Search result for Data security Online Courses & Certifications
Get Course Alerts by Email
Microsoft 365 Security Administration (Exam MS-500)
by Intellezy Trainers- 4.4
7.5 hours on-demand video
In this course, students will learn to implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments. Student’s passing the exam will earn the Microsoft 365 Certified: Security Administrator Associate certification....
$12.99
How Computers Work
by Dr Marco Gillies- 4.6
Approx. 10 hours to complete
2 Abstraction in data representations 1 Security threats 4 Security defenses 3 Security and the Web 7 Your data...
Secure Networked System with Firewall and IDS
by Edward Chow- 3.8
Approx. 9 hours to complete
This will include understanding the basic components of network security, constructing a dual-firewall DMZ, and defining security policies to implement and enforce these rules. Security Policies & Enforcement Video: CNN - How Target Could Have Prevented Customer Data Hack...
Cloud Computing Security
by Patrick Appiah-Kubi , Charif El MaMouni- 0.0
8 Weeks
Learn how to identify security issues in the cloud and industry-standard techniques and procedures to prevent and mitigate risks. How do you protect the critical data that is increasingly being stored in the cloud? Learn how to build a security strategy that keeps data safe and mitigates risk. Evaluate security issues with cloud infrastructure...
$299
Cyber Security Economics
by Ross Anderson , Rainer Böhme , Michel van Eeten , Carlos H. Gañán- 0.0
10 Weeks
Learn how to make better decisions about security and IT by using state-of-the-art economic tools, security metrics and data analytics. We introduce state of the art security and IT metrics and conceptualize the characteristics of a security metric, its challenges and advantages. Economics of information security investment. Security market failures. How to design security metrics to capture information security issues...
$50
Intro to Relational Databases
by Karl Krueger- 0.0
Approx. 4 weeks
Even though many toolkits hide the details of the data lesson 1 Data and Tables Learn about how relational databases let you structure data into tables. Common security pitfalls of database applications including the famous Bobby Tables. Learn how to use the SQL join operators to rapidly connect data from different tables....
Free
Managing Network Security
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 15 hours to complete
When we allow network access to data it is exposed to threats from inside and outside of the organization. ● Describe the threats to data from information communication technology (ICT) ● Identify the issues and practices associated with managing network security Managing Network Security Cryptography and Network Security Cryptography and Network Security...
Related searches
AWS: Getting Started with Cloud Security
by Rudy Chetty , Hong Pham- 0.0
4 Weeks
Data security is on the forefront of everyone’s mind these days, with data breaches, denial of service attacks, ransomware and malware being common news stories. How the AWS Shared Responsibility Model is used to differentiate between security of the cloud and security in the cloud The difference between encryption of data at rest and data in transit...
$49
Spring Security Master Class
by Mick Knutson- 5
13 hours on-demand video
Learn how to implement the Spring Security module This course is a deep-dive into the Spring Security project. Introduction to Spring Security Section 2: Introduction To Security Section 4: Getting Started with Spring Security Section 5: Spring Security Testing Understand how Spring Security fits into the Spring Ecosystem Understand Security Concepts...
$12.99
Design and Analyze Secure Networked Systems
by Edward Chow- 3.8
Approx. 15 hours to complete
We will apply CIA basic security services in the triage of recent cyberattack incidents, such as OPM data breach. We will learn the risk management framework for analyzing the risks in a network system, and apply the basic security design principles to protect the data and secure computer systems. Security Principles: Defense in Depth, Defense with Diversity, Cyber Resilience...