Search result for Security tools and techniques Online Courses & Certifications
Get Course Alerts by Email
Detect and Mitigate Ethical Risks
by Renée Cummings , Jennifer Fischer , Eleanor 'Nell' Watson- 0.0
Approx. 20 hours to complete
We need tools and techniques to help us assess gaps in our ethical behaviors and to identify and stop threats to our ethical goals. Manage Safety and Security Risks The Importance of Managing Safety and Security Risks Threat Modeling and Analysis Tools Security Information and Event Management (SIEM) Incorporate Safety and Security Risk Management in the Lifecycle...
Cyber Attack Countermeasures
by Dr. Edward G. Amoroso- 4.8
Approx. 19 hours to complete
This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. Important cryptographic techniques such as cipher block chaining and triple-DES are explained. Information Flow Models and Hook-Up Theorem - Part 1 Information Flow Models and Hook-Up Theorem - Part 2 Required: “Password Security: A Case History,” Morris and Thompson...
Six Sigma Tools for Define and Measure
by Christina Scherrer, PhD , David Cook, PhD , Gregory Wiles, PhD , Bill Bailey, PhD- 4.6
Approx. 8 hours to complete
This course is for you if you are looking to learn more about Six Sigma or refresh your knowledge of the basic components of Six Sigma and Lean. Six Sigma skills are widely sought by employers both nationally and internationally. These skills have been proven to help improve business processes and performance....
Personal & Family Financial Planning
by Michael S. Gutter, Ph.D.- 4.6
Approx. 15 hours to complete
Personal and Family Financial Planning will address many critical personal financial management topics in order to help you learn prudent habits both while in school and throughout your lifetime. Creating and Reviewing Your Statements Financial Statements, Tools, and Budgets Building and Maintaining Good Credit Credit Basics and Debt Management Credit Reports and Scores...
Engineering Practices for Building Quality Software
by Kevin Wendt- 4.5
Approx. 18 hours to complete
In additional, you will also learn about practices, techniques and processes that can help team build high quality software. At the end of this course, you will be able to comfortably and effectively participate in various techniques and processes for building secure and high quality software. Introduction to Patterns and the Observer Pattern...
Computer Networks Security from Scratch to Advanced
by Mohammad Adly- 3.9
8 hours on-demand video
Computer Networks Security Technologies and Tools for Network Admins and Cyber Security Officers Lecture 1: Introduction to Computer Networks ProtocolsLecture 2: IP ProtocolLecture 3: TCP and UDP ProtocolsLecture 4: Application ProtocolsLecture 5: TCP/IP Characteristics and Tools Lecture 1: Security GoalsLecture 2: Securing the Network DesignLecture 3: TCP/IP Security and ToolsLecture 4: Port Scanning and ToolsLecture 5: Sniffing and Tools...
$17.99
Detecting and Mitigating Cyber Threats and Attacks
by Greg Williams- 4.7
Approx. 12 hours to complete
Computer attacks and data breaches are inevitable. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. Introduction and Firewalls Intrusion Detection and Prevention Detection and Prevention tools Splunk and Security Week 3 - Detection and Prevention Tools...
Related searches
Certified Wireless Security Professional (CWSP)
by Stone River eLearning- 0.0
13.5 hours on-demand video
The course teaches the latest enterprise wireless LAN security and auditing techniques to the students. The Certified Wireless Security Professional (CWSP) course will help the students to acquire the necessary skills for implementing and managing wireless security in the enterprise by creating layer2 and layer3 hardware and software solutions with tools from the industry’s leading manufacturers....
$17.99
FinTech Security and Regulation (RegTech)
by Theodore Henry King CLARK- 4.6
Approx. 15 hours to complete
This course "FinTech Security and Regulation (RegTech)" help you to understand RegTech and to become more confident and persuasive in your ability to analyze and make recommendations to executives within the finance industry regarding how to react to these changes, e. 8 FinTech Security and Regulation : Introduction & Overview Summary...
Cloud Computing Fundamentals on Alibaba Cloud
by Steve Xue- 4.7
Approx. 12 hours to complete
Looking to dive into the world of Alibaba Cloud with a comprehensive introduction to the range of products and solutions offered by Alibaba Cloud? Fundamental Architecting looks into storage, networking, auto-scaling, and security solutions as well as scenarios to best combine these products to create a complete cloud-based architecture. Operate and Manage Object Storage on the Cloud: https://edu....