Search result for Security management Online Courses & Certifications
Get Course Alerts by Email
Trading Trend Like A Pro : Perfect Strategy for Trend Trader
- 3.8
who is the current CEO at Fortune Capital and who excels in Security Management....
Plan, Implement and Manage Microsoft Azure Intune
by Parwiz Elm Jo- 0.0
5.5 hours on-demand video
A mobile devices cloud base management tool, which helps organization to manage their mobile devices and PC’s anytime from anywhere. You can configure Security Policies for PC’s and Devices....
$14.99
Deploying HashiCorp Vault with AWS Secrets Engine
by Troy Dieter- 0.0
41 mins on-demand video
This eliminates the need for access key & secret access key management and rotation as all keys are dynamically generated and have a lease time! Use cases and security hardening...
$12.99
Master Java Web Services and RESTful API with Spring Boot
by in28Minutes Official- 4.5
9.5 hours on-demand video
You will be using Spring (Dependency Management), Spring MVC (or Spring REST), Spring Boot, Spring Security (Authentication and Authorization), Spring Boot Actuator (Monitoring), Swagger (Documentation), Maven (dependencies management), Eclipse (IDE), Postman (REST Services Client) and Tomcat Embedded Web Server. Step 28 - Implementing Basic Authentication with Spring Security Step 18 - Implementing Security for SOAP Web Services with WS Security...
$19.99
Complete IT Support Specialist Course: IT Foundations
by Jonney J Robinson- 0.0
6 hours on-demand video
Security Process Management...
$19.99
Hands-on: Complete Penetration Testing and Ethical Hacking
by Muharrem AYDIN- 4.5
19.5 hours on-demand video
What is the Certified Information Security Manager ( CISM ) exam? Ping Scan to Enumerate Network HostsPort Scan with NmapSYN Scan, TCP Scan, UDP ScanVersion & Operating System DetectionInput & Output Management in NmapNmap Scripting EngineHow to Bypass Security Measures in Nmap ScansSome Other Types of Scans: XMAS, ACK, etc. Network Security cyber security network security security security testing security testing...
$21.99
Water Resources Management and Policy
by Christian Bréthaut , Géraldine Pflieger- 4.6
Approx. 10 hours to complete
Water management today is faced with new challenges such as climate change or the effects of human activity. 2 From Integrated Water Resources Management (IWRM) to Watershed Management 4 Watershed Management in Switzerland I: History and Methods 5 Watershed Management in Switerland: Practical Experience 6 Pollution Management in the Rhine River Basin...
Related searches
Big Data Modeling and Management Systems
by Ilkay Altintas , Amarnath Gupta- 4.4
Approx. 13 hours to complete
In this course, you will experience various data genres and management tools appropriate for each. * Differentiate between a traditional Database Management System and a Big Data Management System * Appreciate why there are so many data management systems Introduction to Big Data Modeling and Management Designing a Big Data Management System for an Online Game...
Getting Started in Port Scanning Using Nmap and Kali Linux
by Andrew Mallett- 0.0
2.5 hours on-demand video
Reducing Cyber Security Threats Through Understanding Scanning your network with the tools and systems used by hackers helps you understand the cyber security risk to your systems. Next we learn to audit SSH security to detect systems that allow password based authentication, again a default setting we need to secure....
$12.99
AWS Certified SysOps Administrator-Associate - Mock Test
by BINKIS DEV- 0.0
Select the appropriate AWS service based on compute, data, or security requirements Understanding of security concepts with hands-on experience in implementing security controls and compliance requirements...
$12.99