Search result for It security Online Courses & Certifications
Get Course Alerts by Email
IPSEC VPN Tunnel on MikroTik
by Maher Haddad- 4.7
3.5 hours on-demand video
Understand how IPSEC tunneling protocol works and know how to apply it correctly on MikroTik RouterOS During this course, I will explain also about a lot of security terms that we always hear and is used on IPSEC such as: Encryption, Hashing, Authentication, Deffie-Hellman, Symmetric and Asymmetric keys, etc....
$12.99
WordPress Basics: Affiliate Marketing and Security
by Mitch Stevens- 4.2
1.5 hours on-demand video
Wordpress Fundamentals for Affiliate Marketing Plus Bonus Security Techniques So the longer you wait getting your site started, the longer it will be before you get paid....
$11.99
CheatSheets for Snowflake SnowPro Certification Exam
by Ashok Bhatla- 0.0
1 hour on-demand video
It is divided into 5 different units. (1) Architecture (2) Security and Data Sharing (3) Data Loading and Connectivity, (4) Query Execution & Performance, (5) Working with SnowFlake (Covers STREAMS, TASKS and RESOURCE MONITORS in details)...
$12.99
Microsoft Teams: Teams Essentials for the workplace
by Mauricio Rubio - Agile Guru & Founder of AgileKB | AgileLee & Ureducation- 0.0
2 hours on-demand video
The sky is the limit when it comes to Microsoft Teams. The look and feel of these functions is modern, intuitive, fast and fluid, has low-overhead, and is instantly familiar since it doesn't differ too much from other applications employees use in the modern world outside the office....
$14.99
Java, JVM security. The Java sandbox model
by Ferenc Tollas- 3.9
2 hours on-demand video
As a Java professional, you must know what security features and settings the Java Virtual Machine provides. As a Java developer it is a must to know how the JVM works, what security features it provides. o JVM architecture - with emphasis on security o Use system or custom policy file, where can it be controlled...
$12.99
VMware NSX-T 3.0 Fundamentals Part Two (Security) 2020
by Mike Molak- 0.0
3.5 hours on-demand video
Want to learn what the Distributed Firewall is, and how it works?...
$12.99
DevOps with Jenkins Pipeline, Ansible, Kubernetes & Docker
by Hari Kammana- 0.0
4.5 hours on-demand video
This course gives a good overview of DevOps using Jenkins Pipeline Jobs, using Groovy DSL, It Covers good examples to implement CI/CD end to end. Coming to notifications, It explains How to integrate Jenkins with Email and Slack, By integrating with Plugins...
$12.99
Related searches
Become Master in Ethical Hacking with Android (without Root)
by Muhammad Ali- 0.0
1.5 hours on-demand video
As a matter of fact, however - it actually is! Ethical hacking and penetration testing have been the go-to terms of every network administrator for the longest time now. This type of hacking is legal because it is concerned about with advancing network security, rather than breaking it down and breaching it....
$12.99
Scanning Cyber Security Hacking Course
by Pronoy Kumar- 0.0
36 mins on-demand video
It is used by all good ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discovery more about the security of a network and its hosts....
$12.99
Leaders in Citizen Security and Justice Management
by Olga Espinoza , Eduardo Pazinato , Alejandra Mera , Hung-En Sung- 0.0
10 Weeks
It is expected that this course will create awareness among public officials, authorities, academics, journalists, civil society and the public interested in citizen security and justice issues in Latin America and the Caribbean, on the intersectoral nature of policies that seek to improve the services of social prevention of violence, police, prosecutor’s offices, and prisons....
$25