Search result for Device and network security Online Courses & Certifications
Get Course Alerts by Email
Managing G Suite
by Google Cloud Training- 4.7
Approx. 8 hours to complete
This course focuses on the G Suite core services such as Gmail, Calendar, and Drive & Docs. - Understand the mobile device management options available in G Suite. - Describe Google Vault and learn how to use it to retain, search and export your organization's data. Prepare and Deploy Enhanced Desktop Security for Windows...
Managing Google Workspace
by Google Cloud Training- 4.7
Approx. 8 hours to complete
This course focuses on the Google Workspace core services such as Gmail, Calendar, and Drive & Docs. - Describe Google Vault and learn how to use it to retain, search and export your organization's data. - Navigate and interpret Google Workspace admin reports and setup administrator alerts. Prepare and Deploy Enhanced Desktop Security for Windows...
Master in Wi-Fi ethical Hacking
by MBPSec Tech- 3.5
2 hours on-demand video
WiFi Hacking and Pentesting First of all this course is based on the latest tools and complete practical base. This course on Wi-Fi hacking explains the different techniques, which you can hack the WEP, WPA/WPA2 and WPS Wi-Fi router. To get best out of this course, take a stab at assaulting own device for Practice....
$14.99
Industrial IoT Markets and Security
by David Sluiter- 4.7
Approx. 22 hours to complete
is and what factors have enabled the IIoT * What platforms are, and also market information on Software and Services * What the top application areas are (examples include manufacturing and oil & gas) Segment 2 - Device, Application and Network Management Segment 1 - Leading Network and ISP Providers...
Penetration Testing - Post Exploitation
by Aspen Olmsted- 0.0
5 Weeks
Information Security - Authentication and Access Control Network Security - Introduction to Network Security Among the topics covered are Owning, Pivoting, Privilege Escalation and other advanced penetration testing topics, The purpose of the Post-Exploitation phase is to determine the value of the machine compromised and to maintain control of the device for later use....
$166
Security Awareness Training
by (ISC)² Education & Training- 4.6
Approx. 2 hours to complete
The security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. • Data and Account Security • Networking and Mobile Security Data and Account Security Data and Account Security Networking and Mobile Security Network and Security Mobile Devices and Security...
Penetration Testing - Exploitation
by Aspen Olmsted- 0.0
5 Weeks
Learn exploitation phase of penetration testing, including the foundations of explorations, application debugging, reverse engineering, exploitation development and web application exploitation. Information Security - Authentication and Access Control Network Security - Introduction to Network Security Network Security - Protocols Network Security - Advanced Topics In the exploitation phase, the penetration testers try to exploit security weaknesses actively....
$166
Related searches
Palo Alto Networks Cybersecurity Essentials II
by James Dalton- 4.7
Approx. 14 hours to complete
Essentials II provides the student with a full understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Students will also deploy a variety of security methodologies as well as technologies and concepts used for implementing a secure network environment. Reading: Mobile Device and Cloud Security...
Networking and Security Architecture with VMware NSX
by Chris McCain- 4.7
Approx. 20 hours to complete
This 8 week online course equips learners with the basics of network virtualization with VMware NSX. • Summarize networking and security solution architecture with VMware NSX around these key areas: Introduction & Networking and Security Architecture with VMware NSX Networking and Security Architecture with VMware NSX Data Center Multi-site Networking and Security...
70-697: Configuring Windows Devices
by Integrity Training- 0.0
16 hours on-demand video
The extended topics also include the configuration of local and remote network connectivity and storage. The primary focus of this course is to enable the students to configure data security, device security, and network security and to maintain, update, and recover Windows 10 devices....
$12.99