Search result for It security Online Courses & Certifications
Get Course Alerts by Email
Wireshark Ethical Hacker Guide
by Abdul Motin- 0.0
35 mins on-demand video
It is used by IT and Network administrators to troubleshoot network connectivity issues and by Network Security analysts to dissect network attacks. This free and open source application is so widely used in the industry because it works. It is cross platform, meaning that it runs on Windows, Mac, Linux, and FreeBSD....
$12.99
Ultimate Istio Bootcamp by School of DevopsĀ®
by Gourav Shah- 0.0
5.5 hours on-demand video
Istio service mesh is the new thing in town and a lot of folks are wondering what it is and whats the need of it when they are already using kubernetes....
$12.99
INTERNET OF THINGS & LAW - DR. PAVAN DUGGAL - CYBERLAW UNIV.
by Dr. Pavan Duggal- 3.5
1 hour on-demand video
It takes you through a journey to discover the various complex legal issues that Internet of Things is beginning to throw up, including protection of privacy and cyber security and how different legal approaches are evolving to deal with these legalities and related nuances raised by IoT....
$12.99
Introduction to Vulnerability Management
by Corey Charles- 0.0
4 hours on-demand video
It covers risk management and covers the basis of penetration testing vs vulnerability management as well. The lab introduces the students to Nessus and how vulnerabilities are tracked in the security scanner based on the respective critical level....
$12.99
Automated Multiple Face Recognition AI Using Python
by Nishit Maru- 4
2 hours on-demand video
It is also described as a Bio-metric Artificial Intelligence based application that can uniquely identify a person by analyzing patterns based on the person's facial textures and shape. Airports are increasingly adding facial recognition technology to security checkpoints; the U. Department of Homeland Security predicts that it will be used on 97 percent of travelers by 2023....
$12.99
Python Digital Forensics
by Packt Publishing- 3.9
3 hours on-demand video
Daryl Bennett is a manager of a Cyberspace Threat Emulation team with the United States Air Force, where he leads military and civilian members in the employment and execution of offensive security on order to audit the security of network infrastructures. He is a key operator, focusing on risk analysis and the overall security posture of cyberspace systems....
$12.99
Getting Started in Port Scanning Using Nmap and Kali Linux
by Andrew Mallett- 0.0
2.5 hours on-demand video
Reducing Cyber Security Threats Through Understanding A default install of CentOS 8 may seem like a good idea but how exposed does that leave you, after all it is Enterprise Level Linux. Scanning your network with the tools and systems used by hackers helps you understand the cyber security risk to your systems....
$12.99
Related searches
Master Java Web Services and RESTful API with Spring Boot
by in28Minutes Official- 4.5
9.5 hours on-demand video
It really helped me to do a coding assessment for the company. 5 STARS - It is such an awesome course, I have now got an idea to create production level restful services Step 28 - Implementing Basic Authentication with Spring Security Step 18 - Implementing Security for SOAP Web Services with WS Security...
$19.99
The Complete Nmap Ethical Hacking Course : Network Security
by Nathan House- 4.5
4.5 hours on-demand video
Become an expert in the ethical hacking and network security tool Nmap! It is used by all good ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discovery more about the security of a network and its hosts....
$21.99
AWS Certified Cloud Practitioner: 5 Full Practice Exams 2021
by Rajesh Daswani | IaaS Academy- 4.3
Describe the basic security and compliance aspects of the AWS platform and the shared security model Basic understanding of IT services...
$14.99