Search result for Data security Online Courses & Certifications
Get Course Alerts by Email
Intro to Backend
by Steve Huffman- 0.0
Approx. 3 weeks
lesson 4 User Accounts & Security What's a cookie and what does it have to do with logging in a user?...
Free
Research Data Management and Sharing
by Helen Tibbo , Sarah Jones- 4.7
Approx. 14 hours to complete
After completing this course, learners will understand the diversity of data and their management needs across the research data lifecycle, be able to identify the components of good data management plans, and be familiar with best practices for working with data including the organization, documentation, and storage and security of data....
PCI (Payment Card) Standards for Corporate Professionals
by Illumeo Learning- 4.6
1 hour on-demand video
This course covers relevant aspects of the PCI Data Security Standard for processing credit card data. The Payment Card Industry Data Security Standard (PCI DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent data security measures globally....
$14.99
IT Infrastructure and Emerging Trends
by Soumya Sen- 4.9
Approx. 8 hours to complete
3-2 Data Center 3-2 Mobile Marketing: Data Insights Information Security 3-1 Cyber Security Best Practices 3-3 Future of Data Security Module 3: Information Security Quiz Become aware of cyber security threats that organizations need to be aware of and learn about various defense mechanisms....
Oracle Cloud Security Data Protection and Encryption
by Zulqarnain Hayat- 3.5
4.5 hours on-demand video
With the increasing risks of cyberattacks, database hacks, and data leaks, knowing how to fully enable and leverage all of the Oracle 12c security features is essential. Plus, find out how to enable data-at-rest security via the Oracle Transparent Data Encryption and backup encryption options. Core concepts of Oracle database security Data encryption...
$11.99
ISO 27001: Complete MasterCourse for EXIN ISF Certification
by GetGlobal International - USA- 4.5
6.5 hours on-demand video
This course prepares the student for the EXIN Information Security Foundation certification, one of the most important in the information security area, which is part of EXIN’s official career for DPO (Data Protection Officer) training, the data protection officers, required both by the LGPD (General Data Protection Law) and by the GDPR (General Data Protection Regulation) of the European Union....
$12.99
Introduction to Cybersecurity Tools & Cyber Attacks
by IBM Security Learning Services- 4.5
Approx. 20 hours to complete
Security Threats Roles in Security Additional Security Challenges The Insane Amounts of Data We're Using Every Minute (Infographic) An overview of key security tools Welcome to an Introduction to Key Security Tools Cryptography - a different perspective from a Security architect Key security tools Discuss the evolution of security based on historical events....
Related searches
Azure Storage Security Guide
by CloudTAC -Information Systems Governance and Security- 0.0
3 hours on-demand video
End-to-End Storage Security in Microsoft Azure Azure Security Engineers implement security controls and threat protection, manage identity and access, and protect data, applications, and networks in cloud and hybrid environments as part of end-to-end infrastructure. Configure encryption for data at rest Configure and manage management and data plane security for your storage account....
$12.99
Big Data for Reliability and Security
by Saurabh Bagchi- 0.0
8 Weeks
This course teaches the principles and practices of big data for improving the reliability and the security of computing systems. It delves into a set of techniques for defending big data techniques against natural failures (the reliability aspect) and against malicious attacks (the security aspect). Understand and develop big data techniques for improving reliability and security of computing systems...
$750
Network Security & Database Vulnerabilities
by IBM Security Learning Services- 4.6
Approx. 14 hours to complete
You will learn how networking affects security systems within an organization. You will learn about various security breach types associated with databases and organizations that define standards and provide tools for cybersecurity professionals. Data Source Types Part 1 Data Source Types Part 2 A Data Protection Solution Example, IBM Security Guardium Use Cases...