Search result for Device and data security Online Courses & Certifications
Get Course Alerts by Email
Hybrid Cloud Fundamentals
by Mark Lavi , Cees van Eijk- 0.0
Approx. 1 month
Dive into the role of a hybrid cloud engineer and learn how to use Nutanix's Hyperconverged Infrastructure (HCI) software to configure the different components of a private cloud cluster. lesson 4 Hybrid Cloud Security Apply security standard and best practices to secure your hybrid cloud. Apply data protection best practices including backups....
Free
Real-Time Mission-Critical Systems Design
by Sam Siewert- 0.0
Approx. 50 hours to complete
● Thorough understanding of hardware/software device interfaces and resource view for hardware abstraction layers (HAL, BSP) Device I/O interfaces and Drivers for Real-time Systems Course Goals and Learning Objectives Drivers and Device Interfaces Using Linux UVC Driver to Acquire Video Frames with OpenCV and V4L2 Quiz 1 - Device Interfaces and Software Drivers...
Cyber Security Extreme Test Preparation
by AKASH RANJAN PATEL- 0.0
Website Security, Mobile Phone Security , Network Security , IOT Testing,Cyber Forensics Website Security :- Web application security is a branch of information security that deals specifically with security of websites, web applications and web services. Mobile Phone Security :-Mobile device security refers to the measures taken to protect sensitive data stored on portable devices....
$12.99
iOS Persistence and Core Data
by Fernando Rodriguez , Eden Shapiro , Kate Rotondo- 0.0
Approx. 2 months
Learn how to store app data to your device using three common techniques: NSUserDefaults, Sandbox, and Core Data. Read and save files using NSFileManager in an existing app. lesson 4 The Core Data Stack Set up the classes we need to get Core Data up and running. Set up an NSFetchedResultsController to observe data changes and notify the UI....
Free
Introduction to Cybersecurity for Business
by Greg Williams- 4.7
Approx. 12 hours to complete
This course approaches computer security in a way that anyone can understand. Introduction to Practical Computer Security Computer Security Key Definitions The Computer Security Environment Today Security Frameworks Glossary of Computer Security Terms Security Frameworks Week 1: Practical Computer Security Home Depot data breach Practical Application of Daily Security Ports and Protocols...
Check Point Jump Start: SMB Network Security
by Check Point Software Technologies- 0.0
Approx. 2 hours to complete
This course introduces you to Check Point's Small and Medium Business (SMB) network security appliances. You will learn how to deploy, configure, manage, and monitor network security policy on the SMB appliance platform. Zero Touch and Reach My Device Understand cloud-based features such as the Security Management Portal, Reach My Device, and the Watchtower mobile app...
Machine Learning Data Lifecycle in Production
by Robert Crowe- 4.5
Approx. 20 hours to complete
Week 1: Collecting, Labeling, and Validating data Week 3: Data Journey and Data Storage Week 4: Advanced Data Labeling Methods, Data Augmentation, and Preprocessing Different Data Types Week 1: Collecting, Labeling and Validating Data Data and Concept Change in Production ML Week 3: Data Journey and Data Storage Week 4 (Optional): Advanced Labeling, Augmentation and Data Preprocessing...
Related searches
Introduction to Cybersecurity Tools & Cyber Attacks
by IBM Security Learning Services- 4.5
Approx. 20 hours to complete
You will learn the history of Cybersecurity, types and motives of cyber attacks to further your knowledge of current threats to organizations and individuals. FIRST- Forum of Incident Response and Security Teams Welcome to Security Attacks, Actors and their Motive Frameworks and their purpose An overview of key security tools Welcome to an Introduction to Key Security Tools...
Web Connectivity and Security in Embedded Systems
by Juha Plosila , Farhoud Hosseinpour- 4.4
Approx. 12 hours to complete
Welcome to Web Connectivity and Security in Cyber Physical Systems! We will also go through security and privacy issues and challenges in cyber physical systems (CPS). You will also be able to define security requirements for your system and choose and implement a proper security and privacy technique to protect it....
A to Z of Azure security - Covers AZ 500, 300,103 and more
by Varma Rudra- 4.7
16 hours on-demand video
Storage & Database security - Introduction to Azure storage security and Azure SQL database security; Generate SAS keys based on Stored Access policies and use them; Implement advanced data security capabilities such as data classification, vulnerabilities assessment, advanced threat detection and auditing; Implement always encrypted; Introduction to COSMOS DB security. Configure basic and advanced security controls for Azure SQL database...
$21.99