Search result for Security tools and techniques Online Courses & Certifications
Get Course Alerts by Email
ICS/SCADA Network Security Monitoring (NSM)
by Ed Galarza- 0.0
1.5 hours on-demand video
This ICS/SCADA Network Security Monitoring (NSM) course will provide you with a strong foundation in some of the open source tools that are available to implement ICS/SCADA NSM within your ICS/SCADA environments! You will learn about various topics such as: What is Security Onion, and how can it be used for ICS/SCADA NSM?...
$14.99
Intro to Cyber Security Certification - Security+ Boot Camp
by Chad Russell- 4
1 hour on-demand video
Get a brief introduction to the Cyber Security Industry and Security+ Certification This course covers basic information related to Security+ Certification and Cyber Security Career planning. • Comprehend Cyber Security • This course is intended for absolute beginners and IT professionals looking to make the move into the Cyber Security field....
$14.99
Cisco CyberOps Associate CBROPS 200-201: The Complete Course
by Matt Carey- 4.2
4.5 hours on-demand video
Learn Cyber Security and prepare for your Cisco CyberOps (CBROPS) certification exam. Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding to security incidents. Teams of people in Security Operations Centers (SOC’s) keep a vigilant eye on security systems, protecting their organizations by detecting and responding to cybersecurity threats. Security policies and procedures...
$23.99
Quantum Cryptography
by Stephanie Wehner , Thomas Vidick , Guest Lecturers- 0.0
10 Weeks
In this course, you will learn how to use quantum effects, such as quantum entanglement and uncertainty, to implement cryptographic tasks with levels of security that are impossible to achieve classically. Cryptographic concepts and tools: security definitions, the min-entropy, privacy amplification Protocols and proofs of security for quantum key distribution Modern quantum cryptographic tasks and protocols...
$50
Network Security Analysis Using Wireshark, Snort, and SO
by Jesse Kurrus, M.S., OSCP, CEH, Security+, Linux+, Network+, CISSP- 4.3
2.5 hours on-demand video
We're also going to cover network security analysis with Wireshark and Tcpdump, intrusion detection system analysis with Snort and Squert, and ethical hacking and penetration testing with various tools on Kali Linux. The industry standard tools and methodology utilized in this course will expose you to hands-on skills that are necessary as a network security analyst, and cybersecurity professional in general....
$15.99
Network Security - Advanced Topics
by Aspen Olmsted- 0.0
5 Weeks
Learn advanced topics in network security, including Security Monitoring, Perimeter Security, IPv6 and IPv6 Security. Among the topics covered are Security Monitoring, Perimeter Security, IPv6, and IPv6 Security. We follow up by introducing the student to IPv6: what it is, why it was developed, how it compares to the IPv4 protocol, and techniques to implement IPv6 devices alongside IPv4 devices....
$166
Business Analytics for Decision Making
by Manuel Laguna- 4.6
Approx. 9 hours to complete
Data Reduction and Unsupervised Learning Preparing Data and Measuring Dissimilarities Hierarchical and k-Means Clustering Dealing with Uncertainty and Analyzing Risk Risk Analysis and Monte Carlo Simulation Defining Output Variables and Analyzing the Results Creating and Interpreting Charts Optimization and Decision Making What-if Analysis and the Sensitivity Report Evaluating Scenarios and Visualizing Results to Gain Practical Insights...
Related searches
Cloud Computing Security
by Edward Chow- 4.6
Approx. 12 hours to complete
We then introduce AWS Load balancing feature, create load balancing cluster for scalability and reliability. You will also learn the best practice in cloud security and debugging service interaction issues may arise in the cloud systems. Cloud Service Interruption and Their Impact Survey Of Techniques And Challenges For Load Balancing In Public Cloud...
Introduction to Embedded Systems Software and Development Environments
by Alex Fosdick- 4.5
Approx. 9 hours to complete
Welcome to the Introduction to Embedded Systems Software and Development Environments. This course is focused on giving you real world coding experience and hands on project work with ARM based Microcontrollers. The second course in this 2 course series , Embedded Software and Hardware Architecture, will use hardware tools to program and debug microcontrollers with bare-metal firmware....
Foundations for Global Health Responders
by Dr. Jay Lemery, MD- 4.8
Approx. 12 hours to complete
Around the world, we are increasingly socially and economically interdependent. During week four, we will learn about the stakeholders in global health: NGOs, governments, non-state actors; understanding where the money comes from, how it is allocated and the challenges of measuring results; human rights: what are they and how are they protected?...