Search result for Security tools and techniques Online Courses & Certifications
Get Course Alerts by Email
Advanced Clinical Data Science
by Michael G. Kahn, MD, PhD , Laura K. Wiley, PhD- 0.0
Approx. 4 hours to complete
This course prepares you to deal with advanced clinical data science topics and techniques including temporal and research quality analysis. Keep Calm and Data Science On Tools and Techniques: Temporality Temporality: Medicine and Healthcare Changes Over Time: Medicine and Healthcare Temporality and Analytics Understanding Dates and Times: R & SQL Tools and Techniques: Missing Data...
Data-driven Decision Making
by Alex Mannella- 4.6
Approx. 9 hours to complete
In this course, you'll get an introduction to Data Analytics and its role in business decisions. You'll also be introduced to a framework for conducting Data Analysis and what tools and techniques are commonly used. Data and analytics framework: tools and techniques Data tools and technologies Data analysis techniques and tools Data analysis approaches and techniques...
Microsoft Azure Management Tools and Security Solutions
by Microsoft- 4.7
Approx. 9 hours to complete
To keep control of your environment and to make deployments easier, it also offers a wide array of management tools and services. You will learn how to build a complete network security solution that brings all these tools together to secure your Microsoft Azure deployments and resources. Detect and respond to security threats by using Azure Sentinel...
Managing Security in Google Cloud
by Google Cloud Training- 4.7
Approx. 7 hours to complete
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. VPC Network Security and Monitoring Threats Mitigated by Google and Google Cloud Access Transparency and Access Approval Foundations of Google Cloud Security Choosing between Google authentication and SAML-based SSO VPCs for Isolation and Security VPCs for Isolation and Security...
Forensic Accounting and Fraud Examination
by Dr. Richard Riley, Ph.D , Dr. Richard Dull, Ph.D , John Gill, J.D., CFE- 4.7
Approx. 7 hours to complete
How to Detect and Prevent Financial Statement Fraud - Crazy Eddie Big Data, Benford's Law and Financial Analytics Using Data and Technology for Fraud Detection and Investigation Data Analysis Tools Availability of Data and Text Analysis Cyber-Crime and Money Laundering: Contemporary Tools and Techniques. ZZZZ Best and Barry Minkow...
Architecting with Google Kubernetes Engine: Production
by Google Cloud Training- 4.7
Approx. 12 hours to complete
Access Control and Security in Kubernetes and Google Kubernetes Engine (GKE) Kubernetes Control Plane Security Pod Security Applying pod security policies Authentication and authorization Kubernetes control plane security Access Control and Security in Kubernetes and GKE Define Identity and Access Management roles for GKE, as well as Kubernetes pods security policies...
Six Sigma Tools for Improve and Control
by Christina Scherrer, PhD , David Cook, PhD , Gregory Wiles, PhD , Bill Bailey, PhD- 4.8
Approx. 9 hours to complete
This course will provide you will the tools necessary to complete the final components of the analyze phase as well as the improve and control phases of the Six Sigma DMAIC (Define, Measure, Analyze, Improve, and Control) process. This course will provide you with tools and techniques for improvement. Control Tools and Documentation...
Related searches
Palo Alto Networks Cybersecurity Essentials I
by James Dalton- 4.7
Approx. 18 hours to complete
Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Students will also deploy a variety of security methodologies as well as technologies and concepts used for implementing a secure network environment....
Responsive Images
by Cameron Pittman , Sam Dutton- 0.0
Approx. 2 weeks
, markup techniques using CSS, fonts, and inline images, and the brand new Apply responsive image principles in a real-world scenario! lesson 3 Images with Markup Dive into using markup techniques like CSS and icon fonts to create responsive graphics. Learn how to use markup techniques that are natively responsive and often extremely lightweight....
Free
Getting Started with Azure
by Kenny Mobley- 4.4
Approx. 20 hours to complete
Students will gain familiarity with core Azure topics and practice implementation of infrastructure components. Navigating Azure Tools and Services Azure Network Security Network Security Groups Activity: Tutorial - Filter Network Traffic with a Network Security Group Security Responsibilities Azure Network Security Groups Cloud Security, including Network Security Groups, Firewall and Resource Policies...