Search result for Security tools Online Courses & Certifications
Get Course Alerts by Email
Microsoft Azure Services and Lifecycles
by Microsoft- 4.8
Approx. 8 hours to complete
With the rise of remote work, bring your own device (BYOD), mobile applications, and cloud applications, the primary security boundary has shifted from firewalls and physical access controls to identity....
Instagram Growth Academy | Grow Followers Fast & Easy
by J Viana- 3.1
2.5 hours on-demand video
Learn content creation, automations with tools and apps. Learn effective tools and resources to draw users to your account, follow you and engage on a daily basis. BONUS: You’ll receive a lot of extra resources for free, like a posting schedule, links to royalty-free images, a sample media kit, security tips, marketing, and business principles overlooked and much more!...
$14.99
Free Tools for Penetration Testing and Ethical Hacking
by Muharrem AYDIN- 0.0
8.5 hours on-demand video
Learn hackers`Web Hacking, Network Scanning and Password Cracking tools such as Wireshark, Nmap, Metasploit, Maltego In this course, I have listed the web’s favorite ethical hacking / pentesting hacker tools as used by hackers, geeks, ethical hackers and security engineers (as well as black hat hackers). Password Cracking Tools Network Layer & Layer-2 Attacks Tools...
$16.99
Full stack web development and AI with Python (Django)
by John Harper- 4.4
39.5 hours on-demand video
Use AWS tools such as EC2 to host your websites Integrate web server tools such as Nginx and Gunicorn Master essential developer tools such as GIT, Jupyter notebook, Google Colab, GPUs, Putty, Browser Developer Tools Gain experience in digital security - the DOs and DONTs of developing and scaling online websites and services...
$14.99
DevOps Fundamentals
by Raouf Nabi- 0.0
3.5 hours on-demand video
Compare traditional configuration tasks with DevOps and recognize DevOps configuration tools such as Chef and Puppet. Configure application security through DevOps. Provision virtual servers through DevOps and recognize DevOps virtualization tools such as Vagrant. Define the steps for DevOps software releases and maintenance scheduling and recognize DevOps release tools such as Jenkins....
$19.99
Debian Linux Server Setup and Administration Essentials
by Aleksey Grebeshkov- 0.0
3 hours on-demand video
Join the community of over 1290 students to learn the basic concepts and tools that you will need to build fully functional Linux based web server. Powerful Tools at Your Fingertips Learning Linux server setup essentials puts a very powerful and useful tools at your disposal....
$12.99
Moodle Administration Tutorial: Beginner, Intermediate Guide
by Srikanth Shirodkar- 4.2
4.5 hours on-demand video
Any Device, Any Where - learn to create online classes that can be used on ANY device with a screen and learners can access from AnywhereHigh Engagement with Social Tools - like the Discussion forum, WIKI, blogsSave Hundreds of hours and Thousands of dollars - with automated tools such...
$19.99
Related searches
Reverse Engineering, Debugging and Malware Analysis - 2021
by TechBinz Academy- 4
6 hours on-demand video
An analyst would not plainly rely on the tools and information we provide in this udemy course. System monitoring and fuzzing tools are commonly used when testing software. In the software security industry, one of the core skills required is reverse engineering....
$14.99
Architecting AWS: Best Practices, Patterns & Troubleshooting
by Packt Publishing- 4.1
2 hours on-demand video
Amazon provides a range of tools for analyzing the cost impact and security footprint of cloud applications, all of which we will explore with practical, real-life examples. Since then he’s worked with a huge range of Big Data tools including most of the Hadoop eco-system, Spark and many No-SQL technologies such as Cassandra, MongoDB, Redis and DynamoDB....
$9.99
Network Security - Protocols
by Aspen Olmsted- 0.0
5 Weeks
Learn more fundamentals of network security, including cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security and Wireless Security. Information Security - Introduction to Information Security Information Security - Authentication and Access Control This is a self-paced course that provides a continuation of network security topics. Explain why it's important to consider Layer 2 security...
$166