Search result for Device and data security Online Courses & Certifications
Get Course Alerts by Email
Secure your Home Network with a Raspberry Pi and Python
by Paul Mahon- 0.0
1.5 hours on-demand video
Configure DNS, DHCP and VPN on a Raspberry Pi or server to bypass ISP, collect network data and monitor device activity. If you don’t have a raspberry Pi, you use a compatible device or virtual machine to run Linux and then download some free software including Python itself. Linux and python are critical components to IT security and IT administration....
$12.99
Azure Storage Security Guide
by CloudTAC -Information Systems Governance and Security- 0.0
3 hours on-demand video
End-to-End Storage Security in Microsoft Azure Azure Security Engineers implement security controls and threat protection, manage identity and access, and protect data, applications, and networks in cloud and hybrid environments as part of end-to-end infrastructure. Configure encryption for data at rest Configure and manage management and data plane security for your storage account....
$12.99
Become Master in Ethical Hacking with Android (without Root)
by Muhammad Ali- 0.0
1.5 hours on-demand video
Why should I even bother there are so many free tutorials online! Although that is true as a statement, I offer you a very simple reason to motivate your choice in picking this course as your source of knowledge and information on network security maintenance - experience. Install Ubuntu ROOT Terminal on your Android Device...
$12.99
Google Cloud Fundamentals: Core Infrastructure
by Google Cloud Training- 4.7
Approx. 12 hours to complete
This course introduces you to important concepts and terminology for working with Google Cloud Platform (GCP). Every company is a data company GCP regions and zones Multi-layered security approach Budgets and Billing Big Data and Machine Learning in the Cloud Introduction to Big Data and Machine Learning Big Data and Machine Learning...
Artificial Intelligence (AI) Education for Teachers
by Dr Anne Forbes , Dr Markus Powling- 4.7
Approx. 16 hours to complete
Why do teachers and students need to know about AI? Skills Module — Part B: Data Fluency, and Computational Thinking Overview of data fluency, and computational thinking Photographic data sets of dogs and cats Data and decision-making in AI applications Identify and use creative and critical thinking, design thinking, data fluency, and computational thinking as they relate to AI applications...
Kibana Visualization Beginner To Pro (ELK & ElasticSearch)
by Ivan Westen- 3.6
2.5 hours on-demand video
Kibana is data exploration and analytics tool of ELK stack. Elasticsearch is a NoSQL database; Logstash is a log pipeline tool used to export normalized data to Elasticsearch and Kibana is a visualization layer that works on the top of Elasticsearch. Kibana seamlessly integrates with Elasticsearch and provides very effective Visualizations options such as charts, maps, data tables, metric etc....
$11.99
Linux Kernel Driver Programming with Embedded Devices
by AJ Singh- 0.0
5 hours on-demand video
For Beginners and Intermediates Learn to write a Linux kernel module and device driver. This course will teach you how to write Linux device driver for PCI device, GPIO (General Purpose IO), USB and pseudo Network device with PING (ICMP protocol) functionality. This course also includes Notes and 'C' source code for drivers. In these videos I talk about ARM general purpose and special registers, Vector table....
$29.99
Related searches
Intermediate Mobile App Development (Swift 3, iPhone iOS10)
by Dee Aliyu Odumosu- 4.8
5.5 hours on-demand video
In this course you will work on 10 different APIs, including drawing with Core Graphics, Using Touch ID, persisting data with Core Data and much more (see full curriculum below). 4) You will have more confidence in your skills and ability. - How to set up core data model, entity and properties...
$12.99
Turn Ethical Frameworks into Actionable Steps
by Eleanor 'Nell' Watson , Aaron Hui , Abhishek Gupta , Megan Smith Branch- 4.6
Approx. 15 hours to complete
Principles alone can be elusive and impractical for application. Safety and Security Big Data Generated Through Devices vs. Corporate Data Hegemony Conflict Reconciliation Between Ethics, Regulations, and Business Demands Quiz Compare ethical frameworks and select one to guide decisions to resolve an organizational issue. Analyze applicable regulations, standards, and international best practices....
Cryptographic Hash and Integrity Protection
by Sang-Yoon Chang- 4.5
Approx. 9 hours to complete
Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Cryptographic Hash Function Requirements: One-Way and Collision Properties Cryptographic Hash Function Security Cryptocurrency and Bitcoin Hash Chain and Hash Tree Cryptocurrency and TESLA...