Search result for Device and network security Online Courses & Certifications
Get Course Alerts by Email
Cyber Security Operations and Technology Solutions
by Mobolaji Moyosore- 4.3
4 hours on-demand video
This course covers technology solutions and their respective vendors across multiple cyber defense domains, therefore learners are going to gain an excellent understanding of security products that are typically leveraged in enterprise environments, such that they are able to have meaningful conversations with potential employers. the SIEM) relies on all these other security technologies to deliver value....
$18.99
Build a Social Network with Flutter and Firebase
by Reed Barger- 4.1
9 hours on-demand video
In this course, we’ll use the best in Flutter and Firebase to build a complete social network from zero to deployment called FlutterShare that you can release on the Google Play Store or iOS App Store. Realtime Messaging, Liking and Unliking for Posts Media Queries and Device Orientation for Responsive App Design ...
$12.99
E-Commerce Fraud & Security Bootcamp using Open Source Tool
by Prakash Prasad- 0.0
1.5 hours on-demand video
Master Online Store Setup, Scan for Web Security issues, Identify, and prevent E-commerce Fraud, and More. Find out about the eCommerce Store's Setup, Security and eCommerce Frauds, countermeasures, making the store hack confirmation and the sky is the limit from there Test the Security and Identify Web Security Risks (with open source device)...
$12.99
Oracle Cloud Infrastructure 2020 Architect Associate Exam
by Uprise Education- 0.0
Practice and prepare for Oracle Cloud Infrastructure 2020 Architect Associate | 1Z0-1072-20 Exam. Design for Security using OCI Describe Public and Private IP addresses and virtual NICs Understand remote network connectivity Manage your cloud network components, such as Virtual Private Network (VPN), Fast Connect, Multiple vNICs, and IP addresses Apply IAM, governance, and security best practices...
$12.99
Applications of TinyML
by Vijay Janapa Reddi , Laurence Moroney- 0.0
5 Weeks
You will see examples of TinyML applications, and learn first-hand how to train these models for tiny applications such as keyword spotting, visual wake words, and gesture recognition. Focusing on the neural network of the applications, specifically on training and inference, you will review the code behind “OK Google,” “Alexa,” and smartphone features on Android and Apple ....
$199
Linux Performance Monitoring & Analysis
by Shikhar Verma • 30,000+ Students Worldwide- 0.0
4 hours on-demand video
Start in-demand career as a Linux Server Admin and learn from real IT professionals with live Environment Sessions. Familiar & understanding with Network Monitoring tcpdump- Network Packet Analyzer Memory used and available Swap space used and available Individual device I/O activities Run queue and load average data Network statistics Find files and directories based on date & time...
$12.99
ISO/IEC 27001. Information Security Management System.
by Cristian Lupa- 4.4
5 hours on-demand video
- the second part of the course is all about the controls from Annex A of ISO/IEC 27001 - there are 114 information security controls and all are addressed in the lessons. - if you are manager or owner of a business you will know what is the international standard for information security and start implementing it in your company....
$14.99
Related searches
Microsoft Access Networking 2: Maximum Security
by Bruce Myron- 4.9
2.5 hours on-demand video
Control what users can and can't do in your networked database. None of this is theory and you won't find these techniques in any book. These methods of keeping the network users from even seeing anything they do not need to know about just increase productivity and reduce downtime. How to validate passwords and determine the employee security level....
$13.99
Ethical Hacking - Most Advanced Level Penetration Testing
by ITNuggets Institute- 0.0
10 hours on-demand video
Certified Ethical Hacker Course, Learn Ethical Hacking Using Kali Linux And Windows Based Tools We are giving you a tricks that how attackers attack on our network and how we can defend it by attacking on our own computer networks and devices. Network scanning overview and methodology Switching security concepts and attack...
$12.99
The Complete Ethical Hacking Course!
by Joseph Delgadillo- 3.8
19.5 hours on-demand video
Scanning and enumeration Learn by doing with demonstrations using popular pentesting tools such as Maltego, FOCA, Recon-ng, Nmap, masscan, tcpdump, Wireshark, Ettercap, Burp Suite, Scapy, Mimikatz, Hashcat, Konboot, Hydra, OWASP, SQLmap, mitmproxy, Skipfish and more! Thank you for taking the time to read this, and we hope to see you in the course!...
$17.99