Search result for Security tools Online Courses & Certifications
Get Course Alerts by Email
Microsoft Cybersecurity Pro Track: Threat Detection
by Cristian Calinescu- 0.0
6 hours on-demand video
In this course, we will examine the concepts of Threat Detection in an Enterprise using the Microsoft tools and security services for On-Premises, Hybrid and Cloud environments. Enterprise Cyber Security Fundamentals (Introduction to Cybersecurity) Threat Detection ( Detect security breaches early - explore the capabilities of Microsoft's threat detection and mitigation tools - including hands on Lab)...
$12.99
Architecting Smart IoT Devices
by Martin Timmerman , Maarten Weyn- 4.3
Approx. 34 hours to complete
Tools for schedulability analysis Software development tools and environments Security requirements Security coding techniques Security models How vendors deal with security issues Development Tools and Environments...
The Foundations of Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 9 hours to complete
Security Technologies (Module 1. Security Technologies Wrap-up for Security Technologies Security Technologies Module Vulnerability Assessment: Tools and Techniques (Lesson 1. Scanning and Analysis Tools Vulnerability Assessment: Tools and Techniques (Quiz 1. The Cybersecurity Personnel and the Security Department (Lecture 1. The Cybersecurity Personnel and the Security Department (Quiz 1....
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Describe the processes for operating endpoint device security Operate and Secure Virtual Environments: Network Security Operate and Secure Virtual Environments: Virtual Machine Security...
Palo Alto Networks Cybersecurity Essentials I
by James Dalton- 4.7
Approx. 18 hours to complete
Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Reading: Security Models Essentials I: Module 3 - Security Operating Platform / Firewall Technology Video: Data Center Security with PaloAlto Networks Firewall...
Cyber Security Economics
by Ross Anderson , Rainer Böhme , Michel van Eeten , Carlos H. Gañán- 0.0
10 Weeks
Learn how to make better decisions about security and IT by using state-of-the-art economic tools, security metrics and data analytics. Economics of information security investment. Security market failures. We discuss available economic tools to better align the incentives for cybersecurity, including better security metrics, cyber insurance/risk transfer, information sharing, and liability assignment....
$50
Architecting with Google Kubernetes Engine: Production
by Google Cloud Training- 4.7
Approx. 12 hours to complete
Access Control and Security in Kubernetes and Google Kubernetes Engine (GKE) Kubernetes Control Plane Security Pod Security Applying pod security policies Kubernetes control plane security Pod Security Access Control and Security in Kubernetes and GKE Examples of CI/CD Tools Define Identity and Access Management roles for GKE, as well as Kubernetes pods security policies...
Related searches
MongoDB: Learn Administration and Security in MongoDB
by Insculpt Technologies- 3.1
1 hour on-demand video
Complete guide for sharding, administration and security in MongoDB This course on MongoDB Administration and Security provide specific step-by-step instructions for performing common MongoDB setup, maintenance, security and configuration operations. MongoDB Administration tools MongoDB monitoring Tools Issues of Security in MongoDB...
$11.99
Managing Network Security
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 15 hours to complete
● Identify the issues and practices associated with managing network security ● Identify the practices, tools, and methodologies associated with assessing network security ● Describe the components of an effective network security program Managing Network Security Cryptography and Network Security Cryptography and Network Security Managing Network Security Wrap up for Managing Network Security...
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Perform security assessment activities Perform Security Assessment Activities Security Assessment Activities: Participate in Security and Test Results Security Assessment Activities: Potential Problems Monitoring Results: Security Baseline...