Search result for Vulnerability management Online Courses & Certifications
Get Course Alerts by Email
Foundations of Public Health Practice: Health Protection
by Wendy Kwok , Dr Richard J Pinder- 4.9
Approx. 9 hours to complete
Beginning with the basics of Water, Sanitation and Health (WASH) based interventions, the course will introduce learners to the science and principles of practical microbiology, before examining vaccines, incident management and the threat posed by a wide range of manmade and natural environmental threats. Module Two: Vaccines and management of communicable disease Vulnerability in communicable disease...
Ethical Hacking: Network Scan Nmap&Nessus | ethical hacking
by Muharrem AYDIN- 4.3
4.5 hours on-demand video
In addition to proficiency in basic computer skills and use of the command line, ethical hackers must also develop technical skills related to programming, database management systems (DBMS), use of the Linux operating system (OS), cryptography, creation and management of web applications and computer networks like DHCP, NAT, and Subnetting....
$23.99
Networks and Communications Security
by (ISC)² Education & Training- 4.7
Approx. 20 hours to complete
LAN-Based Security: Secure Device Management LAN-Based Security: Secure Device Management...
Hacking Web Applications and Penetration Testing: Fast Start
by Muharrem AYDIN- 4.2
4 hours on-demand video
After that, you’re going to learn how to discover authorisation, authentication and session management flaws. Find known vulnerabilities using vulnerability database Session management mechanism...
$15.99
Strategy Formulation
by Marcus Møller Larsen- 4.5
Approx. 16 hours to complete
The vulnerability of the wind turbine industry...
Water in the Western United States
by Eric Gordon , Anne U. Gold- 4.8
Approx. 24 hours to complete
[OPTIONAL] Climate Change in Colorado: A Synthesis to Support Water Resources Management and Adaptation [OPTIONAL] Colorado Climate Change Vulnerability Study Explain historical and scientific issues around water management in the western US....
Research for Impact
by Mark New , Jesse DeMaria-Kinney- 4.9
Approx. 20 hours to complete
Case study: India - How vulnerability and climate change impacts migration from the deltas - Sumana Banerjee Case study: Botswana - Using Transformative Scenario planning and Vulnerability Risk Assessments to include community knowledge in policymaking - Chandapiwa Molefe Case Study: Botswana - Using Transformative Scenario planning and Vulnerability Risk Assessments to include community knowledge in policymaking - Chandapiwa Molefe...
Related searches
High Stakes Leadership: Leading in Times of Crisis
by Mike Barger- 4.6
Approx. 31 hours to complete
Crisis Definition and Expectation Management The Importance of Acknowledging Individual Vulnerability Sample Crisis Management Checklists...
IT Security: Defense against the digital dark arts
by Google Career CertificatesTop Instructor- 4.8
Approx. 30 hours to complete
Supplementary reading on WiFi Protected Setup (WPS) PIN brute force vulnerability Software Patch Management...