Search result for Device and data security Online Courses & Certifications
Get Course Alerts by Email
Palo Alto Networks Cybersecurity Essentials II
by James Dalton- 4.7
Approx. 14 hours to complete
Essentials II provides the student with a full understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. • Demonstrate ability to assess and harden endpoints based on security policies. Reading: Mobile Device and Cloud Security DISCOVERY: Security Challenges for Remote Access and VPN...
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. You will also gain an awareness of some of the skills, knowledge and roles/careers opportunities within the information security industry. Information and security This video introduces the core information security services and tools provided by cryptography....
Cybersecurity in Healthcare (Hospitals & Care Centres)
by Jason H. Pridmore , Tessa A. P. Oomen- 4.6
Approx. 15 hours to complete
It explains how the rise of technologies and proliferation of (medical) data has become an attractive target to cybercriminals, which is essential in understanding why adequate cybersecurity measures are critical within the healthcare environment. You can also join the Security providers and Trainers platform (see: https://www. How to handle health data and personnel information...
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. We will examine processes such as damage recovery, data integrity and preservation, and the collection, handling, reporting, and prevention. Security Assessment Activities: Participate in Security and Test Results...
Healthcare Data Security, Privacy, and Compliance
by Paul Nagy, PhD, FSIIM- 4.7
Approx. 6 hours to complete
In the final course of the Healthcare IT Support program, we will focus on the types of healthcare data that you need to be aware, complexities of security and privacy within healthcare, and issues related to compliance and reporting. Healthcare Data Data in Healthcare: Diagnoses and Medications Healthcare Data Security and Privacy...
Mitigating Security Vulnerabilities on Google Cloud
by Google Cloud Training- 4.7
Approx. 8 hours to complete
They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies. Welcome to Mitigating Security Vulnerabilities on Google Cloud Security Partner Products Infrastructure, Data Protection, Logging and Compliance Partners Content-Related Vulnerabilities: Techniques and Best Practices Misuse of Data and Content...
Big Data Analytical Platform on Alibaba Cloud
by Derek Meng- 4.5
Approx. 8 hours to complete
Building an Analytical Platform on Alibaba Cloud can empower how you take in, analyze, and demonstrate clear metrics from a set of Big Data. Alibaba Cloud Big Data - Data Integration: https://edu. Big Data on Alibaba's Double 11 Introduction to Hadoop in Big Data Ecosystem Draw Graphs and Tables to demonstrate the analysis of Big Data Results...
Related searches
API Security on Google Cloud's Apigee API Platform
by Google Cloud Training- 4.6
Approx. 8 hours to complete
You explore the security concerns you will encounter for your APIs. You also learn about securing against malicious requests, safely sending requests across a public network, and how to secure your data for users of Apigee. Module 2: Content, Transport, and Platform Security Module Quiz - Content, Transport, and Platform Security...
Detect and Mitigate Ethical Risks
by Renée Cummings , Jennifer Fischer , Eleanor 'Nell' Watson- 0.0
Approx. 20 hours to complete
Manage Safety and Security Risks The Importance of Managing Safety and Security Risks Evaluate Training Data and Models Protect the Security of Data in Storage Protect the Security of Data in Transit Security Information and Event Management (SIEM) Incorporate Safety and Security Risk Management in the Lifecycle Managing Safety and Security Risks Quiz...
Introduction to Designing Data Lakes on AWS
by Morgan Willis , Rafael Lopes- 4.7
Approx. 14 hours to complete
In this class, Introduction to Designing Data Lakes on AWS, we will help you understand how to create and operate a data lake in a secure and scalable way, without previous knowledge of data science! Starting with the "WHY" you may want a data lake, we will look at the Data-Lake value proposition, characteristics and components....