Search result for Security tools and techniques Online Courses & Certifications
Get Course Alerts by Email
The Neuromarketing Toolbox
by Jesper Clement- 4.8
Approx. 19 hours to complete
Doing marketing research by asking people has been a common method and does still have advantages. On the other hand, if you want insights into the non-conscious interpretations of a consumer’s decision, then you need other research tools in your research toolbox. Neuromarketing makes use of such an extended toolbox, containing both technical equipment and ways of doing experimental research....
Getting Started in Port Scanning Using Nmap and Kali Linux
by Andrew Mallett- 0.0
2.5 hours on-demand video
Reducing Cyber Security Threats Through Understanding Scanning your network with the tools and systems used by hackers helps you understand the cyber security risk to your systems. Finally we secure the threats using Ansible configuration management; ensuring that the fixes are documented and repeatable. Nmap as root and non-root accounts Using different host discovery techniques in nmap...
$12.99
Introduction to Operations Management
by Christian Terwiesch- 4.4
Approx. 10 hours to complete
Learn to analyze and improve business processes in services or in manufacturing by learning how to increase productivity and deliver higher quality standards. Key concepts include process analysis, bottlenecks, flows rates, and inventory levels, and more. Labor Cost and Labor Utilization Module 2 - Process Analysis: Lecture Slides (PDF) and Excel Template...
Bug Bounty - Web Application Penetration Testing Bootcamp
by We Secure © Training & Consultancy- 0.0
11 hours on-demand video
Become a cyber security expert - learn how to earn bug bounty, ethical hacking, website hacking and penetration testing This security training practically demonstrates all foolproof tools and practices to ethically crack the websites and applications security and gain bounties as rewards. It runs parallel with security judgment, red teaming, intrusion testing, and vulnerability....
$14.99
Academic Information Seeking
by Birgitte Munk , Thomas Skov Jensen- 4.7
Approx. 6 hours to complete
You will be guided through the various information seeking steps from selecting relevant search strategies and techniques to evaluating your search results, documenting your search process and citing your sources. • Set up search strategies and use various search techniques The lectures include small assignments and quizzes (to check comprehension). 8 Adding documents and References to Mendeley - Pernille Seier...
Introduction to Risk Management
by Qasim Ijaz- 4.7
Approx. 10 hours to complete
In this course, you will learn about risk assessment techniques and how to implement a number of strategies that will ensure the protection of assets. You will learn about the relationship between assets, vulnerabilities, threats, and risks....
Data Analysis and Presentation Skills: the PwC Approach Final Project
by Alex Mannella- 4.8
Approx. 11 hours to complete
In this Capstone Project, you'll bring together all the new skills and insights you've learned through the four courses. You'll be given a 'mock' client problem and a data set. You'll need to analyze the data to gain business insights, research the client's domain area, and create recommendations. Course Overview and Syllabus Meet the PwC Instructors and Content Developers...
Related searches
Pentesting and Securing Web Applications (Ethical Hacking)
by Daniel Slater- 4.2
4 hours on-demand video
Join 140,000+ students in learning cyber security, pentesting and ethical hacking! Learn everything you need today! Computer security is one of the biggest job gaps in history, with a shortage of 3. When I was at university I did a lot of security courses and to be honest I was pretty frustrated at how they were taught....
$14.99
Learning Web Security OWASP Top 10 2019
by Blue Moon- 3.8
1 hour on-demand video
New Web Security 2019 Powered by a global network of over 42,000 security-aware volunteers, OWASP members hail from educational and government institutions, large corporations and more. This highly active community produces content, organizes events, and publishes articles, methodologies, tools and technologies which are free and available to everyone....
$11.99
Combating Advanced Persistent Threat - APT Attack
by Jamal Uddin Shaikh- 0.0
1 hour on-demand video
Learn about APT attack and their stages & how can you mitigate Practically using some hidden tools / commands. The students will learn how to use the hackers tools to demonstrate Advanced Persistent Threat (APT) attack and review how IBM Security Network Protection can help to mitigate the attack....
$12.99