Search result for Security tools Online Courses & Certifications
Get Course Alerts by Email
Website Hacking & Penetration Testing (BUG BOUNTY)
by Eslam Medhat (Ethical Hacking, Bug Bounty and Penetration Testing)- 2.9
2 hours on-demand video
This course includes all necessary information to start your carrier in the Cyber Security field....
$17.99
Cryptocurrency Investing for Beginners
by Justin Covillon- 3.7
1 hour on-demand video
We will go through setting up wallets, security via texting, email, and Google Authenticator which will ensure your security to the greatest possible extent. We will go into more detail in the intermediate and advanced courses on trends and tools to help make new investments....
$12.99
Microsoft Teams: Teams Essentials for the workplace
by Mauricio Rubio - Agile Guru & Founder of AgileKB | AgileLee & Ureducation- 0.0
2 hours on-demand video
Teams integrates with Word, Excel, PowerPoint, OneNote, SharePoint, Planner, Stream and even Power BI, so employees have the information and tools they need available at their fingertips. Teams comes with the enterprise-grade security integrated with the Office 365 Security and Compliance Center and Azure Active Directory....
$14.99
Cloud Computing with IBM Bluemix
by Harshit Srivastava- 3.7
3 hours on-demand video
If you are working in the Technology sector, and would like to learn some of the advanced tools and services that you can harness in your project, you can take this course on IBM Cloud. Network and Security After learning with these examples, you will be learning some more tools under Boilerplate and Data Analytics categories:...
$13.99
TOTAL: CompTIA A+ Certification (220-1002) Practice Tests.
by Total Seminars • 750,000+ Enrollments- 4.2
Command-line tools Security - 24% Physical security (locks, badge readers, guards, etc) Logical security concepts (Active Directory, antivirus/anti-malware, firewalls, certificates, etc) Wireless security protocols (WPA, WPA2, RADIUS, etc)...
$18.99
Db2 LUW - Database Administration & Certification Workshop
by Mohammad Adnan Khan- 4
38.5 hours on-demand video
Work on various GUI and Command Line Tools of DB2 (you will explore different DB2 tools available to perform various administration tasks like creating databases, performing backup and recovery etc ) Administer DB2 Security (you will understand how security is laid down in DB2. you will learn how to administer security for your DB2 system)...
$14.99
Ethical Hacking with Metasploit: Exploit & Post Exploit
by Muharrem AYDIN- 4.5
5 hours on-demand video
New tools are released every day, and it’s crucial to stay on top of the latest knowledge for being a better security specialist. I am interested in the security field and want to make my career in this domain, I really enjoy the learning....
$20.99
Related searches
CISSP Certification: Domains 5, 6, 7 & 8 Video Training-2020
by Shon Gerber- 0.0
6.5 hours on-demand video
Conduct Security Control Testing Collect Security Process Data (e. Understand and Apply Foundational Security Ops Concepts Third-Party Provided Security Services Implement and Manage Physical Security Perimeter Security Controls Internal Security Controls Address Personnel Safety and Security Concerns Security Training and Awareness Conduct Security Control Testing Collect Security Process Data (e. Conduct or Facilitate Security Audits...
$12.99
Introduction to Meteor.js Development
by Dr Matthew Yee-King- 4.6
Approx. 26 hours to complete
You will implement user authentication, security features, reactive templates and routing using iron router. Implement basic security features Security and routing Security and routing summary Security and routing summary quiz...
Fundamentals of Red Hat Enterprise Linux
by Chris CaillouetTop Instructor- 4.8
Approx. 21 hours to complete
Managing Files Using Command-line Tools Managing Files Using Command-line Tools Guided Exercise: Creating Users Using Command-line Tools Guided Exercise: Managing Groups Using Command-line Tools Guided Exercise: Creating Users Using Command-line Tools Guided Exercise: Managing Groups Using Command-line Tools Guided Exercise: Managing File Security from the Command Line Guided Exercise: Managing File Security from the Command Line...