Search result for Device and data security Online Courses & Certifications
Get Course Alerts by Email
AWS IoT: Developing and Deploying an Internet of Things
by Bobbie Atristain , Adam Becker , Neel Mitra , Wes Gruver- 0.0
4 Weeks
Learn how to build, deploy and analyze secure IoT solutions in the AWS cloud With the proliferation of devices, you increasingly need solutions to connect them, and collect, store, and analyze device data. How to collect, process and analyze data from IoT devices in the Cloud How to use AWS IoT Greengrass to process and analyze data at the edge...
$99
AWS Fundamentals: Addressing Security Risk
by Rudy Chetty , Hong Pham- 4.4
Approx. 7 hours to complete
This course will give you an overview of security best practices when developing and managing applications on AWS. The course, created by AWS experts and delivered by AWS Solutions Architects, uses video lectures, hands-on exercise guides, demonstrations, and quizzes to dive deep on concepts about security on AWS. Monitoring Guard Duty and Security Hub...
Cloud Computing Fundamentals on Alibaba Cloud
by Steve Xue- 4.7
Approx. 12 hours to complete
Looking to dive into the world of Alibaba Cloud with a comprehensive introduction to the range of products and solutions offered by Alibaba Cloud? Fundamental Architecting looks into storage, networking, auto-scaling, and security solutions as well as scenarios to best combine these products to create a complete cloud-based architecture. Manage a Relational Database that can analyze large sets of data...
Industrial IoT on Google Cloud
by Google Cloud Training- 4.5
Approx. 18 hours to complete
Analyzing and Visualizing Data with Dataprep and Data Studio An integrated data pipeline Introduction to Data Studio Connect to your Data Analyzing and Visualizing Data with Dataprep and Data Studio - Review Share reports and data Implement a Dataflow from their device to BigQuery and Dataprep. Use BigQuery and Dataprep to analyze data...
Intro to Backend
by Steve Huffman- 0.0
Approx. 3 weeks
You want to build Web services and want a place to start. lesson 1 Forms and Inputs How do web sites handle user input? Build HTML forms and the validation and escaping logic needed to handle user input correctly. lesson 4 User Accounts & Security What's a cookie and what does it have to do with logging in a user?...
Free
AWS IoT: Developing and Deploying an Internet of Things
by Neel Mitra , Bobbie Atristain , Allen Goldberg , Adam Becker , Wes Gruver- 4.6
Approx. 7 hours to complete
With the proliferation of devices, you increasingly need solutions to connect them, and collect, store, and analyze device data. This course will introduce you to the Internet of Things and then explore Amazon Web Services’ IoT services, and then expert instructors will dive deep into topics such as the device gateway, device management, the device registry, and shadows....
Digital Thread: Components
by Ken English- 4.6
Approx. 14 hours to complete
You will have a working understanding of the digital thread – the stream that starts at product concept and continues to accumulate information and data throughout the product’s life cycle – and identify opportunities to leverage it. Data Security and Disaster Recovery Resources: Data Security and Disaster Recovery Data Sharing and The Digital Thread...
Related searches
Palo Alto Networks Cybersecurity Essentials I
by James Dalton- 4.7
Approx. 18 hours to complete
Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. LAB SETUP START HERE: Connecting to the NDG platform and performing labs. Video: Data Center Security with PaloAlto Networks Firewall Video: Data Center Security - East / West Traffic...
Research Data Management and Sharing
by Helen Tibbo , Sarah Jones- 4.7
Approx. 14 hours to complete
After completing this course, learners will understand the diversity of data and their management needs across the research data lifecycle, be able to identify the components of good data management plans, and be familiar with best practices for working with data including the organization, documentation, and storage and security of data....
Network Security & Database Vulnerabilities
by IBM Security Learning Services- 4.6
Approx. 14 hours to complete
You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn about various security breach types associated with databases and organizations that define standards and provide tools for cybersecurity professionals. Structured Data and Relational Databases A Data Protection Solution Example, IBM Security Guardium Use Cases...