Search result for Data security Online Courses & Certifications
Get Course Alerts by Email
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Perform security assessment activities Perform Security Assessment Activities Security Assessment Activities: Participate in Security and Test Results Monitoring Results: Security Baseline Monitoring Results: Potential Uses of Server Log Data...
Understanding Google Cloud Security and Operations
by Google Cloud Training- 4.6
Approx. 2 hours to complete
Next, it explains how the responsibility of data security is shared between the cloud provider and the business, and explores the defense-in-depth security built into Google Cloud. Module 2: Security in the Cloud Today’s top cyber security challenges Security in the cloud...
Managing and Securing the Apigee Hybrid API Platform
by Google Cloud Training- 0.0
Approx. 4 hours to complete
Security Infrastructure security Data storage and encryption Module Quiz : Security Learn about security, data storage and role-based access control in Apigee hybrid....
Web Connectivity and Security in Embedded Systems
by Juha Plosila , Farhoud Hosseinpour- 4.4
Approx. 12 hours to complete
Welcome to Web Connectivity and Security in Cyber Physical Systems! You will also be able to define security requirements for your system and choose and implement a proper security and privacy technique to protect it. Introduction to Web Connectivity & Security Introduction to Web Connectivity & Security (Graded Quiz) CPS Security and Privacy...
AWS Fundamentals: Addressing Security Risk
by Rudy Chetty , Hong Pham- 4.4
Approx. 7 hours to complete
Welcome to AWS Fundamentals: Addressing Security Risk! This course will give you an overview of security best practices when developing and managing applications on AWS. Welcome to AWS Fundamentals: Addressing Security Risks Monitoring Guard Duty and Security Hub Data Types Data Types...
Digital Thread: Components
by Ken English- 4.6
Approx. 14 hours to complete
You will have a working understanding of the digital thread – the stream that starts at product concept and continues to accumulate information and data throughout the product’s life cycle – and identify opportunities to leverage it. Data Storage in the Digital Thread Data Security and Disaster Recovery Resources: Data Security and Disaster Recovery...
Data Loss Prevention
by The Art Of Service- 3.9
1.5 hours on-demand video
An introductory course about understanding Data Loss Prevention and the different ways of recovering data. Data Loss Prevention (DLP) is a computer security term referring to systems that identify, monitor, and protect data in use, data in motion, and data at rest. Experts accomplish this through deep content inspection, contextual security analysis of transaction, and with a centralized management framework....
$11.99
Related searches
Palo Alto Networks Cybersecurity Essentials I
by James Dalton- 4.7
Approx. 18 hours to complete
Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Reading: Security Models Essentials I: Module 3 - Security Operating Platform / Firewall Technology Video: Data Center Security with PaloAlto Networks Firewall Video: Data Center Security - East / West Traffic...
Introduction to Data Engineering
by Rav Ahuja , Priya Kapoor- 4.7
Approx. 10 hours to complete
This course introduces you to the core concepts, processes, and tools you need to know in order to get a foundational knowledge of data engineering. You will gain an understanding of the modern data ecosystem and the role Data Engineers, Data Scientists, and Data Analysts play in this ecosystem. Viewpoints: Importance of Data Security...
Usable Security
by Jennifer Golbeck- 4.6
Approx. 12 hours to complete
We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system. Intro to Usable Security Guidelines Interface Guidelines for Usable Security Week 4 - Guidelines for Usable Security...