Search result for Security management Online Courses & Certifications
Get Course Alerts by Email
SAP Audit
by SAP Training Now & OJAYO SAP education university- 0.0
7.5 hours on-demand video
SAP Audit focusing on compliance and security in sap for beginners. SAP Governance and security is an advanced security+governance course which covers various technology areas starting from security, audit, internal controls, sox and risk management. Governance and security go hand in hand. Governance of SAP security with SAP compliance processes and best practices in today a primary focus area....
$12.99
ISO 27001: Complete MasterCourse for EXIN ISF Certification
by GetGlobal International - USA- 4.5
6.5 hours on-demand video
The EXIN Information Security Management ISO/IEC 27001 online course, teaches how organizations can adopt an internationally recognized and appropriate model for establishing, implementing, operating, monitoring, reviewing and managing an Information Security Management System. ISO 27001 is a holistic model of approach to Security and independent of brands and technology manufacturers....
$12.99
Microsoft 365 Security Administration (Exam MS-500)
by Intellezy Trainers- 4.4
7.5 hours on-demand video
In this course, students will learn to implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments. Student’s passing the exam will earn the Microsoft 365 Certified: Security Administrator Associate certification....
$12.99
REST API Design, Development, Security, Testing & Management
by Sanjay Bharatiya- 4.3
18.5 hours on-demand video
REST API Design - Swagger/Open API, API Development - Spring Boot, API Management - Apigee, JWT,Spring Security, Testing API security aspects like Authentication, Authorization and SSO using JWT. Implementing above security concepts using Spring Security and Spring Boot...
$14.99
The Business of Social
by Randy Hlavac- 4.7
Approx. 6 hours to complete
You will learn the legal considerations involved as well as proven performance metrics and management tactics for success. Management Program Management...
ISO 27001 Cybersecurity manager. Guidelines.
by Cristian Lupa- 4.4
4 hours on-demand video
The purpose of this course is to provide cybersecurity guidelines for the application of ISO 27001 (the popular standard for information security management systems). - Internal organization requirements including support from top management and segregation of duties; - requirements for the change management process in an organization so that security is not affected...
$15.99
Architect SaaS Applications - Unique Challenges & Solutions
by V2 Maestros, LLC- 4.2
3.5 hours on-demand video
Intro to SaaS, scalability, multi-tenancy, provisioning, security, APIs, management, maintenance Are you a software professional who is intrigued by the term “Software-as-a-Service”? Have you thought about how Google, Microsoft, Salesforce and others build and manage these applications? Do you yearn to learn about the unique challenges in architecting and building these applications and how to solve them?...
$16.99
Related searches
AWS Administration – Database, Networking, and Beyond
by Packt Publishing- 3.5
1.5 hours on-demand video
Learn management tools in AWS with networking, security and database services Moving on, you will see security which is one of the most critical areas...
$9.99
AWS Certified Security Specialist
by Alan Rodrigues- 4.2
7.5 hours on-demand video
This course is specially built to prepare you for taking on the AWS Certified Security Specialty Exam This course is specially built to prepare you for taking on the AWS Certified Security Specialty Exam. Using Identity and Access Management Core AWS services from a security aspects such as CloudTrail , AWS Config, AWS WAF etc....
$12.99
Real-Time Cyber Threat Detection and Mitigation
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. TCP/IP Evolution and Security More Advanced Network Security Technologies Network Security Architectures...