Search result for Computer security and networks Online Courses & Certifications
Get Course Alerts by Email
Microsoft Access: Networking Made Simple
by Bruce Myron- 4.6
2 hours on-demand video
These methods of creating and maintaining small, shared folder networks remove many of the potential pitfalls and the wasted time taken up by periodically updating the network database. How to split a database into front and back ends. How to create a "back door" that lets you work on the database from any network computer and easily do updates....
$15.99
Microsoft Intune Training (Includes Self Practice LABs)
by Pavan Kumar- 4.3
12 hours on-demand video
For example, you can deploy Microsoft Teams, OneNote, and other Microsoft 365 apps to devices. Manage the mobile devices and PCs your workforce uses to access company data. Ensure devices and apps are compliant with company security requirements. Be sure devices and apps are compliant with your security requirements. Ensure devices and apps are compliant with company security requirements....
$15.99
Learning Path: OpenCV: Real-Time Computer Vision with OpenCV
by Packt Publishing- 4.4
5.5 hours on-demand video
Finally, you’ll learn to implement efficient models using the popular machine learning techniques such as classification, regression, decision trees, K-nearest neighbors, boosting, and neural networks with the aid of C++ and OpenCV. Joe Minichino is a computer vision engineer for Hoolux Medical by day and a developer of the NoSQL database LokiJS by night....
$11.99
Dark Web Security Guide- Become an Online Ghost
by Dark Web Academy- 0.0
2.5 hours on-demand video
Silk Road, Alpha Bay and Hansa have all been taken down by law enforcement. This course will guide you through the complex systems of security and explain, hands on, everything you need to know to protect yourself. Tor BrowserVPNsBridgesPGPHTTPsNetwork Security Talk about the long reaching arm of government and how to avoid interrogation or scare tactics....
$13.99
CS50 for Lawyers
by Doug Lloyd , David J. Malan- 0.0
10 Weeks
This course is a variant of Harvard University's introduction to computer science, CS50, designed especially for lawyers (and law students). This course is a variant of HarvardUniversity's introduction to computer science, CS50, designed especially for lawyers (and law students). In addition, it prepares students to formulate technology-informed legal arguments and opinions. Challenges at the Intersection of Law and Technology...
$199
CS50's Computer Science for Lawyers
by Doug Lloyd , David J. Malan- 0.0
10 Weeks
This course is a variant of Harvard University's introduction to computer science, CS50, designed especially for lawyers (and law students). This course is a variant of HarvardUniversity's introduction to computer science, CS50, designed especially for lawyers (and law students). In addition, it prepares students to formulate technology-informed legal arguments and opinions. Challenges at the Intersection of Law and Technology...
$199
Unlocking Information Security II: An Internet Perspective
by Avishai Wool , Dan Gittik- 0.0
7 Weeks
Continue learning how systems are hacked and defended. Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. A survey of the world wide web's security concerns (SQL Injections, CSRF, and XSS): is the Internet ultimately vulnerable or is there a silver lining?...
$149
Related searches
Best Techniques to Drive Traffic to Your Website
by Money Makers Academy- 3.9
1 hour on-demand video
>>> Traffic secrets: Learn how you can turn your computer into traffic driving machine for your website and increase your sales. Social networks are really powerful if you use them properly. Write an Article that is SEO optimized and will attract search engines to your websites. FB Group Joiner and Poster. Two SEO and Internet Mastering Books....
$12.99
Introduction to the Internet of Things and Embedded Systems
by Ian Harris- 4.7
Approx. 12 hours to complete
The explosive growth of the “Internet of Things” is changing our world and the rapid drop in price for typical IoT components is allowing people to innovate new designs and products at home. Enumerate and describe the components of an embedded system 2: Risks, Privacy, and Security Networking and the Internet...
Fundamentals of Red Hat Enterprise Linux
by Chris CaillouetTop Instructor- 4.8
Approx. 21 hours to complete
It will show you how a Linux system is organized, and will demonstrate introductory system administration tasks, which you will be able to practice on your own. Guided Exercise: Controlling New File Permissions and Ownership Viewing File and Directory Permissions and Ownership Changing File and Directory User or Group Ownership Guided Exercise: Managing File Security from the Command Line...