Search result for Data security Online Courses & Certifications
Get Course Alerts by Email
Cyber Threats and Attack Vectors
by Greg Williams- 4.7
Approx. 12 hours to complete
Data breaches occur nearly every day. What did they do with the data they compromised? THREATS AND ATTACK VECTORS IN COMPUTER SECURITY Cloud Security Database Security Cloud Security Alliance Week 3: Cloud Security Data Breaches Discovering Data Breaches!...
Mitigating Security Vulnerabilities on Google Cloud
by Google Cloud Training- 4.7
Approx. 8 hours to complete
They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies. Welcome to Mitigating Security Vulnerabilities on Google Cloud Security Partner Products Infrastructure, Data Protection, Logging and Compliance Partners Misuse of Data and Content Lab Intro: Redacting Sensitive Data with Data Loss Prevention API...
Detect and Mitigate Ethical Risks
by Renée Cummings , Jennifer Fischer , Eleanor 'Nell' Watson- 0.0
Approx. 20 hours to complete
Overfitting to Training Data Radioactive Data Tracing Manage Safety and Security Risks The Importance of Managing Safety and Security Risks Evaluate Training Data and Models Protect the Security of Data in Storage Protect the Security of Data in Transit Security Information and Event Management (SIEM) Incorporate Safety and Security Risk Management in the Lifecycle...
Introduction to Cybersecurity for Business
by Greg Williams- 4.7
Approx. 12 hours to complete
This course approaches computer security in a way that anyone can understand. Introduction to Practical Computer Security Computer Security Key Definitions The Computer Security Environment Today Security Frameworks Glossary of Computer Security Terms Security Frameworks Week 1: Practical Computer Security Home Depot data breach Practical Application of Daily Security Week 4 - Daily Security...
Introduction to Designing Data Lakes on AWS
by Morgan Willis , Rafael Lopes- 4.7
Approx. 14 hours to complete
Designing a data lake is challenging because of the scale and growth of data. Why Data Lakes Characteristics of Data Lakes Data Lakes Components Comparison of a Data Lake to a Data Warehouse Discussing Sample Data Lake Architectures Data Lake Characteristics and Components Data Lakes and Data Warehouses Introduction to Data Lake Security...
Networking and Security Architecture with VMware NSX
by Chris McCain- 4.7
Approx. 20 hours to complete
Introduction & Networking and Security Architecture with VMware NSX Networking and Security Architecture with VMware NSX Data Center Security Solutions with VMware NSX Security Solutions with VMware NSX NSX: Security at the Speed of Business Introduction to NSX Security Ecosystem Security Solutions Review Security Solutions Multi-site Networking and Security...
Hybrid Cloud Fundamentals
by Mark Lavi , Cees van Eijk- 0.0
Approx. 1 month
lesson 4 Hybrid Cloud Security Apply security standard and best practices to secure your hybrid cloud. lesson 7 Data Protection Learn about the complexities of data protection in a hybrid cloud world. Apply data protection best practices including backups....
Free
Related searches
Enterprise and Infrastructure Security
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks. Security Awareness Using Video for Security Awareness Security Assessment and Audit Challenges of Compliance versus Security Video: “Addressing the Challenges of Complying with the Payment Card Industry Data Security Standard,” HALOCK Security Labs – Introduction to PCI Compliance...
Security Best Practices in Google Cloud
by Google Cloud Training- 4.6
Approx. 13 hours to complete
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs....
Cloud Computing Fundamentals on Alibaba Cloud
by Steve Xue- 4.7
Approx. 12 hours to complete
Fundamental Architecting looks into storage, networking, auto-scaling, and security solutions as well as scenarios to best combine these products to create a complete cloud-based architecture. RDS Monitoring & Security Learn to secure your cloud architecture with a range of cloud security solutions Manage a Relational Database that can analyze large sets of data...