Search result for Computer security and networks Online Courses & Certifications
Get Course Alerts by Email
Learning Oracle Application Express ( Oracle Apex ) Training
by Infinite Skills- 3.8
5.5 hours on-demand video
This Oracle Application Express (Oracle APEX) training course from Infinite Skills will teach you everything you need to know about Oracle's primary tool for developing web applications with SQL and PL/SQL. This video tutorial also covers creating mobile applications, and advanced topics including security features, team development features, and the Apex listener....
$14.99
Website Hacking in Practice: Hands-on Course 101
by Hacking School- 0.0
3.5 hours on-demand video
Before we begin – the practical use of the training you are going to see has been proven by vast group of people – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, black- and white hat hackers....
$13.99
Advanced Mac OS X - Technical And Security Skills
by Infinite Skills- 0.0
9 hours on-demand video
An Essential Course For Mac Users - Unlock The Power Of Your Mac - Learn How To Secure, Fix And Administrator Your Mac 7 and 10. In this OS X advanced training video, you will learn advanced technical and security skills from a certified member of the Apple Consultants Network....
$14.99
Internet Security: A Hands-on Approach
by Wenliang Du- 0.0
19.5 hours on-demand video
This course focuses on a variety of attacks on the Internet, It systematically studies each layer of the TCP/IP protocols, discusses the vulnerabilities in its design and implementation, and demonstrates how to exploit the vulnerabilities in attacks. The hands-on exercises developed by the instructor are called SEED labs, and they are being used by over 1000 institutes worldwide....
$17.99
Learn Ethical Hacking from Entry to Expertise
by InSEC- Techs- 0.0
49 hours on-demand video
From Wikipedia: The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. 95% of Security professionals use distribution like Kali Linux/Backtrack which consists tons of tools that aids pen-testers to perform audits and Metasploit Framework is highly sophisticated tool....
$12.99
Ethical Hacking : Become a Cyber Security Expert
by We Secure © Training & Consultancy- 0.0
12.5 hours on-demand video
Amidst such growth of the industry and increased concern for privacy, the demand for security is rising. Ethical hacking these days is used as a common and favored process to analyze the security systems and programs of an organization. It runs parallel with security judgment, red teaming, intrusion testing, and vulnerability....
$13.99
DevOps CI/CD Pipeline: Automation from development to deployment
by Miguel A. Guirao Aguilera , Eduardo RodrĂguez del Angel , Sylvain Kalache- 0.0
5 Weeks
For developers, sys admins and computer scientists or engineers, to stand out and reduce delivery times without compromising quality and reliability it is essential to know and master DevOps. Master Ansible and Terraform to cut infrastructure configuration times. Learn and practice the security standards these technologies use....
$99
Related searches
Reverse Engineering and Exploit Development
by Infinite Skills- 4.1
6 hours on-demand video
Application Penetration Testing for Security Professionals This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation. Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them....
$17.99
Introduction to AWS - EC2 Deployment Fundamentals
by Infinite Skills- 0.0
2 hours on-demand video
Get started with creating your own virtual servers and databases using Amazon Web Service's powerful capabilities. This video tutorial also covers topics such as monitoring and reporting, security, using Amazon Linux, and creating AMIs. Once you have completed this computer based training course, you will be fully capable of building and deploying your own EC2 Linux and Windows instances....
$14.99
Ethical Hacking & Penetration Testing with Kali Linux
by Packt Publishing- 0.0
14 hours on-demand video
Contents and Overview Exploit networks and data systems using wired and wireless networks as well as web services. This has taken him to new levels where he has helped other organizations and companies to meet their server and website security demands. He is a specialist in ethical hacking and cybersecurity. Sean Oriyano is a long-time security professional and entrepreneur....
$12.99