Search result for Security tools and techniques Online Courses & Certifications
Get Course Alerts by Email
Sales Strategy
by Nelson Yoshida , Edson Ito , Samantha Mazzero- 4.4
Approx. 16 hours to complete
Sales Intelligence Tools and Techniques Sales Intelligence Tools and Techniques Practice quiz: Problem definition and information gathering Video 1 - Relationship between Sales and Strategy Video 1- Internal analysis and implications on sales Module 3 - Intelligence analysis for sales: Analytical tools and techniques Practice quiz: Intelligence analysis for sales: Analytical tools and techniques...
Clinical Natural Language Processing
by Laura K. Wiley, PhD- 3.5
Approx. 12 hours to complete
In this course you will learn the basic linguistic principals underlying NLP, as well as how to write regular expressions and handle text data in R. You will also learn practical techniques for text processing to be able to extract information from clinical notes. Accessing Course Data and Technology Platform Tips and Tricks for Text Processing...
Cybersecurity and the X-Factor
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 12 hours to complete
In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. Security and Employee Compliance Industry Q&A: Security and End Users MISQ Executive: Information Security Management Overview Industry Q&A: Customers and Security Training Security Education, Training and Awareness Security Education: Training and Awareness Quiz Employee Habits, Errors, and Security Breaches...
Understanding Google Cloud Security and Operations
by Google Cloud Training- 4.6
Approx. 2 hours to complete
This course examines cost management, security, and operations in the cloud. Next, it explains how the responsibility of data security is shared between the cloud provider and the business, and explores the defense-in-depth security built into Google Cloud. Module 2: Security in the Cloud Fundamental terms: Privacy, security, compliance and availability...
Cloud Security Basics
by Rick Smith- 4.7
Approx. 13 hours to complete
We'll learn and apply classic security techniques to today’s cloud security problems. We’ll build our own web service case studies and construct security solutions for them. Our toolkit contains classic security concepts like Least Privilege and Separation of Duty, as well as more technical cryptographic and access control techniques. Learn and apply basic network security techniques in the cloud environment....
Introduction to Cybersecurity for Business
by Greg Williams- 4.7
Approx. 12 hours to complete
This course approaches computer security in a way that anyone can understand. Introduction to Practical Computer Security Computer Security Key Definitions The Computer Security Environment Today Security Frameworks Glossary of Computer Security Terms Security Frameworks Week 1: Practical Computer Security Practical Application of Daily Security Ports and Protocols Week 4 - Daily Security...
Data Analysis and Visualization
by Peter Baumgartner , Brittany O'Dea- 4.3
Approx. 11 hours to complete
It begins with common hurdles that obstruct adoption of a data-driven culture before introducing data analysis tools (R software, Minitab, MATLAB, and Python). Data Analysis Software Tools Introduction to Data Analysis and Visualization Techniques and Best Practices Techniques and Best Practices Resources (Optional) Name strengths and weaknesses of different analysis and visualization tools...
Related searches
Proactive Computer Security
by Greg Williams- 4.7
Approx. 11 hours to complete
I’ve heard this before – “I’m not sure my computer security practices are working”. ” This course is the fourth and final course in the Practical Computer Security specialization. Common Pen Testing Tools Week 3 - Penetration Testing Tools Proactive computer security management University of Colorado Security Program - Required Week 4 - Effective computer security management...
Real-Time Cyber Threat Detection and Mitigation
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. TCP/IP Evolution and Security Required: “Network Firewalls,” Steve Bellovin and Bill Cheswick...
Get Interactive: Practical Teaching with Technology
by Dr Eileen Kennedy , Dr Nancy Weitz , Ms Sarah Sherman- 4.7
Approx. 15 hours to complete
This course is designed to help you create dynamic, interactive online courses through the use of multimedia tools, student collaboration opportunities, and formative assessment and feedback. The emphasis in this MOOC is on gaining a wide range of experience in order to decide for yourself which tools and techniques to explore in more depth....