Search result for Security challenges Online Courses & Certifications
Get Course Alerts by Email
Cyber Security Economics
by Ross Anderson , Rainer Böhme , Michel van Eeten , Carlos H. GaĂ±Ă¡n- 0.0
10 Weeks
Learn how to make better decisions about security and IT by using state-of-the-art economic tools, security metrics and data analytics. We introduce state of the art security and IT metrics and conceptualize the characteristics of a security metric, its challenges and advantages. Economics of information security investment. Security market failures. How to design security metrics to capture information security issues...
$50
Thriving Through Challenging Times
by Francis Odero- 0.0
41 mins on-demand video
An inspiring experiential course that offers new insights and practical techniques to help you respond to day-to-day challenges with more ease and composure....
$12.99
Arctic Security Fundamentals
by Troy Bouffard- 0.0
6 Weeks
This course explores the present-day security situation of the Arctic through a focus on the key stakeholders responsible for diplomacy and defense. Security specialists interested in learning more about the Circumpolar North Members of defense-related institutes and organizations who want to know more about international security and/or the Arctic...
$139
CISA Question Set
by Yogesh Naik- 3.2
Demonstrate that you have gained and maintained the level of knowledge required to meet the dynamic challenges of a modern enterprise. Able to demonstrate a deep understanding of the relationship between information security audits and broader business goals and objectives....
$13.99
WiFi Hacking Cyber Security Guide
by MdJahidul Said- 0.0
32 mins on-demand video
This course takes an in-depth look at the security challenges of many different wireless technologies, exposing you to wireless security threats through the eyes of an attacker....
$12.99
Web Connectivity and Security in Embedded Systems
by Juha Plosila , Farhoud Hosseinpour- 4.4
Approx. 12 hours to complete
Welcome to Web Connectivity and Security in Cyber Physical Systems! We will also go through security and privacy issues and challenges in cyber physical systems (CPS). You will also be able to define security requirements for your system and choose and implement a proper security and privacy technique to protect it....
Amazon DynamoDB: Building NoSQL Database-Driven Applications
by Seph Robinson , Rick Hurst , Morgan Willis- 0.0
4 Weeks
This course introduces you to NoSQL databases and the challenges they solve. Expert instructors will dive deep into Amazon DynamoDB topics such as recovery, SDKs, partition keys, security and encryption, global tables, stateless applications, streams, and best practices. How NoSQL databases differ from relational databases and the challenges they solve...
$99
Related searches
Amazon DynamoDB: Building NoSQL Database-Driven Applications
by Seph Robinson , Morgan Willis- 4.8
Approx. 10 hours to complete
This course introduces you to NoSQL databases and the challenges they solve. Expert instructors will dive deep into Amazon DynamoDB topics such as recovery, SDKs, partition keys, security and encryption, global tables, stateless applications, streams, and best practices....
Palo Alto Networks Cybersecurity Essentials I
by James Dalton- 4.7
Approx. 18 hours to complete
Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Reading: Security Models Essentials I: Module 3 - Security Operating Platform / Firewall Technology Video: Data Center Security with PaloAlto Networks Firewall...
Engineering Maintainable Android Apps
by Dr. Douglas C. Schmidt , Michael Walker , Dr. Jules White- 4.5
Approx. 9 hours to complete
Security & Sustainability I Security & Sustainability Security I Quiz Security & Sustainability II The Challenges of Secure Coding Security Vulnerability Walkthrough Security II Quiz...