Search result for Digital security information Online Courses & Certifications
Get Course Alerts by Email
Introduction to Cloud Computing
by Rav Ahuja- 4.8
Approx. 12 hours to complete
The completion of this course also makes you eligible to earn the Cloud Computing Core IBM digital badge. More information about the badge can be found here: https://www. Cloud Security and Monitoring, Case Studies, and Jobs What is Cloud Security - Part 1 What is Cloud Security - Part 2...
The Secrets of OSINT (Open-source Intelligence)
by Sergii Nesterenko- 0.0
4 hours on-demand video
Let's be honest, not so many people are appropriate to working in the intelligence sector, be it the physical or the digital world. Information is the king today. Gain information that helps you to get the job of your dream or get along with your boss? How to conduct professional OSINT investigations to obtain information about a person or company...
$15.99
Future of Artificial Intelligence
by Edutainer India- 3.4
7.5 hours on-demand video
Artificial Intelligence (AI) is being widely recognized to be the power that will fuel the future global digital economy. It is similar to the human mind absorbing and synthesizing information and providing the required decision. Security Surveillance...
$9.99
Cybersecurity Awareness and Innovation
by Iván Martínez , Iván Pau , Román Ramírez- 4.7
Approx. 7 hours to complete
You will easily acquire practical skills and be ready to face real threats in a digital world. Protection basics for information and IT devices Public Key encryption is not security...
Microsoft Teams: Teams Essentials for the workplace
by Mauricio Rubio - Agile Guru & Founder of AgileKB | AgileLee & Ureducation- 0.0
2 hours on-demand video
Upon completing this course you will receive 2 Certificates of Completion, a Microsoft Teams Certified Digital Badge you can add to your CV, LinkedIn Profile or any other online profile & access to the most dynamic Agile Community in the world. Teams comes with the enterprise-grade security integrated with the Office 365 Security and Compliance Center and Azure Active Directory....
$14.99
The Complete Ethical Hacking Course
by Codestars by Rob Percival- 4.5
36 hours on-demand video
Learn penetration testing + build security and coding tools with Python. Along with the course you’ll also receive for free the "The Complete Ethical Hacking Course Handbook", and $10 credit of at Digital Ocean (in order to build and practice within their online servers). Atil Samancioglu teaches cyber security and programming courses on Udemy, and all across the world....
$19.99
Advanced System Security Topics
by Edward Chow , Greg Williams- 4.5
Approx. 15 hours to complete
We show how to exhance the data security with GeoEncryption, Secure Enhanced Geolocking, and R2D2 concepts which deliver data to right places via right path. Enhance Security with Network and Context Information Digital Certificate Creation Read how digital certificates are created for secure web access Read the following paper which utilize attribute certificates for secure information sharing....
Related searches
Introduction to Blockchain Technologies
by Don Tapscott , Alex Tapscott- 4.7
Approx. 29 hours to complete
The Internet of Information Achieving Trust in the Digital Age The Internet of Information Achieving Trust in the Digital Age The Internet of Information Achieving Trust in the Digital Age Principle 4: Security Principle 4: Security Principle 4: Security...
CISSP Certification: CISSP Domain 3 & 4 Video Boot Camp 2021
by Thor Pedersen | 234,000+ Enrollments Worldwide- 4.6
11.5 hours on-demand video
Security models and concepts Security evaluation models Database security Mobile device security Physical security part 1 Physical security part 2 Prepare for the 2018 version of the Certified Information Systems Security Professional (CISSP) Certification Exam, which is what you will be tested on until the next CISSP curriculum update in 2021....
$18.99
IFCI Expert Cybercrime Investigator's Course
by Brian Hussey- 0.0
16.5 hours on-demand video
IT Security Team - Rogue Malware Case: You discover malware on an internal corporate computer but you don’t know what it does or why it’s there. Can you analyze the malware, determine its capabilities, identify its target data, and destroy its data exfiltration file before your corporate proprietary information is lost?...
$174.99