threats Vulnerability Assessments Roles in Security Additional Security Challenges ISSA - Information Systems Security Association An overview of key security tools Welcome to an Introduction to Key Security Tools Cryptography - a different perspective from a Security architect Key security tools Discuss the evolution of security based on historical events....
Learn Ethical Hacking from Entry to Expertise
by InSEC- Techs- 0.0
49 hours on-demand video
InSEC-Techs Ethical Hacking Course is IT Security (Offensive) Security Course that teaches you how to find vulnerabilities (bugs or loopholes, like coding mistakes, configuration mistakes or errors etc) in any applications and Network infrastructures including networking devices, mobiles etc- Web Application Penetration is specific to digging the same specific to web applications-...
$12.99
Introduction to AWS Identity and Access Management
by Seph Robinson , Alana Layton- 0.0
4 Weeks
This course will focus on one of the key security services, AWS Identity and Access Management (IAM). Security should be your first priority when developing cloud native applications....
$169