Search result for Data security and privacy Online Courses & Certifications
Get Course Alerts by Email
Certified Cyber Threat Intelligence Analyst
by CyberTraining 365- 3.9
9.5 hours on-demand video
With organizations increasingly relying on digitized information and sharing vast amounts of data across the globe, they have become easier targets for many different forms of attack. It is important to understand and prioritize cyber threat intelligence processes, and how they can be integrated into an organization’s security operations in a way that adds value....
$15.99
AWS SysOps Administrator Associate - 2019
by Alan Rodrigues- 0.0
10 hours on-demand video
This course has detailed discussions and Labs based on the following objectives for the exam Domain 1: Monitoring and Reporting Domain 4: Storage and Data Management Domain 5: Security and Compliance Domain 7: Automation and Optimization Go ahead , enroll in this course and begin your journey to get certified as an AWS SysOps Administrator Associate...
$12.99
TOTAL: CompTIA IT Fundamentals ITF+ (FCO-U61).
by Total Seminars • 750,000+ Enrollments- 4.6
5 hours on-demand video
What EVERY USER needs to know about basic IT concepts, troubleshooting devices, and identifying/preventing security risk Understand operating systems, data storage, and sharing Set up and configure a basic computer workstation The Total IT Fundamentals Course covers everything you need to know to be your own computer, mobile, network, and security Geek....
$15.99
Apache Cassandra from beginner to expert
by Serdar Tugcu- 3.8
2.5 hours on-demand video
NoSQL and Apache Cassandra concepts in theory and practice This course begins with NoSQL, comparing it with Relational Database and explaining how it fits in real world. You will learn what and how you can do with Cassandra. Index, views, security concepts Once you finish the course, you will feel comfortable using Cassandra both as admin and a developer....
$9.99
Learning Apache Cassandra
by Packt Publishing- 4.2
3 hours on-demand video
You’ll integrate Cassandra with Spark and learn how to process live streaming data with Spark and persist the data in Cassandra for consumption through the downstream system. You’ll design rich schemes to capture the relationships between different data types and master the advanced features available in Cassandra. Tomasz Lelek is a Software Engineer and Co-Founder of InitLearn....
$12.99
Identifying Security Vulnerabilities in C/C++Programming
by Matthew Bishop, PhD- 4.6
Approx. 23 hours to complete
This course builds upon the skills and coding practices learned in both Principles of Secure Coding and Identifying Security Vulnerabilities, courses one and two, in this specialization. You will apply tips and best practices to help you improve your programming style and help you to avoid common problems like buffer overflows, which may or may not cause security problems....
A Guide to becoming an Oracle Database Administrator (DBA)
by Bluelime Learning Solutions- 4.3
7.5 hours on-demand video
We are more than before reliant on data in our everyday life either through the use of social media with applications like Facebook,Instagram Whatsapp ,Twitter and may more data rich applications. Provides technical support to application development teamsEnforces and maintains database constraints to ensure integrity of the database. Troubleshooting problems regarding the databases, applications and development tools....
$14.99
Related searches
Industrial IoT Markets and Security
by David Sluiter- 4.7
Approx. 22 hours to complete
is and what factors have enabled the IIoT * What platforms are, and also market information on Software and Services * What the top application areas are (examples include manufacturing and oil & gas) * About computer security; encryption techniques and secure methods for insuring data integrity and authentication Platforms, Software and Services...
Complete Enterprise GIS (Build Web Mapping App from Scratch)
by Hani Draidi- 4.4
4 hours on-demand video
Learn How to Build a complete Web Mapping Application using QGIS, PostgreSQL/PostGIS, Geoserver, and Openlayrs In this course, you will build enterprise GIS environment using opensource GIS software, and develop a web mapping application. Following to that you will publish the data as web map services, and consume these map services in an application that you will develop from scratch....
$9.99
Penetration Testing, Incident Response and Forensics
by IBM Security Learning Services- 4.6
Approx. 17 hours to complete
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will learn about the different phases of penetration testing, how to gather data for your penetration test and popular penetration testing tools. Finally, you will learn key steps in the forensic process and important data to collect....