Search result for Data security and privacy Online Courses & Certifications
Get Course Alerts by Email
Learn to build an Auth0 App using Angular 2
by Eduonix Learning Solutions- 4.3
1 hour on-demand video
Security company can provide you with access and keep your data secure. create an account and log in every time they want to access their incorporate the Auth0 authentication component and create an account. access control to certain routes and also go through the Auth0 of this and so much more await you in this course....
$12.99
Configuring Fortigate Unified Threat Management Appliances
by Daniel Botescu- 0.0
4.5 hours on-demand video
Today we live in a world where network and cyber security are two of the most important subjects. By the end of this course you will be able to transform your network security with a very powerful device and have the solid skills that you can use in the future to expand your knowledge....
$12.99
Introduction to Game Cheat and Software Hacking on Windows
by Kelvin Chan- 0.0
2 hours on-demand video
You are going to learn how to analysis the game data by practical reverse engineering techniques as well as some tools, and also you are going understanding the engineering part of game cheat, how can we make a cheat in real world?...
$12.99
SQL Server 2016 Administration
by Raphael Asghar- 4.6
6.5 hours on-demand video
Newest and beneficial features of SQL Server 2016 the student will be exposed to the latest and newest features that SQL Server learn about data masking, temporal tables, row level security, Azure cloud technology, stretch database configuration, live query statistics and much in SQL Server 2016 and as a result gain an advantage over the other IT...
$13.99
Complete Ethical Hacking Bootcamp 2021: Zero to Mastery
by Andrei Neagoie- 4.6
27 hours on-demand video
In this section, we are mainly targeting websites and their bugs/vulnerabilities. This allows us to sniff any unencrypted data and see it in plain text. As a self made hacker that started from a young age he has learned it all from Ethical Hacking and Cyber Security to Online Privacy and How To Become Anonymous Online....
$14.99
Secure Software Development: Implementation
by David A. Wheeler- 0.0
7 Weeks
This course focuses on key implementation issues: input validation (such as why allowlists should be used and not denylists), processing data securely, calling out to other programs, sending output, and error handling. This includes how to do Input validation, process data securely, call out to other programs, and send output....
$199
IT Surveillance and Computer Forensics from Scratch HACKING+
by Hacking School- 0.0
5.5 hours on-demand video
Surveillance Methods and Computer Forensics Basics - 101 Video Training with PDFs. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Remote capturing the data about user and hardware Acquiring data from pagefile, thumbnails and raw disk fragments Acquiring data from binary files and process memory dump ...
$12.99
Related searches
Microsoft SQL Database Bootcamp: Get Microsoft Certified
by How To Network- 0.0
7 hours on-demand video
We start at the very basics and walk you through all the configurations step-by-step. How data is stored in tablesUnderstand Relational Database ConceptsUnderstand Tables and How to Create ThemInsert, Delete and Update DataDatabase Security ConceptsDatabase Backups and Restore You can follow along with the instructor and create your own database. It leads to the MCSA or MCSE Data Platform certifications....
$16.99
Virtualize applications with VMware vSphere 6.5: 2 in 1
by Packt Publishing- 0.0
18 hours on-demand video
We will demonstrate various command-line actions that can help you to configure and manage storage for ESXi hosts in your data center, virtual machine networking, monitoring hosts, adding third party extensions, performing virtual machine operations and many more. Atindra Chaturvedi is a certified VMware Advanced Professional in Data Center Design (VCAP-DCD) and Data Center Administration (VCAP-DCA)....
$12.99
Exploiting and Securing Vulnerabilities in Java Applications
by Joubin Jabbari- 4.6
Approx. 23 hours to complete
With our Attacker Hats on, we will exploit Injection issues that allow us to steal data, exploit Cross Site Scripting issues to compromise a users browser, break authentication to gain access to data and functionality reserved for the ‘Admins’, and even exploit vulnerable components to run our code on a remote server and access some secrets....