Search result for Computer security and networks Online Courses & Certifications
Get Course Alerts by Email
The Absolute Beginners 2021 Guide to Cyber Security - Part 3
by Alexander Oni- 4.5
2 hours on-demand video
Learn basic to advanced techniques on how to properly secure and protect your mobile device against malware and hackers In a world where smartphones and other mobile devices generate over 52% of all internet traffic, the security of such mobile devices has never been more important. How to properly tweak and change the default security settings of your android device...
$22.99
The Check Point Certified Security Administrator
by Gopi Venkatesan- 0.0
7.5 hours on-demand video
The Check Point Security Administration course provides an understanding of basic concepts andskills necessary to configure the Check Point Security Gateway, configure Security Policies, andlearn about managing and monitoring secure networks. Verify SIC establishment between the Security Management Server and the Gateway usingSmartDashboard. Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades and minimal downtime....
$12.99
MTA: Networking Fundamentals - Exam: Microsoft 98-366
by Marious Kuriata- 4.3
5 hours on-demand video
Pass our online exam and get an awesome certificate! Pass just one exam and you’ll earn a certification Contents and Overview Each chapter closes with a quiz to make sure you can practice exam questions and test your knowledge before moving to the next section. We start by discussing LAN and WAN topologies, including Virtual Private Networks and security....
$17.99
Become a Certified Ethical Hacker (CEH)
by Ric Messier- 4.3
6.5 hours on-demand video
wireless networks To that end, you will need to understand remediations, like good software development practices, remediating web application vulnerabilities as well as policies and standards that should govern all information security practices within an organization. Certified Ethical Hacker and CEH are registered trademarks with EC-Council....
$23.99
Information Security - Advanced topics
by Aspen Olmsted- 0.0
5 Weeks
Learn more fundamentals of information security, including Injection Attacks and Defenses, Privacy and Anonymity Software Validity and Rights, Cryptocurrency. Information Security - Authentication and Access Control This is a self-paced course that provides a continuation of information security and cybersecurity topics. Among the topics covered are Injection Attacks and Defenses, Privacy and Anonymity Software Validity and Rights, Cryptocurrency....
$166
Getting Started with AWS Machine Learning
by Blaine SundrudTop Instructor- 4.5
Approx. 9 hours to complete
Machine learning (ML) is one of the fastest growing areas in technology and a highly sought after skillset in today’s job market. Key topics include: Machine Learning on AWS, Computer Vision on AWS, and Natural Language Processing (NLP) on AWS. Understanding Neural Networks Amazon AI Services: Computer Vision Build a text classification model with Glue and Sagemaker...
Complete IT Support Specialist Course: IT Foundations
by Jonney J Robinson- 0.0
6 hours on-demand video
By the end of this first course, you'll be able to understand how a computer thinks and communicates using binary, what abstraction is and how to apply it to your work, troubleshooting skills and techniques and how to best apply them. We'll also be doing breakdowns on Software, Operating Systems, and how to troubleshoot issues....
$19.99
Related searches
Internet of Things: How did we get here?
by Harinath Garudadri , Ganz Chockalingam- 3.9
Approx. 21 hours to complete
Did you ever wonder how and when all this happened? You will learn about the birth and evolution of Telephony Networks, Broadcast Networks (TV and Radio) and Consumer Electronics. Explain the tradeoffs between circuit switched networks (that is, dedicated resources) and packet switched networks (that is, shared resources). Billing and Prepaid...
Penetration Testing - Exploitation
by Aspen Olmsted- 0.0
5 Weeks
Learn exploitation phase of penetration testing, including the foundations of explorations, application debugging, reverse engineering, exploitation development and web application exploitation. Information Security - Authentication and Access Control These topics build upon the learnings that are taught in the introductory-level Computer Science Fundamentals MicroBachelors program, offered by the same instructor. Create configurations and test payloads within other web attacks....
$166
PyTorch for Deep Learning with Python Bootcamp
by Jose Portilla- 4.7
17 hours on-demand video
Learn how to create state of the art neural networks for deep learning with Facebook's PyTorch Deep Learning library! Welcome to the best online course for learning about Deep Learning with Python and PyTorch! A rich ecosystem of tools and libraries extends PyTorch and supports development in computer vision, NLP and more....
$19.99