Search result for Security tools and techniques Online Courses & Certifications
Get Course Alerts by Email
Cybersecurity and Its Ten Domains
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.3
Approx. 24 hours to complete
Introduction to Security, Access Control, and Software Development Security Introduction to Security, Access Control, and Software Development Security Quiz Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Information Security Governance and Risk Management Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz Operations Security & Physical and Environmental Security...
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Operate and Secure Virtual Environments: Network Security Operate and Secure Virtual Environments: Virtual Machine Security Operate and Secure Virtual Environments: Network Security...
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. You will also gain an awareness of some of the skills, knowledge and roles/careers opportunities within the information security industry. Information and security This video introduces the core information security services and tools provided by cryptography....
Mitigating Security Vulnerabilities on Google Cloud
by Google Cloud Training- 4.7
Approx. 8 hours to complete
They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies. Security Partner Products Infrastructure, Data Protection, Logging and Compliance Partners Content-Related Vulnerabilities: Techniques and Best Practices Content-Related Vulnerabilities: Techniques and Best Practices Apply techniques and best practices to protect against content-related vulnerabilities...
The Foundations of Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 9 hours to complete
In order to manage the cybersecurity function business, you must first understand its language and its environment. Vulnerability Assessment: Tools and Techniques (Lesson 1. Scanning and Analysis Tools Vulnerability Assessment: Tools and Techniques (Quiz 1. The Cybersecurity Personnel and the Security Department (Lecture 1. The Cybersecurity Personnel and the Security Department (Quiz 1....
Preparing for the AZ-900 Microsoft Azure Fundamentals Exam
by Microsoft- 4.8
Approx. 6 hours to complete
You will refresh your knowledge of cloud concepts, Microsoft Azure services, Microsoft Azure workloads, security and privacy in Microsoft Azure, as well as Microsoft Azure pricing and support. Recap of topics and key concepts covered in Azure Management Tools & Security Solutions Practice exam covering Azure Management Tools & Security Solutions...
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. Document and operate security controls Understand and Comply with Code of Ethics and Security Concepts Security Operations and Administration Course Introduction...
Related searches
Architecting Smart IoT Devices
by Martin Timmerman , Maarten Weyn- 4.3
Approx. 34 hours to complete
In order to reduce the time to market, many pre-made hardware and software components are available today. What's a web tour and what does it have to do with quizzes? Software development tools and environments White- and black-box testing Security requirements Security coding techniques Security models How vendors deal with security issues Development Tools and Environments...
Networks and Communications Security
by (ISC)² Education & Training- 4.7
Approx. 20 hours to complete
Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted. Network-Based Security Devices: FIN, NULL, and XMAS Scanning...
Secure Product Lifecycle 101
by Implementing Security- 4.4
1.5 hours on-demand video
Fundamental security concepts, principles, tools and techniques for the development lifecycle This course is a comprehensive introduction to the foundations of secure development that's aimed at anyone with an interest in application security and securing the SDLC....
$16.99